Last Updated at 2024-Jan-04
1. INTRODUCTION
BrainPayroll Security Policy Document encompasses all security aspects, especially confidential payroll information. All company employees and contractors must understand this document and sign the form confirming they have read and understood this policy thoroughly. This document will be reviewed and updated by management annually or, when relevant, to include newly developed security standards into the policy and distribute it to all employees and contracts as applicable.
This Security Policy is a formal set of rules by which all stakeholders who are given access to the Company's technology and information assets must abide by.
The primary purpose is to inform Company's all stakeholders about their obligatory requirements for protecting its technology and information assets.
1.1 Security goals
BrainPayroll is committed to safeguarding the confidentiality, integrity, availability, and resilience of all payroll data's physical and electronic information assets to ensure that regulatory, operational, and contractual requirements are fulfilled. The overall goals for the BrainPayroll security requirements are below:
1.2 Security Strategy
Current business strategy and framework for risk management are the guidelines for identifying, assessing, evaluating, and controlling information-related risks through establishing and maintaining the security policy (this document).
It has been decided that information security is to be ensured by the policy for information security and a set of underlying and supplemental documents. In order to secure operations at BrainPayroll even after serious incidents, we ensure the availability of continuity plans, backup procedures, defence against harmful code and malicious activities, system and information access control, incident management and reporting.
The term security policy is related to the following concepts:
Confidentiality:
Information is not made available or disclosed to unauthorized individuals, entities, or processes.
Integrity::
It is safeguarding the accuracy and completeness of the information and IT assets.
Availability::
It is accessible and usable upon demand by an authorized entity.
The most critical aspects supporting activities are the availability and reliability of network, infrastructure, and services. We practice openness and principles of public disclosure, but in certain situations, we prioritize confidentiality over availability and integrity.
2. APPLICATION SECURITY
The Secure Application development policy is a plan of action to guide developers' decisions and measures to ensure software security. Code development has been checked and validated with the most current versions of the coding Standards for Secure Application Development. All developers verified that their code complied with the most recent and approved coding standards and guidelines.
We ensure code security by doing a vulnerability scan before the production release. Any bug or vulnerability must fix before release, and the green VAPT report is part of change management.
Third-party open libraries with the application are reviewed and scanned for vulnerability; the green scan report is part of change management.
Public-facing application is protected with Web application firewall (WAF) configured according to OWASP's top ten security controls to protect application from Broken authentication, SQL injection, Cross-site scripting, etc. Additionally, it protects the application from DDOS and bot attacks.
2.1 Protected Stored Data
All sensitive payroll data stored and handled is protected against unauthorized use. Any sensitive payroll data that is no longer required for business reasons will be discarded with an anonymized technique.
Data in rest is protected with required security controls.
2.2 Protected Data in Transit
2.3 Disposal of Stored Data
2.4 Password Policy
2.5 Security Features
3. SERVER SECURITY
The servers are secured; To protect the servers against network analysis attacks following controls are in place.
3.1 Antivirus
3.2 Patch Management Policy
Our components are updated automatically with the latest security fixes in the standard Microsoft patch cycle. Security patches must be installed every second week of the month when it is released from Microsoft.
All server components have up-to-date system security patches installed to protect the asset from known vulnerabilities.
The latest firmware updates the firewall, NAS, switches, and other network components. Usually use the n-1 policy for firmware updates and prefer to use the most recent and stable version.
3.3 Password Policy
Strong passwords on any accounts with access to Remote Desktop should be considered a required step before enabling remote desktops. Where possible, passwords are generated using a password generation tool, which ensures that the password is difficult to remember and is stored in a secure file.
All users, including contractors and vendors with access to the systems, are responsible for selecting and securing their passwords.
2FA is used to access critical devices, servers, and services like production servers, Application support access, Office365 global admins, AWS accounts, etc.
3.4 Vulnerability Management Policy
All the vulnerabilities would be assigned a risk ranking such as High, Medium, and Low based on industry best practices.
We run internal infra VAPT quarterly and at the time of major changes in IT infrastructure.
Brain Application VAPT testing is done by an external Third-party yearly and during major code changes. We do the code scanning before every production release and fix the bug and vulnerabilities before release. Code VAPT green report is part of the change and release management.
Third-party open library use in an application is scanned before every production release, and fix the bug and vulnerabilities before release. Third-party open library VAPT green report is part of the change and release management.
VAPT result of any scan is shared with responsible stakeholders who review the report and mitigate the vulnerability.
We use JIRA as a vulnerability management tool to create JIRA for each vulnerability and assign it to a responsible team member.
3.5 Physical Security
3.6 Remote Access Policy
3.7 Network Policy
All our cloud servers are within the UK region. The data centre is secure, highly resilient and designed to handle all computing demands.
3.8 Firewall Policy
4. DISASTER RECOVERY & BUSINESS CONTINUITY
We maintain best resilience practices to minimize productivity hampers and data loss. We can recover from any damage to computer equipment or files within a reasonable period. Each entity is required to develop and maintain a plan for responding to a system emergency or other occurrence (for example, fire, system failure and natural disaster) that damages systems. This will include developing policies and procedures to address the following.
4.1 Data Backup Plan
A backup policy is a pre-defined, set schedule whereby information from business applications. Backup for user files is uploaded to NAS, cloud server or FTP to ensure data recoverability in the event of accidental data deletion, corrupted information or some system outage. Backup data is stored in an off-site location and protected from physical damage.
Backup policies typically capture an initial full data backup onto a disk and cloud, followed by a series of intervening incremental or differential daily backups
The backups are protected through encryption, and strong passwords and backups are uploaded securely to the cloud server
4.2 Disaster Recovery Plan
A disaster recovery plan has been developed, which contains a process enabling the entity to restore any data loss in the event of a fire, natural disaster, cyber security incident or system failure.
We have pre-defined RTO & RPO with the customer in case of any application component failure.
4.3 SLA (Service Level Agreement)
The SLA is a contract between parties that defines the services provided, the indicators associated with these services, acceptable and unacceptable service levels, liabilities on the part of the service provider and the customer, and actions to be taken in specific circumstances.
There are certain objectives for SLA:
We facilitate two-way communication between clients. This communication starts at the beginning of establishing an SLA and continues throughout the life of the arrangement. The clients involved come together to understand each other's needs, priorities and concerns and to gain an insight into the problems each party may face through the failure of each party to fulfil their obligations.
5. SECURITY AWARENESS AND PROCEDURES
The policies and procedures defined below should be incorporated into company practice to maintain high-security awareness. The protection of sensitive data needs regular training for all employees and contractors.
Review handling procedures for sensitive data and hold periodic security awareness meetings to incorporate these procedures into day-to-day practice. Distribute this security policy document to all employees/clients to read.
Maintaining a formal security awareness program for all employees that provide multiple methods of communicating awareness and educating employees (training, meetings, documentation, etc.)
The awareness training includes Security Awareness Training, GDPR information, Secure coding guideline etc.
5.1 Audit and Log review:
The audit and Log review procedure cover all logs generated for systems within the payroll data environment, including the following components:
The IT team has configured an email alert for any potentially suspicious activity. An email will be sent for the alerts to the related team's mailbox with a summary of the incident. The related team also receives details of email alerts for informational purposes.
Audit Logs were maintained for six months on hot storage and three years on cold storage. The authorized person can only be permitted to access log files.
6. RELEASE MANAGEMENT
Release management is the process of managing, planning, scheduling, and controlling a software build through different environments and life cycles, including testing and deploying software releases.
6.1 Change Roles
Changes to the application are managed and executed according to a formal change control process. The control process ensures that proposed changes are reviewed, authorized, implemented, and released in a controlled manner; and that the status o f each proposed change is monitored.
The change control process is formally defined and documented. This documented process includes change management responsibilities and a change request form. The change request form contains change-related details and a risk calculator. The risk calculator defines the overall risk of classified changes.
The change roles are as follows:
6.2 Release Automation
Deploying a software package to the production environment is fully automated. Release Automation refers to the process of packaging and deploying an application or update of an application from development across various environments, and ultimately to production.
Having the ability to deliver a high-quality application rapidly and safely is its most important competitive differentiator. By exploring and implementing deployment automation options, DevOps and continuous delivery teams are better able to build, test, and deliver reliable applications more quickly.
Automation tool helps cultivate DevOps best practices by providing a combination of automation, and environment.
modeling and work-flow-management capabilities. These practices help teams deliver software rapidly, reliably, and responsibly. Automated tools achieve a key DevOps goal of implementing continuous delivery with a large number of releases quickly
Automated tools deploy applications using structured release-automation techniques that increase visibility for the whole team. It combines workload automation and release-management tools related to release packages and movement through different environments within the DevOps pipeline.
Automated tools help regulate deployments, how environments are created and deployed, and how and when releases are deployed.
6.3 Standard Release Process
The release process ensures the code the development team writes is built on a build server using the build tool. Once the testing of the built package is completed and passed, it can be deployed in environments for testing or live usage. The Release process is a critical bridge between Development and Testing/Production.
There are five primary steps to the release process as follow:
Release Process
We have created a release process checklist to map out a plan and clarify the process. The checklist outlines the process functions and responsibilities in roughly chronological order.
Build release
User acceptance testing
Prepare release
Deploy release
6.4 Emergency Release Process
In the case of emergency changes which have to be dealt with by Release Planning, this general rule should never be violated: "No matter how urgent a release is, it has to pass through Release Management". It is usually done for a quick fix for a problem or known error.
Compared to Standard Release, the main difference of an Emergency Release is that it is not planned before and needs to be implemented urgently. Therefore, it requires reduced testing efforts. Often the necessary testing, documentation and monitoring agents cannot be assigned. Finally, an emergency release is not planned within overall Release Planning, forcing a change in the overall planning. An Emergency Release is managed in line with the Emergency Change activities.
The main activities in the Emergency release are as follows:
6.5 Source Control
Source control is the practice of tracking and managing changes to the code. Source control management (SCM) systems provide a running history of code development and help to resolve conflicts when merging contributions from multiple sources.
SCM tool allows and encourages to have multiple local branches that can be entirely independent of each other.
Given one or more existing commits, revert the changes that the related patches introduce, and record some new commits that record them. This requires your working tree to be clean (no modifications from the HEAD commit).
7. SCOPE, ROLES AND RESPONSIBILITY
The scope defines part of the project planning and lists the project goals, tasks, costs, deliverables, and project deadlines. It requires input from the project stakeholders, who, together with project managers, establish the key elements and budget. The scope of information security includes the protection of the confidentiality, integrity, and availability of the information.
7.1 Roles and Responsibility
Maintaining a formal security awareness program for all employees that provide multiple methods of communicating awareness and educating employees (for example, posters, letters, and meetings).
Maintaining a formal security awareness program for all employees that provide multiple methods of communicating awareness and educating employees (for example, posters, letters, and meetings).
Administrator maintaining a clean and enjoyable working environment, handling external or internal communication. The administrator manages the office activities and operations to secure efficiency and compliance with company policies.
Contractor is a business owner themselves or belongs to a vendor organization. Typically, you pay them for the completed tasks once the work is completed. Their business is to provide certain skills for another business that doesn't have the expertise or time to do those skills themselves.
8. ACCESS CONTROL POLICY
Access Control systems are in place to protect the interest of the company's computer systems by providing a safe, secure, and readily accessible environment in which to work.
Access control systems authenticate and authorise users' required login credentials, including passwords, personal identification numbers, security tokens or other authentication factors.
Multifactor authentication requires two or more authentication factors to protect access control systems.
The privilege rights (e.g. domain and local administrator, super-user and root access) are restricted, and the IT Services and system owner provide authorization.
Access to The Company IT resources and services is a unique Active directory account and a complex password.
Password issuing, strength requirements, and control are managed through the formal process. Windows Active Directory Group Policy controls password length, complexity, and expiration times.
Access to confidential, Restricted and Protected information is limited to authorized persons whose job responsibilities require it. Request for access permission to be granted, changed, or revoked must be made in writing.
Access control methods include login access rights, Windows share and NFTS permission, user account privileges, server and workstation access rights, firewall permission, IIS server rights and SQL database rights as necessary.
8.1 Access Server for Support
8.2 Data Scrambling
Data scrambling is the process of removing sensitive data. It is irreversible, so data cannot be derived from the scrambled data.
The configuration process begins with the DBA defining the attributes and mapping them to database columns. Then they collect attributes together to define policies and policy sets. All these steps are part of the data scrambling configuration and are performed within the SQL database.