Table of Contents

Introduction


This page covers interworks.cloud policies and standards used to ensure security and privacy for its users and data, broken up into the following sections:

1. Authentication & Authorization


1.1 User Authentication Methods

BSS

Storefront

  • Proprietary Authentication mechanism using Username/password combination

    • Two-Factor Authentication (2FA) can be enabled for the BSS. More information: Local Login in BSS With Two Factor Authentication (2FA)

    • Password Policy: Password policy for BSS users requires at least 8 characters long and it must contain at least 1 number, 1 non-alphanumeric symbol and 1 uppercase letter.

    • New User Activation Process: The account confirmation mechanism forces the user to respond to an activation email sent after successful creation to verify his email address and activate their account. The user does this by clicking a unique activation link sent to them over email.

  • Single sign-on (SSO) via Enterprise Identity Providers based on SAML and OAuth (e.g. auth0, Azure AD, Okta). The administrator can restrict BSS users to login using username and password and enable logging in only via SSO. More information on Single Sign-On in the BSS: https://interworkscloud.atlassian.net/wiki/spaces/ICPD/pages/484999664/External+Authentication+-+Single+Sign-On+SSO+in+BSS

  • Proprietary Authentication mechanism using Username/password combination

    • Two-Factor Authentication (2FA) can be enabled for the Storefront. More information: Local Login in Storefront With Two Factor Authentication (2FA)

    • Password Policy: Password policy for Storefront users requires at least 8 characters long and it must contain at least 1 number, 1 non-alphanumeric symbol and 1 uppercase letter.

    • New User Activation Process: The account confirmation mechanism forces the user to respond to an activation email sent after successful creation to verify his email address and activate their account. The user does this by clicking a unique activation link sent to them over email.

  • Single sign-on (SSO) via Enterprise Identity Providers based on SAML and OAuth (e.g. auth0, Azure AD, Okta) or via Social Identity Providers (e.g. Google). The administrator can restrict Storefront users to login using username and password and enable logging in only via SSO. More information on Single Sign-On in the Storefront: External Authentication - Single Sign-On(SSO)

1.2 Login Failure Policy & Session Expiration

1.3 User Roles

BSS

Storefront

There are two types of users on BSS: Administrators and Non-Administrators. Permissions (View/Edit/Delete) are defined on all objects of an organization, either at the user level or user group level.

The administrator has the ability to assign roles to users. With role-based access control (RBAC), access can be restricted to authorized users only: Storefront User Roles Comparison Table

1.4 Spam & Abuse

BSS

Storefront

Google reCAPTCHA protects BSS login page from repeated, automated submissions from robots (spam) and abuse.

Google reCAPTCHA and Friendly Captcha protect Storefront login page from repeated, automated submissions from robots (spam) and abuse.

2. Cloud Security


2.1 Infrastructure Security & Data Hosting

The entire platform infrastructure is hosted on Microsoft Azure (West US & West Europe regions), protected by advanced Layer-7 routing and load-balancing devices, network security groups, web application firewalls, and DDoS Protection. Management of the infrastructure is allowed via the Azure portal, utilizing conditional access policies and strong MFA for secure access to both the portal and the virtual machines. The virtual network infrastructure is based on Azure Virtual Network, utilizing separate subnets for each platform component type, different network security groups for fine-grained control of permitted traffic between components and subnets, firewalls, as well as accelerated networking for the virtual machines.

2.2 Security Incident Response

2.3 Vulnerability Scanning

Interworks developed a continuous vulnerability scanning program to continuously assess and track vulnerabilities on all critical assets within the enterprise’s infrastructure, in order to remediate, and minimize, the window of opportunity for threat actors. This program includes:

2.4 Penetration Testing

A third-party independent auditing firm quarterly runs penetration tests in our interworks.cloud Platform production environments, against the top-10 OWASP exploits and vulnerabilities. Penetration test reports are available upon request and signing of an NDA.

2.5 Encryption

2.6 Backups

Backup frequency varies depending on the type of data:

Virtual Machines & Common storage

Backup Settings

Backup Policies

Policy

EU

US

DailyBackupPolicy

  • Backup type: Full backup

  • Backup frequency: Daily at 6:00 AM GTB Standard Time

  • Instant restore: Retain instant recovery snapshot(s) for 5 day(s)

  • Retention of daily backup point: Retain backup taken every day at 6:00 AM for 30 Day(s)

  • Retention of monthly backup point: Retain backup taken every month on 1 at 6:00 AM for 6 Month(s)

  • Backup type: Full backup

  • Backup frequency: Daily at 6:00 AM GTB Standard Time

  • Instant restore: Retain instant recovery snapshot(s) for 5 day(s)

  • Retention of daily backup point: Retain backup taken every day at 6:00 AM for 30 Day(s)

  • Retention of weekly backup point: Retain backup taken every week on Sunday at 6:00 AM for 12 Week(s)

  • Retention of monthly backup point: Retain backup taken every month on 1 at 6:00 AM for 6 Month(s)

EnhancedPolicy-DailyBackupsEvery6Hours

  • Backup type: Full backup

  • Backup frequency: Every 6 hour(s) starting 6:00 AM GTB Standard Time for 12 Hour(s)

  • Instant restore: Retain instant recovery snapshot(s) for 7 day(s)

  • Retention of daily backup point: Retain backup taken every day for 30 Day(s)

  • Retention of monthly backup point: Retain last backup taken every month on 1 for 6 Month(s)

  • Backup type: Full backup

  • Backup frequency: Every 6 hour(s) starting 6:00 AM GTB Standard Time for 12 Hour(s)

  • Instant restore: Retain instant recovery snapshot(s) for 7 day(s)

  • Retention of daily backup point: Retain backup taken every day for 30 Day(s)

  • Retention of monthly backup point: Retain last backup taken every month on First Sunday for 6 Month(s)

Daily0500Retain30

  • Backup type: Full backup

  • Backup frequency: Daily at 6:00 AM GTB Standard Time

  • Retention of daily backup point: Retain backup taken every day at 6:00 AM for 30 Day(s)

  • Backup type: Full backup

  • Backup frequency: Daily at 5:00 AM Pacific Standard Time

  • Retention of daily backup point: Retain backup taken every day at 5:00 AM for 30 Day(s)

Azure SQL Managed Instance (SQL Databases)

Backup Settings

Backup Policies

Policy

EU / US

Default Short-term (STR) Backup Policy

  • Full backups: Every week

  • Differential backups: Every 12 hours

  • Transaction log backups: Every ~10 minutes

  • Short-term Retention: 35 days (Supports point-in-time restore within that retention period)

Long-term (LTR) Backup Policy #1

  • Keep weekly full backups for three (3) months

  • Keep the first full backup of each month for six (6) months

Long-term (LTR) Backup Policy #2

  • Keep the first full backup of each month for six (6) months

2.7 Patch Management

3. Application Security


3.1 Secure Code Development (SDLC)

The Security effort that is applied during SDLC in our platform, according to our development phases (e.g. Analysis, Implementation, and Testing phase) is as follows:

  1. Analysis Phase

    1. Identify Security Requirements & Security User Stories

    2. Review Security Design & Architecture

    3. Identify Threats (Threat Modeling)

  2. Implementation Phase

    1. Use secure coding practices, input validation, and output encoding.

    2. Analyze source code before compiling to validate the use of secure coding policies (SAST).

    3. Conduct manual reviews of all relevant code on a line-by-line basis to validate the use of secure coding policies and/or identify security vulnerabilities (Secure Code Review).

    4. Manage the Security Risk of Using Third-Party Components (Dependency Analysis).

  3. Testing Phase

    1. Perform Manual Security Testing to test security of fully integrated and running code and uncover vulnerabilities.

    2. Perform Automated Security Testing & Fuzzing to test security of fully integrated and running code and uncover vulnerabilities.

3.2 Framework Security Controls

interworks leverages modern and secure open-source frameworks with security controls to limit exposure to OWASP Top 10 security risks. These inherent controls reduce our exposure to SQL Injection (SQLi) and Cross Site Scripting (XSS), among others.

3.3 Quality Assurance

Our Quality Assurance (QA) department reviews and tests our code base. Dedicated application security engineers on staff identify, test, and triage security vulnerabilities in code.

3.4 Separate Environments

The testing and staging environments are separated from the production environment on a logical level, and no service data is used in our development or test environments.

3.5 Bug Bounty Program

If a user has discovered a security vulnerability, we encourage them to get in touch with us immediately. Their disclosure will help us address the issue promptly and ensure the safety of our users and data. For more information regarding Bug Bounty Program, please visit this page: https://interworks.cloud/hall-of-fame/

4. HR Security


4.1 Training

All employees complete Security and Awareness training annually and during onboarding.

4.2 Policies

interworks has developed a comprehensive set of security policies that are updated frequently and communicated to all employees.

4.3 Confidentiality

All employee contracts include a confidentiality agreement.

5. Data Privacy & Ownership


5.1 GDPR Compliance

All of the above mentioned sections participate in safeguarding the privacy and security of personal data within the interworks.cloud Platform. If after reviweing the above the customer has SPECIFIC questions on GDPR coverage, then he may proceed with sending them to the Risk & Comliance Department at dpo@interworks.cloud.

5.2 PCI Compliance

Our platform is not required to be PCI compliant because we neither store nor submit credit card information (e.g., credit card number, security code, name, expiration date).

5.3 Data Ownership

Customer has full and exclusive ownership of any data (customer records, orders, invoices, payments, etc.) stored in our Platform SQL tables. As per our Data Processing Agreement (available upon request for customer’s review), the Platform customer is the “Data Controller“ and interworks.cloud Ltd. or IWCP, LLC are the “Data Processors“.

5.4 Upon Termination

We are obliged to delete all Platform Customer data within 30 calendar days of cancellation order, but not earlier than 7 calendar days following the cancellation order. Platform Customers must take all precautions and measures for adequately backing up their data before being deleted.

5.5 Security Audits

The following documents may help in assessing interworks.cloud's security posture with respect to its Platform service:

Furthermore, bespoke customer surveys or questionnaires may be answered upon mutual agreement on the scope and potential additional cost of answering them (NDA required).