# Signify V10 Security FAQs

**<span style="font-size: 11.0pt; mso-fareast-language: EN-US;">Service Organisation Control Maturity</span>**

**<span style="font-size: 11.0pt; mso-fareast-language: EN-US;">Question:</span>**

- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Is the solution provided part of a valid ISO 27001 certification? If so, please provide a valid ISO/IEC 27001 certificate with the corresponding SOA - Statement of Applicability.</span>

> Yes. Awaiting certificate from BSI. External Audit completed 4 Dec 2024.
> 
> Link to SOA: [F60\_Statement of Applicability.xlsx](https://signifysoftware365.sharepoint.com/:x:/s/QMS/ERGEoOV-UXpChAzXvf_UYSoBshOOXr5N0Nwyp3k6Ni4low?e=03jGXv)

- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Has the solution provided been audited following SOC 2 standards (e.g., SSAE 16; ISAE 3402) type II within the last year? If so, please provide a valid SOC 2 Type II report covering the solution in scope (following SSAE 16 / ISAE 3402 audit standards).</span>

> No

**<span style="font-size: 11.0pt; mso-fareast-language: EN-US;">Hosting Environment Control Maturity</span>**

**<span style="font-size: 11.0pt; mso-fareast-language: EN-US;">Question:</span>**

- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Is the data center hosting environment storing Nestlé data ISO 27001 certified? If so, please provide the ISO 27001 certificate as well as the Statement of Applicability (same version as the one highlighted in the certificate).</span>

> <span style="font-size: 11pt; color: rgb(0, 0, 0);">Yes, we host with Teraco in Isando and their ISO documentation is available on their website: [Certifications and Compliance • Teraco](https://www.teraco.co.za/about/certifications-and-compliance/#iso)</span>

- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Has the data center hosting environment storing Nestlé data been audited following SOC 2 standards (e.g., SSAE 16; ISAE 3402) type II within the last year? If so, please provide the SOC 2 type II report.</span>

> <span style="font-size: 11pt; color: rgb(0, 0, 0);">Please refer to [Certifications and Compliance • Teraco](https://www.teraco.co.za/about/certifications-and-compliance/#isae-3402)</span>

**<span style="font-size: 11.0pt; mso-fareast-language: EN-US;">Penetration Test Report</span>**

**<span style="font-size: 11.0pt; mso-fareast-language: EN-US;">Question:</span>**

- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Has an independent third party performed a Penetration Test covering the solution to be provided? </span><span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">If yes, please provide either:</span>
    - <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">The executive summary report created by the third party tester.</span>
    - <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">The full penetration test report created by the third party tester.</span>
- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Has the penetration test been performed within the last 12 months? If no, please provide the date when the penetration test was performed.</span>
- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Have all services (e.g., Web, Mobile, API, Infrastructure, etc.) part of the solution provided been covered within the Penetration Test scope? If no, please clarify.</span>
- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Please refer to and complete the "8.1. PenTest Minimum Scope" sheet.</span>
- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Were the penetration tester(s) accredited with industry-recognized security credentials such as: GWAPT, GPEN, OSCP, LPT, ECSA, CPT, or CEH?</span>
- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Have the penetration testers found any vulnerabilities? If yes, please provide the severities based on the OWASP Risk Rating Methodology and remediation plan dates for each of them.</span>
- <span style="font-size: 11.0pt; mso-fareast-font-family: 'Times New Roman'; mso-fareast-language: EN-US;">Have the penetration testers followed one of the two following industry standard methodologies: OWASP and OSSTMM? If no, please clarify.</span>

> <span style="font-size: 11pt; color: rgb(0, 0, 0);">Penetration tests on app, mobile and network is done once a year. OWASP principles are followed. Reports can be requested from Manco. File location (not open to all): [Pen Test Results](https://signifysoftware365.sharepoint.com/:f:/s/QMS/ElFZeW86b9BFhoEOt_x3CP0BrmVpcL2D46_3tScCmJgbUg?e=ZFfctM)</span>

**Encryption of Data Over Private Networks**

**Question:**

- <span style="mso-fareast-font-family: 'Times New Roman';">Is the solution customer data at rest within your or your hosting provider's private network encrypted? If yes, please provide details of the encryption scope and encryption algorithm used.</span>
    - <span style="mso-fareast-font-family: 'Times New Roman';">Note: Data at rest refers to all data in computer storage (e.g., hard drives, backup tapes, databases, mobile devices, file systems, etc.).</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, from 2025 we encrypt the data at rest within our SQL Server 2019 databases using SQLs always encrypted configuration with deterministic encryption. The encryption makes use of the **AEAD\_AES\_256\_CBC\_HMAC\_SHA\_256** algorithm.</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Is the solution customer data transmitted within your or your hosting provider's private network encrypted? If yes, please provide details on the encryption scope and encryption algorithm used.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">The system runs within a Kubernetes cluster where the nodes are protected behind an Istio load balancer. Due to the private setup the traffic between the nodes does not move over the private network of the hosting provided but internally within the cluster.</span>
> 
> <span style="mso-fareast-font-family: 'Times New Roman';">The data transferred from the client to the enclosed server is encrypted using SSL certificate. The client and server is encryption scope include the SSL handshake and secure communication between the client and server. The encryption use is PKCS #1 SHA-256 With RSA Encryption.</span>

**Identity, Entitlement, and Access Management**

**Question:**

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the solution technically enforce a password length of a minimum of 16 characters for the Privileged (Admin) User Accounts? If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, it can be configured. The password enforcement can be configured per client for the users accessing the system. One configuration is available that is share for all users administrators and general users</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the solution technically enforce a password length of a minimum of 10 characters for the standard End User Accounts? If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, it can be configured. The password enforcement can be configured per client for the users accessing the system. One configuration is available that is share for all users administrators and general users</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the solution technically enforce password change at a minimum of 90 days? If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">The password expiry days can be adjusted per client and is 60 days by default.</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Is the solution configured to allow a maximum of 5 failed login attempts before the account gets locked out/wiped? If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, the maximum failed login attempts is 10 by default and can be customised per client</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the solution technically enforce password history control to a minimum of 8 passwords? (e.g., How many unique new passwords a user must use before an old password can be reused?) If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, the number of password that can be used is customisable and 5 passwords by default</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the solution technically enforce idle session timeout of a maximum of 15 minutes? (e.g., After a maximum of 15 minutes of idle time, the user's session will be terminated/required to log back in?) If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">No, the default for the system is an access token lifetime of 100 minutes that is refreshed up to 5 times before the session expires. This is customisable per system.</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the solution technically enforce at least three of the following password complexity requirements?</span>
    - <span style="mso-fareast-font-family: 'Times New Roman';">Uppercase characters (A to Z)</span>
    - <span style="mso-fareast-font-family: 'Times New Roman';">Lowercase characters (a to z)</span>
    - <span style="mso-fareast-font-family: 'Times New Roman';">Digits (0 to 9)</span>
    - <span style="mso-fareast-font-family: 'Times New Roman';">Special characters ([~!@#$%^&amp;\*\_-+=`|\\(){}\[\]:;"'&lt;&gt;,.?/](mailto:~!@#%24%%5E&*_-+=%60%7C%5C()%7B%7D%5B%5D:;%22'<>,.?/)etc.)</span>
- <span style="mso-fareast-font-family: 'Times New Roman';">If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes.</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Are credentials stored at rest encrypted by using a one-way hashing algorithm (SHA-256, equivalent, or higher security) together with a salt?</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Are credentials in transit encrypted? (e.g., not transmitted in clear text)</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the solution offer audit and reporting capabilities regarding user management and modification of access permissions?</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Does the system support Single-Sign-On (SSO) using Identity and Access management standard protocols? (e.g., SAML, OAuth, OpenID Connect) If no, please provide details on the configuration.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, OpenID Connect</span>

**Logging/Tools**

**Question:**

- <span style="mso-fareast-font-family: 'Times New Roman';">Do you log any administrative and configuration changes to the Services?</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, as part of the server deployment</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Is physical and logical user access to audit logs restricted to authorized personnel?</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Are audit logs centrally stored and retained? If so, please provide details on the retention policy.</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, stored actively for up to 6 month, after which it is retained in cold storage accessible on request</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Are the retained logs sufficient to permit forensic analysis on security events?</span>

> <span style="mso-fareast-font-family: 'Times New Roman';">Yes, giving insight on who viewed user personal information and changed data</span>

- <span style="mso-fareast-font-family: 'Times New Roman';">Are there any tools in place to continuously monitor, detect, and prevent intrusion/attacks to the solution (IDS, IPS, WAF, etc.)? If yes, please share what tools exactly.</span>

> <span data-teams="true">Yes, Fortigate Firewall is used for IPS and AV</span>