V10 Client FAQ
Encryption of Data Over Private Networks
Question:
- Is the solution customer data at rest within your or your hosting provider's private network encrypted? If yes, please provide details of the encryption scope and encryption algorithm used.
- Note: Data at rest refers to all data in computer storage (e.g., hard drives, backup tapes, databases, mobile devices, file systems, etc.).
Identity, Entitlement, and Access Management
Question:
- Does the solution technically enforce a password length of a minimum of 16 characters for the Privileged (Admin) User Accounts? If no, please provide details on the configuration.
- Does the solution technically enforce a password length of a minimum of 10 characters for the standard End User Accounts? If no, please provide details on the configuration.
- Does the solution technically enforce password change at a minimum of 90 days? If no, please provide details on the configuration.
- Is the solution configured to allow a maximum of 5 failed login attempts before the account gets locked out/wiped? If no, please provide details on the configuration.
- Does the solution technically enforce password history control to a minimum of 8 passwords? (e.g., How many unique new passwords a user must use before an old password can be reused?) If no, please provide details on the configuration.
- Does the solution technically enforce idle session timeout of a maximum of 15 minutes? (e.g., After a maximum of 15 minutes of idle time, the user's session will be terminated/required to log back in?) If no, please provide details on the configuration.
- Does the solution technically enforce at least three of the following password complexity requirements?
- Uppercase characters (A to Z)
- Lowercase characters (a to z)
- Digits (0 to 9)
- Special characters (~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/ etc.)
- If no, please provide details on the configuration.
Logging/Tools
Question:
- Do you log any administrative and configuration changes to the Services?
- Is physical and logical user access to audit logs restricted to authorized personnel?
- Are audit logs centrally stored and retained? If so, please provide details on the retention policy.
- Are the retained logs sufficient to permit forensic analysis on security events?
- Are there any tools in place to continuously monitor, detect, and prevent intrusion/attacks to the solution (IDS, IPS, WAF, etc.)? If yes, please share what tools exactly.