Item |
Server |
Client (Workstation) |
Maturity Level |
Application Control
|
Application control is key to the hardening of the server instances as per our ISO27001/17 certified ISMS.
We completely control the use of applications on our server instances.
|
All workstations within our operations zone, that have access to our cloud services are protected as per our ISO27001/17 certified ISMS.
This includes restriction of all code that can execute instructions, no matter how delivered to the client. Including operating system drivers.
This is reviewed as part of our ISMS security review processes.
All client machines are monitored.
|
3
|
Patch Applications
|
As per our ISO27001/17 based ISMS, all applications are patched as patches become available within 24 hours.
Vulnerability scanning is continuous as per our ISMS monitoring/testing.
|
All workstations within our production zone, that have access to our cloud services are protected as per our ISO27001/17 based ISMS.
All operating system and application critical patches are applied within 24 hours.
All client machines are constantly scanned for vulnerabilities.
All unused applications are removed.
|
3
|
Microsoft Office Macro Settings
|
No Microsoft Office products are used on services instances.
|
Microsoft office applications are not installed on clients within the operations zone.
|
3
|
User Application Hardening
|
No browser on servers.
Old operating system frameworks are disabled or removed.
Only the CRO can alter user settings.
Powershell disabled.
|
Browsers do not enable Java based applications.
Only the Brave browser is used with Ad blocking enabled. All other browsers are removed.
Microsoft Office is not installed.
PDF Software is run in isolation.
Old operating system frameworks are disabled or removed.
Only the CRO can alter user settings.
Powershell disabled.
|
3
|
Restrict Administrative Privileges
|
Tightly managed as per ISMS and association operations manual.
|
All administrative privileges managed by the CRO.
|
3
|
Patch Operating Systems
|
All server instances are constantly monitored for patch updates and applied.
|
All client instances are constantly monitored for patch updates and applied within 24 hours.
|
3
|
Multi-factor Authentication
|
All user access is authenticated using perfect forward security, MFA/TOTP and IP restrictions.
|
All user access is authenticated using perfect forward security, MFA/TOTP and IP restrictions.
|
3
|
Daily Backups
|
Constantly backed up.
|
Use standard image.
All key data stored in the cloud.
|
3
|