Skip to main content

Tech Matrix

 

General security requirements

RequirementsYes, No, N/AComment from Leasify
General security requirements
Do you have a specific contact person for all security related issues and escalations in relation to Customer data?YesClaes Ivarsson is our single contact for the application issues.
Have all personnel with access to Customer data signed an NDA?YesVia company policy and employment agreement
Are you certified to any relevant security standard (e.g.  SS-ISO/IEC 27000)? What context have been certified?No 
Have you been subject to any investigations by data protection authorities the last three years? If yes, specify.No 
Do you have an internal data protection and security handbook/ policy for your employees? Yes 
Do you regularly provide training to staff on data processing obligations, identification of breaches and risks?YesOur team is continuously working with these issues.
Do you have cyber security/data protection insurance coverage?Yes 
Do you have an audit trail of the processing of Customer data (who, what, when, why) and access logs to all Customer data and applications and do you monitor the audit trail for suspicious or disallowed behaviour? Partitial not all data, only essential, eg contracts, reports.We are working on extending logs and audits.
How long do you store log data? 12 months
 Process and logging requirements  
Do you have a process for returning or permanently destroying Customer data? If yes, please describe.NoWe have a manual process step/checklist for deleting customer data after requests.
Do you have an incident management and notification process in place for the services provided to the Customer? If yes, please describeYesWe have a status monitoring for customer access and support via email/phone.
Do you have a vulnerability and patch management process in place for all components used to provide the service to Customer? If yes, please describeNoWe make use of Githubs component check (vulnerable dependencies and security checks) and reports. And we continuously upgrades any external package used in our application via composer.
Do you have measures in place to maintain the capability to proactively prevent, monitor, detect, investigate, and respond to IT security and privacy incidents associated with Customer data?Yes 
How often do you regularly test the security and effectiveness of your security and privacy controls?1/yearPen-tests planned to spring 2023
Do you have documented and tested backup and restore processes to ensure Customer data can be restored?YesServices via Cloudnet concept.
Are your backups encrypted and protected from tampering with secure cryptographic algorithms and key lifecycle management? Describe the solution and the key management process.YesAll access to backup is stored via SSH-key access and logged by Cloudnet.
Are you able to protect Customer data from unauthorized access in all phases of the information lifecycle, including but not limited to service test, deployment, incident processing and disposal?YesWe have this issue as an ongoing and continuous work forward, doing our best.
Have you ensured physical security on premises including policy for personnel to manage information and data in locked-away and secure facilities?YesNo physical access to servers possible.
Do you have a process for secure data disposal?NoWe do not use our own physical hardware for the SaaS-service. But the developers computers are stored and cleared out in the service program.
Are you able to, in a timely manner, apply decommissioning and secure wiping of old software, hardware and deployments?YesAll our software and code is version controlled and under continuous delivery / management.
Do you have real-time protection against intrusion and malware installed in infrastructure and on all hosts? If yes, please describe which type of controls are deployed.YesWe have WAF and DDOS monitoring via CloudFlare.
Do you apply encryption of all managed or unmanaged devices that can access or store Customer data, ensuring appropriate protection of the encryption/decryption keys?Yes 
Do you apply encryption of personal data or data by Customer classified as sensitive in transit by using suitable encryption solutions (e.g. TLS 1.2+ and IPsec VPN, SSH2+ or PGP), using only best practice configurations and key management?YesThis is an ongoing work daily to get the data more safe and encrypted.
Have you implemented a versioned secure configuration (hardened) on all devices?YesCloudnet provides all active servers with their concept.
Do you support the use and enforcement of multi-factor authentication for accessing Customer data if requested?YesCustomers can activate 2FA on their accounts and make use of SSO if wanted.
Do you have sufficient DDoS protection to ensure service availability?YesWe use third party Cloudflare to protect us from DDOS attacks.
Is your service developed in a manner enabling you to follow a good practice model e.g. OWASP Top 10?PartialThis is a continuous work forward. But we do not follow everything in 100%, really hard to get full OWASP-coverage.
Do all users have personal accounts? If not, specify which accounts are shared/anonymous and not personal.Yes 
Do you have measures in place where access to Customer data must be granted only based on relevant needs and revoked when not used?YesPartitial and continuously increased after need.
Do you have a policy for strong, unique passwords of sufficient complexity and regular expiry on all devices, along with password management guidelines for all staff?YesIt’s a balance of usability and security.
The best is 2FA forced to all users in a company.
We have custom level of password settings/req.
Are shared authentication secrets (keys, passwords etc) protected from unauthorised use and is any use of them fully audited?YesWe store all pass and keys encrypted and locked from external access. And it is an audited access.
Is the location where Customer data is stored equipped with appropriate physical security controls? Please comment. Yes
  • Access to the data center floor is restricted to data center employees and authorized visitors.
  • Data Centers are staffed 24/7/365 with security guards and technicians.
  • All employees and visitors are identified using biometrics and state issued Ids before entering the facility.
  • HVAC and power have redundant systems, so if one goes out, the others keep our systems powered and within operating temperature.
  • All of the systems are segregated from other tenants by locking cabinets. Only datacenter staff assigned to supporting the systems have access to the keys.
  • Multiple Internet carriers using independent fiber connections to the data center floor.
  • Our networks within the data centers have redundant routers, switches, and service providers. Multiple systems can fail without affecting downtime or performance.
 
Are your servers used for Customer data located in, and only accessible from, EU/EES? If not please specify locations and legal ground for transfer. Yes 
Do you have a disaster recovery plan for services provided to Customer that are in accordance with best industry practice and regularly updated? Yes Automatic backups and "fire" practice evert Q.
Do you engage sub-processors for the service provided to Customer? If yes, please list identity and location of all sub-processors. YesWe use:·       Cloudnet servers for hosting and database storage with backup.·       AWS North-1 for S3 long term data storage (prim documents)·       AWS Ireland for OCR-scanning with Textract (will move to Sweden as soon as available)
Have you executed data processing agreements covering GDPR requirements for all sub-processors involved in the services? YesWe hope so but following the latest Schrems II –act it is somewhat impossible. More to come in this area...
Have you ensured that all sub-processors a)      process Customer data in line with legal requirements?b)      only process Customer data to the extent necessary to fulfil the contract between you and Customer?c)      have established technical and organizational measures at least as strict as the obligations between you and Customer? d)      have implemented measures to maintain the retention times for Customer data?e)      have established incident/ disaster recovery plans regarding Customer data?f)       will, on Customer request, return or destroy any Customer data?Yes