Our Holistic Security Approach
In order to reduce security risks to minimum, a
holistic approach to security is required. Our security processes are born
out of a clear definition of the threats to our system.
Security threats are a result of the various
interaction points that an application provides to the external world, and
the various users that can interact with these interfaces. For instance Your
Customers, Your Resellers, Your staff, Our Staff, Anonymous Internet Users
and Third Party Servers are interacting with our Systems at any given point
of time. Each of these actors need to have different access levels and
different rights and permissions.
Security Goals
Privacy -
Information within our infrastructure and systems will only be accessible by
authorized users
Integrity - Data and
information within our infrastructure cannot be tampered with by any
unauthorized user
Data Protection - Data
within the systems cannot be harmed, deleted or destroyed
Identification and
Authentication - Ensures that any user of the system is who he
claims to be and eliminates chances of impersonation
Network Service Protection
- Ensures that networking equipment is protected from malicious hacking
attempts or attacks that threaten uptime
Our Holistic Security Model
Our Security platform and process
leverage on multiple levels of security - consisting of Security Systems
and Equipment1 combined with Security Procedures
and Practices2 and Auditing Processes3,
to ensure unparalleled security for all the services we
provide. The platform tackles security at 7 different levels
Our global datacenter partnerships are a result of a
comprehensive Due diligence process. Security and stability are
two of the most important variables in our due diligence process.
All datacenters are equipped with surveillance
cameras, biometric locks, authorization-based access policies,
limited datacenter access, security personnel, and
similar standard security equipment, processes and operations. What
separates us however is the fact that our due
diligence process also incorporates a measure of proactiveness
demonstrated by the datacenter towards security.
This is measured by evaluating past practices, customer case
studies, and the amount of time the datacenter dedicates
towards security research and study.
Our global infrastructure deployments incorporate DDOS
mitigators,
Intrusion Detection systems, and Firewalls both at the edge and the
Rack level. Our deployments have weathered frequent hacking
and DDOS
attempts (sometimes as many as 3 in a single day) without any
degradation.
Protection against
Distributed Denial-of-Service (DDoS) Attacks Denial
of Service is currently the top source of financial loss due to
cybercrime. The goal of a Denial-of-Service attack is to
disrupt your
business activities by stopping the operation of your web site,
email
or web applications. This is achieved by attacking the servers or
network that host these services and overloading the key
resources such
as bandwidth, CPU and memory. The typical motives behind such
attacks
are extortion, bragging rights, political statements, damaging
competition etc. Virtually any organization that connects to
the
Internet is vulnerable to these attacks. The business impact of
large
sustained DoS attacks is colossal, as it would lead to lost profits,
customer dissatisfaction, productivity loss etc due to
inavailability
or deterioration of service. A DoS attack in most cases would even
land
you with the largest bandwidth overage invoice that you have ever
seen.
Our Distributed Denial-of-Service protection
system provides
unrivaled protection against DoS and DDoS attacks on your
internet-facing infrastructures i.e. your websites, email
and mission
critical web applications, by using sophisticated state-of-the-art
technology which automatically triggers itself as soon as an
attack is
launched. The DDoS mitigator's filtering system blocks almost all
fraudulent traffic and ensures that legitimate traffic is
allowed up to
the largest extent possible. These systems have seamlessly protected
several web sites from large service outages caused by
simultaneous
attacks as large as 300+ Mbps in the past, thus allowing
organizations
to focus on their Business.
Firewall Protection
Our round-the-clock firewall
protection system secures the perimeter
and delivers the very best first line of defense. It uses highly
adaptive and advanced inspection technology to safeguard
your data,
website, email and web applications by blocking unauthorized network
access. It ensures controlled connectivity between the
servers that
store your data and the Internet through the enforcement of security
policies devised by subject matter experts.
Network Intrusion Detection
system
Our network intrusion detection, prevention and vulnerability
management system provides rapid, accurate and comprehensive
protection
against targeted attacks, traffic anomalies, "unknown" worms,
spyware/adware, network viruses, rogue applications and
other zero-day
exploits. It uses ultramodern high-performance network processors
that
carry out thousands of checks on each packet flow simultaneously
with
no perceivable increase in latency. As packets pass through our
systems, they are fully scrutinized to determine whether
they are
legitimate or harmful. This method of instantaneous protection is
the
most effective mechanism of ensuring that harmful attacks do not
reach
their targets.
Hardware Standardization
We have standardized on hardware vendors that have a
track record of
high security standards and quality support. Most of our
infrastructure
and datacenter partners use equipment from Cisco, Juniper, HP, Dell
etc.
Host Based Intrusion Detection
System
With the advent of tools that are able to bypass port blocking
perimeter defense systems such as firewalls, it is now
essential for
enterprises to deploy Host-based Intrusion Detection System (HIDS)
which focuses on monitoring and analyising the internals of
a computing
system. Our Host-based Intrusion Detection System assists in
detecting
and pinpointing changes to the system and configuration files -
whether
by accident, from malicious tampering, or external intrusion - using
heuristic scanners, host log information, and by monitoring
system
activity. Rapid discovery of changes decreases risk of potential
damage, and also reduces troubleshooting and recovery times,
thus
decreasing overall impact and improving security and system
availability.
Our
applications run on myriad systems with myriad server
software.
Operating Systems include various flavors of Linux, BSD, Windows.
Server Software includes versions and flavors of Apache,
IIS, Resin,
Tomcat, Postgres, MySQL, MSSQL, Qmail, Sendmail, Proftpd etc etc.
We ensure security despite the diverse portfolio of software
products we utilize by following a process-oriented
approach
Timely Application of
Updates, Bug Fixes and Security Patches All
servers are registered for automatic updates to ensure that they
always
have the latest security patch installed and that any new
vulnerabilities are rectified as soon as possible. The
largest number
of intrusions result from exploitation of known vulnerabilities,
configuration errors, or virus attacks where countermeasures
ARE
already available. According to CERT, systems and networks are
impacted
by these events as they have "not consistently" deployed the patches
that were released.
We fully understand the
requirement for strong patch and update
management processes. As operating systems and server software get
more
complex, each newer release is littered with security holes.
Information and updates for new security threats are
released on an
almost daily basis. We have built consistent, repeatable processes
and
a reliable auditing and reporting framework which ensures that all
our
systems are always up-to-date.
Periodic Security
Scans Frequent checks are run
using enterprise grade security software to determine if any servers
have any known vulnerabilities. The servers are scanned
against the
most comprehensive and up-to-date databases of known
vulnerabilities.
This enables us to proactively protect our servers from attacks and
ensure business continuity by identifying security holes or
vulnerabilities before an attack occurs.
Pre-Upgrade
testing processes Software upgrades are
released frequently by various software vendors. while each vendor
follows their own testing procedures prior to release of any
upgrade,
they cannot test inter-operability issues between various software.
For
instance a new release of a database may be tested by the Database
vendor. However the impact of deploying this release on a
production
system running various other FTP, Mail, Web Server software cannot
be
directly determined. Our system administration team documents the
impact analysis of various software upgrades and if any of
them are
perceived to have a high-risk, they are first beta-tested in our
labs
before live deployment.
All
of the application software that is used in the platform is
built by
us. We do not outsource development. Any 3rd party Products or
Components go through comprehensive training and testing
procedures
where all elements of such products are broken down and knowledge
about
their architecture and implementation is transferred to our team.
This
allows us to completely control all variables involved in any
particular Product. All applications are engineered using
our
proprietary Product Engineering Process which follows a proactive
approach towards security. Each application is broken down
into various
components such as User Interface, Core API, Backend Database etc.
Each
layer of abstraction has its own security checks, despite the
security
checks performed by a higher abstraction layer. All sensitive data
is
stored in an encrypted format. Our engineering and development
practices ensure the highest level of security with regards
to all
application software
The
weakest link in the security chain is always the people you
trust.
Personnel, Development staff, Vendors, essentially anyone that has
privileged access to your system. Our Holistic Security
Approach attempts to minimize security risk brought
on by the "Human
Factor". Information is divulged only on a "need-to-know" basis.
Authorization expires upon the expiry of the requirement.
Personnel are
coached specifically in security measures and the criticality of
observing them.
Every employee that has
administrator privileges to any of our
servers goes through a comprehensive background check. Companies
that
skip out on this are putting to risk all sensitive and important
data
belonging to their customers, as no matter how much money is
invested
into high-end security solutions, one wrong hire - having the right
amount of access - can cause greater damage than any
external attack.
In a vast deployment of globally distributed servers, audit
processes
are required to ensure process replication and discipline. Are all
servers being patched regularly? Are the backup scripts
running all the
time? Are offsite backups being rotated as desired? Are appropriate
reference checks being performed on all personnel? Is the
security
equipment sending out timely alerts? These and many such questions
are
regularly verified in an out-of-band process that involves
investigation, surveys, ethical hacking attempts, interviews
etc. Our
audit mechanisms alert us to a kink in our security processes before
it
is discovered by external users.
|