Teadmistebaas

Technical and organisational measures for data protection  Prindi artikkel

Technical and Organizational Measures In Accordance with Art. 32 GDPR and Amendments

I. Pseudonymisation and Encryption of Personal Data

Your credentials are stored in an encrypted industry highest standard hash format (BCRYPT). All data transfers are encrypted either using SSL/TLS or SSH protocols with the highest grade ciphers available. Access to payment credentials does not exist within our system. We do not store any credit card, cryptocurrency or other financial data on our servers and we use 3rd party PCI compliant companies to handle these payments.

II. Confidentiality

Datacenter

Our datacenter - Dataplex - is a Tier 4 facility which employs physical entry control systems with active accounting and logs, a high security perimeter fence, 24/7 armed guard security and surveillance cameras at all entry and exit points. Any access to the datacenter is strictly logged and accounted for by guards and using keycard security. The datacenter employs staff working in shifts 24/7 protecting the data and keeping the facility operational.

Access Control

During the deployment the deployed system passwords are saved in the database. All passwords must be reset by customers upon receiving the emails. All passwords can be reset by the Customer and will not be known to ServerAstra unless requested in order to login and offer support. Passwords must meet a minimum length entropy level and new passwords must be changed on a regular basis. While we do our best to prevent unauthorised access by applying security updates and preventive pen-testing regularly, the responsibility for access control is incumbent upon the Customer. We suggest using cryptographic keys based on elliptic curves or RSA keys with at least 4096 bit length instead of raw passwords. ServerAstra internal administration systems are protected with a secure cryptographic keyring and autogenerated high entropy passwords with strictly defined expiry time in case key setup is not available. We prevent unauthorised access by regularly applying security updates and keeping critical systems in an internal network, accessible only via VPN. No single employee holds a single access to all systems and the keyring system is secured and isolated up to the highest industry standards.

Transfer Control

Upon termination system drives are decommissioned to perform Secure Erase procedure which is either performed using the drives' SMART capabilities or using Multiple passes of random data pattern writing and reading for verification if Secure Erase is not available. The swiped (clean) drives are only allowed to be reused after thorough testing. Defective drives are degaussed and destroyed with a logged procedure to ensure compliance.

Isolation Control

ServerAstra internal administration system data is physically isolated from customer data and the networking is air-gapped and accessed only via a VPN.

Anonymization

The Customer is solely responsible for anonymization.

III. Integrity (Art. 32 Para.1 Clause B GDPR)

Data transfer control

In accordance with Art. 32 Para. 4 GDPR, all ServerAstra staff is trained and obliged to ensure that personal data is handled in accordance with data protection regulation. Customer data is deleted after termination of the contract in accordance with the law. All data transfers are encrypted either using SSL/TLS or SSH protocols with the highest grade ciphers available.

Data Entry Control

All data changes made by ServerAstra staff in internal administration systems are logged. All data changes made by Customer in administration systems are logged. For the dedicated servers, co-located servers, virtual dedicated systems and cloud systems the responsibility for input control is incumbent upon the Customer.

IV. Availability and Resilience (Art. 32 Para. 1 Clause B GDPR)

ServerAstra internal administration systems are continuously backed up and protected by using highest industry standards in security processes which include but are not limited to: encryption, LAN separation, firewalls, intrusion detection systems (IDS), web application firewalls (WAF), spam filters, active penetration testing (pen-test) and virus scanning. All of our internal systems are monitored internally via active logging system with agents and externally by a 3rd party uptime monitoring solution. Data resilience is enhanced by employing RAID or a zero single-point-of-failure (SPoF) clustering system.

Customer server backups are included as a courtesy, but data backups are incumbent upon the Customer. ServerAstra provides high-availability networking and electrical supply, uninterruptible power supply systems and an uptime SLA.

V. Procedures for Disaster Recovery (Art. 32 Para. 1 Clause C GDPR)

ServerAstra has employed a specific set of rules which directly mentions the responsible for recovery and the ones who need to be informed in the case of any sort of malfunction which results in service degradation or data loss. Beyond that ServerAstra implements automated disaster recovery simulation which ensures the vital systems can be up and running with minimal possible interruption.

VI. Procedures for Regular Testing, Assessment, and Evaluation (Art. 32 Para. 1 Clause D GDPR; Art. 25 Para. 1 GDPR)

ServerAstra staff are trained to react swiftly and effectively in the case of service degradation as part of the procedure for regular testing of our GDPR compliance. This includes training of data protection law and procedural and user guidelines for data processing on behalf of Customers with regard to the Customer's right of instruction.

Kas see vastus oli kasulik?

Seotud artiklid

SLA agreement
This document includes additional important provisions to the ServerAstra Terms of Service:...
Administrative Support
System Administration Administrative support is currently represented by the following options:...
List of Sub-Processors
List of Sub-processors Currently the Provider does not engage any sub-processor. Issued on:...