We understand and abide by the CivicActions Employee/Contractor Security Policy. In particular:
- We practice Server & Site Security
- using only sanitized databases
- taking care to not install restricted access files on development or personal instances outsite the project defined security boundary
- and scrubbing unneeded data from our development systems
We enhance our Security Awareness with Tools by:
- Securing our Laptops
- Using Password Management Tools
- Using Multi-Factor Authentication
- Increasing our awareness of Phishing and Social Engineering
- Keeping our Personal Systems up-to-date
- Employing Disk Encryption and Secure Storage Management
- We perform a yearly review of the CivicActions Employee/Contractor SecurityPolicy
- We train all our employees and contractors in PII Awareness
- We minimize custom code, always preferring to use community maintained modules and contribute patches when needed
- When necessary for new functionality, we strive to create generic modules and contribute them to the parent project
- Custom code must:
- have an associated Jira (or other ticketing system) ticket
- include testing mechanisms, ideally hooked into the continuous integration pipeline
- conform to coding standards (use static code analysis where possible (such as DCQ)
- undergo security peer review
- We write Secure Code in Drupal 7
- We understand Security in Drupal 8
- Note that alpha, beta and rc versions are not considered stable and not subject to security team support. In my experience in many cases it is preferable to run a dev than alpha/beta releases where there has been significant number of bug fixes done, and the security profile is identical.
- Each dev release is tied to a specific git commit which is tracked in our repository, and that commit is just as unchangeable as an alpha or beta release (all the latter has is a human readable label for the commit).
- We periodically audit sites to determine if the set of enabled modules are all still in use on the site.
- We ensure that access to documents/sites/dashboards is limited to those that should have access.
- This includes our Google Docs!
- We ensure that users with enhanced privileges (to sites and/or servers)
- must use TFA for authentication/authorization
- are appropriately adjusted upon separation from CivicActions.
-
We use Nagios, Cloudwatch, StatusCake and OpsGenie
-
We implement log analysis procedures that enable better/more timely capture of system anomalies.
-
@todo: elk-in-docker (internal link - fix...)
-
We implement automated security scanning of the OS. See:
-
We have a default CivicActions Incident Response Plan:
-
We ensure that at least one member of the Infrastructure Support Team (currently Owen, Fen, David, Josh, Karen and Marc) has access to the Internet at all times.
-
We train new employees and perform yearly quizzes of exiting employees on the IRP procedures.
-
Each project can extend or replace the default IRP.
-
@todo: GlobalNET Incident Response Plan (internal link - fix...)