A Billing Platform processes and stores sensitive data. Service providers Businesses expect that the data is treated in a secure manner with applicable levels of governance. Security is a critical and important component of the LogiSense offering. LogiSense provides a layered approach to security starting with strong password and account management. The LogiSense Billing portal can only be accessed via the secure HTTPS based protocol. Strict role based policies ensure that only authorized users can access sensitive customer data and logs. In addition to this, applicable governance and privacy regulatory requirements such as GDPR are met.
...
LogiSense uses a layered approach for Security by combining various methodologies to achieve the highest level of security without unduly impacting the user experience.
...
Layer | Description |
---|---|
Password |
Management | This encompasses the creation and enforcing of strong passwords, failed logon limits, password history, and account lockouts. |
Role Based Permissions |
Granular permissions can be configured through the admin portal which |
define applicable access control rights for login users |
Authentication of User Traffic | Encrypt (via SSL) and authenticate user traffic between the client browser and the |
web server hosting the Admin Portal. Prevent username and passwords from being sent in plain text across the internet. |
Firewall Protection |
Require all |
LogiSense system administration staff to VPN and authenticate with the network prior to accessing any parts of the |
infrastructure. |
Hosting Security
LogiSense provides two deployment models: on premise and private cloud. The on premise deployment is suited for customers who wish to host on their own infrastructure with their own security policies. The private cloud solution is hosted on the Amazon Web Services (AWS) hosting environment. The LogiSense hosting environment is SSAE16 and ISO/IEC 27001 compliant and offers extensive protection of data, guards against service interruptions along with LogiSense’s SOC 1 Type II certification.
Aspect | Description |
---|---|
Monitoring | Continual intrusion detection monitoring performed on infrastructure |
Architecture | Deployment architecture is provided in a segregated environment with layered physical security and authentication between each zone. |
Backups | All off-site database backups are encrypted |
Vulnerability | Monthly vulnerability scans are performed on infrastructure |
Penetration Testing | External and Internal Penetration Tests performed by 3rd party |
Training | Annual company wide security training and annual developer training in secure coding. |
PCI DSS | LogiSense maintains a PCI Level 1 compliance ensuring all system requirements, processes and procedures meet PCI requirements for credit card processing |
API Security
LogiSense provides REST API support for integration into CRM, self-care and other enterprise applications that require interface capability with back office systems. The REST API supports SSL based authentication. The API transactions require role based tokenized authentication and unauthorized access via the API will result in exceptions.
...
Encryption is performed where necessary in the platform to ensure that sensitive information is protected. One example is database password and non-tokenized payment information. Multiple options are provided for password security in the Admin Portal. Password parameters such as minimum password length and rules can be configured on a per role basis. Mechanisms are provided via the admin portal to reset passwords where necessary: for example, if a password times out of or expires.
LogiSense supports a client server architecture where the client web portal communicates with the backend server over the network. To ensure that the communications between client and server is authenticated and to support the privacy and integrity of the exchanged data, LogiSense enforces the HTTPS communications. HTTPS provides bidirectional encryption of communications between the LogiSense portal and Amazon hosted server, which protects against eavesdropping and tampering.
...