Security was one of the core requirements during the design and initial development of CPR
Security was one of the core requirements during the design and initial development of CPR.
This page covers the publicly releasable security facts and features about the product.
RBAC and need to know
On the server-side we have implemented Role Based Access Control (RBAC) which means that administration accounts (those adding other users to the system) and managing the server have no access to the cases or incidents.
In addition we use a complete ‘Need-to-Know’ concept within the application so a user that can create an incident file, gets to choose who assists them on that incident. Only those included in the incident can see it listed or can search for it. Those removed from an incident lose all access to all CPR hosted data instantly.
We implemented this because in many cases even knowledge of the incident can result in reputational damage.
We use TLS for the encryption between the client browser and the server with the option for an organisation to be able to add their own certificate.
2 factor authentication
Two Factor authentication (with Google Auth) is available on all accounts and can be used to provide peace of mind about session control. Want to know more about the importance of Two Factor Authentication? Find out here in our 2-min read.
We allow users to have multiple sessions open but there is a nag pop-up to remind you on each page that you have multiple sessions open.
This ensures you don’t forget and also alerts users if another person logged into their account.
As you can see in the screenshot, the option to log out of the other session is easily presented.
Encryption of data
Server side we encrypt all evidence uploaded using SAH256 with individual per-evidence item keys, and all evidence files are moved to read-only directories to prevent deletion.
Evidence and notes put into CPR are immutable (not deletable) to prevent accidental or deliberate removal of evidence; if items are uploaded in error, they can be made private so only the uploading user can see them. This provides evidence integrity but overcomes issues surrounding uploading the wrong evidence to a case.
Users access the system via a browser (we prefer Chrome and Firefox over Safari or IE/Edge), and all activities are contained in the application. This means that most modern OS’s are compatible with the tool, and even mobile devices can log in and use all the features of CPR – although the screen may be a little small.
Files can be uploaded and downloaded from the application and through clever coding and chunking of data, we can accept up to several TB of data upload as evidence. The advantage of this is that large server logs can easily be moved securely to the evidence vault via the TLS session.
This is important when dealing with Personal data, Financial data or other regulated data as things like SMB file shares as they are generally not secure in transit (they are not encrypted by default).
Inside each incident there is a chat feature. This allows incident team members to chat and exchange snippets of found code or command output securely and in a permanent way; all chats are stored with the incident and are also ‘Need-to-Know’.
Trick no Treat
5 scary ways a hacker tries to trick you! 1. You’ve won! We’re all savvy to the Prince from a far off land who wants to share his wealth with us, or the long-lost relative
October is Cyber Security Awareness Month!
Bringing Cyber Security to the forefront. With ransomware attacks taking place every 14 seconds and cyber crime projected to cost the world $10.5 trillion annually by 2025, cyber security is more important than ever, with
What is the purpose of an incident response plan?
“…And none of us had a playbook…there’s a thing they say; ‘Ok, this is happening now. Crack this open and it’s going to give you the playbook of how to deal with this.’ It wasn’t