Security was one of the core requirements during the design and initial development of CPR
Security was one of the core requirements during the design and initial development of CPR.
This page covers the publicly releasable security facts and features about the product.
RBAC and need to know
On the server-side we have implemented Role Based Access Control (RBAC) which means that administration accounts (those adding other users to the system and managing the server have no access to the cases or incidents.
In addition we use a complete Need-to-Know concept within the application so a user that can make incidents gets to choose who assists them on that incident. Only those included in the incident can see it listed or can search for it. Those removed from an incident lose all access to all CPR hosted data instantly.
We implemented this because in many cases even knowledge of the incident can result in reputational damage.
We use TLS for the encryption between the client browser and the server with the option for an organisation to be able to add their own certificate.
2 factor authentication
Two Factor authentication (with Google Auth) is available on all accounts and can be used to provide peace of mind about session control.
We allow users to have multiple sessions open but there is a nag pop-up to remind you on each page that you have multiple sessions open.
This ensures you don’t forget and also would alerts users if another person logged into their account.
As you can see in the screenshot, the option to log out of the other session is easily presented.
Encryption of data
Server side we encrypt all evidence uploaded using SAH256 with individual per-evidence item keys, and all evidence files are moved to read only directories to prevent deletion.
Evidence and notes put into CPR is immutable (not deletable) to prevent accidental or deliberate removal of evidence; if items are uploaded in error, they can be made private so only the uploading user can see them. This provides evidence integrity but overcomes issues surrounding uploading the wrong evidence to a case.
Users access the system via a browser (we prefer Chrome and Firefox over Safari or IE/Edge), and all activities are contained in the application. This means that most modern OS’s are compatible with the tool, and even mobile devices can log in and use all the features of CPR – although the screen may be a little small.
Files can be uploaded and downloaded from the application and through clever coding and chunking of data, we can accept up to several TB of data upload as evidence. The advantage of this is that large server logs can easily be moved securely to the evidence vault via the TLS session.
This is important when dealing with Personal data, Financial data or other regulated data as things like SMB file shares as they are generally not secure in transit (they are not encrypted by default).
Inside each incident there is a chat feature. This allows incident team members to chat and exchange snippets of found code or command output securely and in a permanent way; all chats are stored with the incident and are also Need-to-Know.
Cyber Security – a business necessity, not just a nice-to-have As technology offers small and medium enterprises (SMEs) so many more opportunities, so does it bring increasing and new cyber risks. For SMEs, the prospects