• No results found

Applications and Hosting Policy Document

N/A
N/A
Protected

Academic year: 2021

Share "Applications and Hosting Policy Document"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

(1)

Applications and Hosting

Policy Document

A requirement of the Company is to provide a secure hosting environment for its clients. The Company regularly undertakes formal risk management reviews and these have identified that the speed, security and reliability of the service is a fundamental requirement of its own success.

Consequently, the board of directors have developed robust procedures and have forged strategic alliances with a number of reliable and highly competent organisations to ensure that it maintains a best practice approach in this area. The basis of the service is to ensure that its customers enjoy uninterrupted access to the applications that it provides or web sites that it hosts. The Company’s overall strategic objectives for the system are identified below:

» That they be available for use from any location with an internet connection twenty four hours a day, seven days a week with the exception of pre-communicated outage periods for the purpose of planned maintenance and upgrades;

» Be designed and maintained in such a way that no single point of failure exists within the overall system architecture;

» Be regularly tested during simulations and fire drills that form a part of its overall business continuity plan;

» Have sufficient processing power and be designed in such a way to ensure that they work quickly and efficiently;

» Have sufficient hard storage space to cater for the requirements of its own and its customers needs;

» Be secure against third party attacks; » Be backed up through the use of a mirrored

array meaning that single component failure neither interrupts the service nor losses data; » Be daily backed up to a further hosting facility

as a further insurance against component or hardware failure.

Taking into account the importance of the issue, the Managing Director undertakes detailed reviews of the arrangements on a quarterly basis, as well as unannounced audits of the strategic partners’ arrangements bi-annually.

The full roles and responsibilities of the partners is documented and attached to this policy. The policy is reviewed, amended and signed off annually or when considered appropriate by the board of directors.

» Signed: Next Review Date: September 2014 A D Hammond, Managing Director

(2)

Hosting Arrangements

The latent risks to our hosting systems can be categorised into defined areas. For our applications to be delivered effectively we ensure that:

» We always have sufficient power available to run our computer array;

» The array is located in a controlled, secure environment free of dust and at a pre-determined temperature;

» That we have multiple options for connection to the internet at sufficient speed and band width to meet our clients requirements.

The Company maintains ongoing relationships with two strategic partners in order to deliver the service, with each partner responsible for a defined area of expertise.

Data Centre

Telecity Group - TelecityGroup is Europe’s leading provider of premium carrier-neutral data centres, operating facilities in city locations across Europe.

TelecityGroup’s data centres provide secure and highly-connected environments for the IT and telecoms equipment that powers the digital economy. The data centres are enabling environments in which the separate networks that make up the internet meet and where bandwidth intensive applications, content and information are hosted.

Our network is distributed over two ‘top-of-their-class’ datacentres in London’s Docklands at Telehouse and at Telecity. Each facility is connected to each other by redundant Gigabit Ethernet circuits and each hosts autonomous services and independent external internet connections for both international peering and global transit reach.

The datacentre themselves have stringent arrangements in place to ensure that power is always available to our computers. They maintain six independent generators capable of maintaining an uninterrupted power supply to our systems, even in the event of total power loss from the national grid. Identical arrangements are in place for environmental controls of the hosting environment.

These systems are tested on a three monthly basis with regular and planned maintenance activities undertaken to the service schedule provided by the manufacturer. A detailed data centre specification is contained overleaf.

(3)

Data Centre Specification

Sovereign House, London

Highly connected,

premium data centre space.

General

Gross size of data centre (m²) 6223

Net customer space (m²) 5004

Building type Converted office

Building tenure Leasehold

Number of data floors 6

Number of IT zones 6

Maximum floor load capacity (kg/m²) 500 Maximum raised access floor height (mm) 500 Raised floor to false ceiling height (metres) 3.5

Goods lift maximum load (tonnes) 4

Separate delivery bay Yes

Security

Type of security system Biometrics – iris scan + proximity access card

Staffed 24/7/365 Yes

Fire Detection & Suppression

High sensitivity smoke detection system Yes Type of fire suppression system Water mist

Air Conditioning & Cooling G–4th Floor 5th Floor

Type of cooling system Chilled water Chilled water

Number of chillers 8 4

Maximum cooling capacity (MW) 8 1.9

Cooling redundancy N+2 N+1

CCUs or in-row cooling CCUs CCUs

Power G–4th Floor 5th Floor

Number of independent supplies

into building 2 2

Total incoming feed capacity (MVA) 8 4 Generator fuel at full load (hours) 24 24

UPS type Rotary Static

UPS autonomy (minutes) Unlimited 15

UPS capacity (kW) 6600 1920

UPS redundancy N+1 N+1

Generator redundancy N+1 N+1

Generator capacity (MVA) 12 3.8

Connectivity

Number of diverse entry points into building 2

Number of meet-me rooms 1

Certifications

ISO 27001:2005

Information Security Management. ISO 9001:2008

Quality Management Systems. ISO 14001:2004

Environmental Management Systems. OHSAS 18001:2007

Occupational Health and Safety Management. PCI DSS

Payment card industry data security standards.

Support Tel: +44(0)20 7001 0050 General Tel: +44 (0)20 7001 0000 info@telecity.com

(4)

Internet Connectivity

IDNet - Established in 1996, IDNet is a leading technology-driven Internet Services & Communications Provider (ISP/CP), delivering high performance data and telecoms solutions for a multitude of businesses, blue-chip corporations and government agencies throughout the UK.

Our core global internet connectivity is presented in London at LINX & LONAP, and in Amsterdam at AMS-IX, where we have multiple transit and peering connections with over 500 global networks, enabling us to deliver data from around the world at incredibly fast speeds.

All external circuits are duplicated to ensure redundant failover in the event of an outage. In order to ensure that our own internal network can survive unexpected equipment failure, every router and switch is deployed as a pair working in tandem.

Should a device fail then our core network will automatically self-heal to route traffic around the problem, maintaining full service, allowing us to replace and repair the fault without disrupting normal operations.

The core network and external connectivity is monitored 24/7 with alerts issued to duty engineers in the event of a failure or unusual traffic event. Where a circuit regularly reaches 70% utilisation, the capacity of that link is increased to provide sufficient headroom again.

(5)

Our Own Server Array

The Company has continually reviewed and improved its own arrangements for the

maintenance, security and backup of the collection of computers that make up its hosting array. The schematic diagram below depicts the way in which the system is configured.

The primary array – This collection of computers, switches, firewalls, and hard storage units make up the day-to-day system that delivers the Company’s hosting services.

The secondary array – This collection of computers is located in a separate datacentre in Flint Road, Letchworth, and acts as our third level backup and Escrow solution in the event of Propeller Studios Ltd entering into administration.

London Data Centre Letchworth Data Centre

London FW Letchworth FW PROPHVBAK Internal Storage propvirtdcb prop1a SAN Storage There is no SAN at this

location Internal IDNetLink

PROPHV1 Internal Storage propvirtdc1 SAN Storage PROPHV2 Internal Storage propvirtdc2 SAN Storage

Prop6 Prop7 AntiSpam1 Prop8 Prop5 AntiSpam2

MonitorServer PropWAF DomainFW 2 x LAN/WAN Switches

2 x SAN Switches

2 x SAN Servers (Configured for Auto Failover)

(6)

The Primary and Secondary Array

The Primary hosted virtualisation platform has been designed to deliver the following:

» Fully redundant infrastructure; » A high level of security;

» Flexible server infrastructure, allowing hot upgrades with minimal downtime;

» Flexible, upgradable and resilient storage; » Redundant backups both onsite and offsite; » 24 hour on call support service.

The Primary array has been designed so that no single piece of hardware can cause a system wide failure of any service. Utilising the Microsoft Hyper-V 2008 R2 platform and Open-E VSS V6 SAN storage devices, automatic failover of key hardware has been designed, and tested, so that the virtual servers will automatically switch to the live server in the event of a hardware failure.

The hardware is connected using multiple switches configured in a crossover setup. This adds the ability for any single network device to fail without interruption to service. The largest impact that will be felt will be a slight data access performance degradation if a SAN switch is compromised.

All data at the Primary array is backed up locally, and then transferred to the Secondary array (Letchworth Disaster Recovery site) during off peak times where historic copies of data are stored.

In the event of any failure, our engineers are

contacted by email and text message with the details of the failure. They will then respond to any support call within their SLA times:

» 8am – 6pm Monday to Friday:

> Critical Failure : 30 minute response > Other Failure : 1 hour response » 24 Hours:

> Critical Failure : 1 hour response > Other Failure : 2 hour response

In most cases the response times will be far below the above. Our aim is to respond to any type of failure within 5 minutes.

Security of the Primary and Secondary Array

The security configuration at the data centre comprises two server based firewalls configured in tandem for fault tolerance. They are locked down to only allow web traffic (Ports 80 and 443) from public internet address. All other traffic is blocked to prevent unauthorised access to critical servers.

Web traffic is being routed through a ModSecurity Web Application Firewall, providing another level of protection as public web access does not have direct access to the application servers.

There is access permitted from specific IP addresses to specific ports and servers for management by Propeller Studios and their strategic partners. Communication between servers takes place on an internal private network, not connected to the public internet. The Storage Area Network is also completely offline with no direct internet access.

(7)

Fire Drills and Audits of the System

We have developed a comprehensive and robust series of fire drills and simulated disaster recovery events that are undertaken at planned periods throughout the year.

The table below details these arrangements:

Monthly fire drill events, reports and audits Outcomes

Review of the weekly hardware inspection sheets for all hardware that makes up both the primary and secondary array completed on the Company’s behalf by the service engineer.

The purchase or upgrade of the system based upon decisions reached by the Managing Director, Digital Director, and Application Programming Director, ensuring a robust process to identify and replace at risk items. Review of the systems performance report

during the month, identifying any concerns and suggestions for improvement.

The purchase or upgrade of the system based upon decisions reached by the Managing Director, Digital Director, and Application Programming Director, ensuring that the system’s performance matches or exceeds the service agreements pledges to clients. Monthly back up data integrity audit between the

primary and secondary array and between SAN units of the Primary array.

A compliance report provided from our engineers confirming the successful replication of data between primary and secondary arrays and duplication of data between the SAN units of the primary array.

Quarterly fire drill events, reports and audits Outcomes

Pre-notified testing of the primary array failover

capability. A rigorous examination of the primary and secondary arrays capacity to function when an item of component hardware failure is simulated. The event is supported by a detailed report, highlighting any concerns or suggestions for improvement which are considered and actioned where required.

Half yearly fire drill events, reports and audits Outcomes

Physical inspection of the hosting facilities and inspection of the fire drill records of the strategic partner to ensure compliance with the arrangements.

Completed audit inspection form completed by the Managing Director

Physical inspection of the intranet providers’ facilities and inspection of the fire drill records of the strategic partner to ensure compliance with the arrangements.

Completed audit inspection form completed by the Managing Director

(8)

EasyPQQ and EasyBOP Client Access to their Own Data

Registered users of either application can only ever see the data stored in their own company account. Both applications core logic architecture has been designed to run as a multi-user environment from their inception. Data segregation is enforced through a unique client identifier and is persistent through the application programming logic, the database table relationships, and the file system structure.

Application Logic Data Segregation

Client login sessions are validated on each major page and script, including script-helpers and function library pages. The underlying rule is to check and validate the client’s login session prior to any code execution that returns (or potentially makes visible) sensitive data that is related to individual specific clients.

Should the client session become corrupt or malformed in any way, the system will flag an error and realise that the client’s session is no longer valid. In this case, the client is forcefully logged-out of the intranet where they may then log back in.

An example of a forced log-out may occur if a client tampers with query-string variables while answering a question. The applications will detect an illegal relationship between client and document and force a log-out.

In addition to this validation, client data

segregation is enforced multiple times with each identity variable forming a ‘chain’ back to the client’s identity as the source of the validation. If this chain fails, the client is either logged-out, or blank data is purposely returned to the screen.

Database Information Segregation

This is enforced in the standard database architecture of primary key relationships. The client’s unique identifier is used as the basis for most data tables, with complex relationships ultimately forming paths that resolve back down to the client’s unique identifier.

File System Segregation

Both applications handle file references using the client’s unique identifier. For example, File Manager uploads are segregated into separate physical folders on a per client basis. This ensures Client A’s files do not mix with Client B’s on any level.

At times, the applications will need to generate temporary files. These are always generated with temporary file names which include the client’s unique identifier, as well as a time stamp number value down to micro-seconds.

Data Protection and Security Policy

The Company has implemented policies which govern our approach to Data Protection and Data Security.

The scope of these arrangements is to ensure compliance with all statutory requirements in respect of the Data Protection Act, and to ensure that the systems required to manage its own systems, and that of its clients, are managed in a professional and robust way.

The aim of these policies is to ensure that Propeller Studios provides the optimum environment for the custody of its, and clients’, data and to ensure that it remains safe, available and properly managed at all times

(9)

Data Protection Policy

This is a statement of the data protection policy adopted by Propeller Studios Ltd (the “Company”).

Responsibility for the updating and dissemination of the policy rests with the board of directors. The policy is subject to regular review to reflect, for example, changes to legislation or to the structure or policies of the Company. All staff are expected to apply the policy and to seek advice when required.

The Company needs to collect and use certain types of information about people and organisations with whom it deals in order to operate. These include current, past and prospective clients of the Company, Company employees, suppliers and others with whom the Company conducts business. In addition, the Company provides hosting services to others where data is stored that is relevant to the act and insofar as system security is concerned, Propeller Studios has a duty of care to ensure best practice in this area. The Company recognises personal information must be dealt with properly however it is collected, recorded and used – whether on paper, electronically, or other means - and there are safeguards to ensure this in the Data Protection Act 1998.

We regard the lawful and correct treatment of personal information by the Company as important to the achievement of our objectives and to the success of our operations, and to maintaining confidence between those with whom we deal and ourselves. The Company needs to ensure that it treats personal information lawfully and correctly.

To this end, the Company fully endorse and adhere to the principles of data protection, as set out in the Data Protection Act 1998.

The eight principles require that personal information:

» shall be processed fairly and lawfully and, in particular, shall not be processed unless specific conditions are met;

» shall be obtained only for one or more

specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes;

» shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed;

» shall be accurate and, where necessary, kept up to date;

» shall not be kept for longer than is necessary for the specified purpose(s);

» shall be processed in accordance with the rights of data subjects under the Act; » should be subject to appropriate technical

and organisational measures to prevent the unauthorised or unlawful processing of personal data, or the accidental loss, destruction, or damage to personal data; » shall not be transferred to a country or

territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

(10)

Therefore, the Company will, through appropriate management and strict application of criteria and controls:

» observe fully the conditions regarding the fair collection and use of information;

» meet its legal obligations to specify the purposes for which information is used; » collect and process appropriate information

only to the extent that it is needed to fulfil our operational needs or to comply with any legal requirements;

» ensure the quality of information used; » ensure that the information is held for no

longer than is necessary;

» ensure that the rights of people about whom information is held can be fully exercised under the Act (i.e. the right to be informed that processing is being undertaken, to access one’s personal information; to prevent processing in certain circumstances, and to correct, rectify, block or erase information that is regarded as wrong information);

» take appropriate technical and organisational security measures to safeguard personal information;

» ensure that personal information is not

transferred abroad without suitable safeguards.

To assist in achieving compliance with the principles, the Company:

» has appointed responsibility to an executive director for data protection within the Company;

» has informed all staff of their duties in respect of the act as part of an induction process; » undertakes a yearly review of the data that it

and its clients hold within systems provided by the Company to identify areas that may lead to breaches of the act and use this information to investigate the situation and make remedy if breach is likely.

(11)

Certificate of Registration

This is to certify that: PROPELLER STUDIOS LIMITED

is registered with the Information Commissioner's Office under registration reference:

Z8231587 Registration Start date:

13 October 2003 Registration Expiry date:

12 October 2014

Upholding information rights

Wycliffe House, Water Lane, Wilmslow, Cheshire SK9 5AF Tel. 0303 123 1113 Fax. 01625 524510

References

Related documents

This Direction shall be called “Direction regarding Credit based Semester Pattern Scheme and Examination leading to B.P.Ed., first to last semester in Credit

The Lithuanian authorities are invited to consider acceding to the Optional Protocol to the United Nations Convention against Torture (paragraph 8). XII-630 of 3

1 Spatial planning of public charging points using multi-dimensional analysis of early adopters of electric vehicles for a city region..

I therefor expect the public servants in Anglo-Saxon and Nordic countries to show higher levels of openness to experience, and lower levels of conscientiousness than in Germanic

Ultrathin CVD Cu Seed Layer Formation Using Copper Oxynitride Deposition and Room Temperature Remote Hydrogen Plasma Reduction.. (Article begins on

• Direct equities may prove to be a good investment avenue in the long-term investment horizon but quite often they are interrupted by factors such as whims, fancies

We report genetic diversity of total fourteen different Fusarium species by RAPD-PCR analysis using 25 random primers.. The genus Fusarium is food borne pathogen responsible for

High-frequency sampling campaigns and analyses were conducted in this study to investigate temporal variations of river water chemistry and the impacts of climate variability on CO