Security and Data Privacy

TSANet Security Committee

TSANet Security & Data Protection

The system was designed to reduce the risk of storing sensitive information about our Members Employees or Customers. To accomplish this the following decisions and policies were created.

  • System maintains basic contact details (Name, Email, Phone)

  • Customer data removed after 30 days

  • Only endpoint meta-data is stored in the system

  • TSANet maintains industry security standards (ISO27001, 27701)

  • The system does not store attachments. Secure files sent directly to Member's system

  • The system Supports Single Sign-on

ISO27001 / ISO27701 Certification

ISO27701 and ISO27701 are globally recognized standards mandating processes and controls for the establishment, maintenance, and certification of information security management systems (ISMS) and privacy information management systems (PIMS).

TSANet Accessibility Policy

We strive to make our website as accessible and usable as possible. We follow Section 508 and the Web Content Accessibility Guidelines (WCAG 2.0) produced by the World Wide Web Consortium (W3C, the web’s governing body).

Section 508 is a legal requirement and WCAG is a set of checkpoints and guidelines that help ensure that websites are designed and written correctly. For example:

  • Images have alternative text (so if you can’t see the image you can still read the text).

  • The color contrast between the foreground and background is sufficiently strong.

  • Text resizes according to user preference.

  • Headings are correctly used (they’re not just ordinary text made to look big and bold).

  • Links make sense by themselves (e.g. no links that say “Click here” or “More…”).

  • Tables are used for laying out tabular information and have proper headings and summaries.

Feedback

If you have a problem using our site, please contact us and provide the URL (web address) of the material you tried to access and the problem you experienced. We’ll attempt to provide the information you’re seeking.

Data Privacy FAQs

chevron-rightWhat document defines the TSANet Data Protection and Privacy?hashtag

View TSANet Data Protection & Privacy Statement at https://tsanet.org/legal-policy/arrow-up-right

chevron-rightWhat Employee information do you store in the system?hashtag

The user profile requires Name, Email and Phone number. Members can also use Single Sign-on from their own identity management systems including support for just in time user provisioning and can control what information is sent to the TSANet Connect system.

chevron-rightWhat Customer information do you store in the system?hashtag

Members can define what common customer information they require when receiving a request. All customer data is removed from the system after acknowledgement and the system will remove all customer data after 30 days leaving only the request metadata below:

Submitted By, Case Number, Priority, Summary, Date Requested, Date responded

chevron-rightDo you encrypt data in transit and at rest?hashtag

Data in transit is encrypted with SSL and data is encrypted at rest with AES-256.

chevron-rightHow was your system developed?hashtag

The system was developed using best practices defined in the OWASP Secure coding practices guide. The Open Web Application Security project OWASP defines best practices for coding secure web applications. For more information on OWASP see https://owasp.org/arrow-up-right

Some specifics of this best practice include:

  1. Best practices for administration of the system including 2-factor authentication to all development and system administration environments

  2. Encryption on the transmission of all data

  3. Best practices for API development and access

chevron-rightWhat is your Network and Host Security?hashtag

The system is hosted at Akamaiarrow-up-right using the Linode Cloud Service. Starting in the June 2024 release, TSANet Connect will also use Cloudflarearrow-up-right for network security.

Akamai provides a complete solution, including physical and environmental security, that includes both networking and host operating environments up to and including the hypervisor.

chevron-rightWhat is your system uptime and support process?hashtag

The system is designed to provide 99.99% uptime. The following document provides information on the support process: TSANet Connect Member Support Processarrow-up-right

chevron-rightWhat organizational measures have you implemented to protect Sensitive Data or Personal Data in relation to its product/service?hashtag
chevron-rightIs all media containing Sensitive Data or Personal Data disposed of securely?hashtag

100% cloud service. No physical media

chevron-rightIs antivirus/anti-malware deployed on all devices that will hold Sensitive Data or Personal Data?hashtag

100% cloud service. No physical media

chevron-rightDoes the company have intrusion detection and/or intrusion prevention systems?hashtag

Part of hosted Cloud Service

chevron-rightDo you keep applications (web, app servers, database layer, bus logic) up-to-date by applying security updates and other patches?hashtag

Part of the release process. ISO27001 Certified

chevron-rightDo you conduct Static Application Security Testing (SAST) or Dynamic Application Security Testing (DAST) of the application periodically, or during a major release/update?hashtag

DAST is outsourced to Security Metrics - Quarterly automated and yearly manual

chevron-rightDo you perform penetration testing and/or vulnerability scans of applications that will be utilized to provide services ?hashtag

Cloudflare zero trust protected. Quarterly scans and yearly manual

chevron-rightAre vulnerability scans conducted against the perimeter of all networks that will hold Sensitive Data or Personal Data?hashtag

Cloudflare Zero Trust

chevron-rightAre Development, Test/QA/UAT, and Staging environment/s separate from the production environment?hashtag

Physically separated: Separate VMs in different Geo.

chevron-rightDo you provide access to the application on a least privilege basis?hashtag

Default is Standard user. Business manager defines admins

chevron-rightWhat is included in API security testing?hashtag

Data scoping, SQL injection, Replay attack, Data leakage, Cross Site Scripting (XSS), Session abuse, Denial of service (DoS), OWASP top 10/ CWE top 25 security issues

chevron-rightCan a client manage access to the APIs?hashtag

API user is set in the admin Portal

chevron-rightIs there an incident response plan?hashtag

Yes, Part of ISO 27001 audit

chevron-rightIs there an established Business Continuity and Disaster Recovery Plan that has been approved by management, communicated to appropriate constituents, and an owner to maintain and review the program?hashtag

Yes, part of the ISO 27001 audit

chevron-rightDoes your service/organization permit Members to maintain redundant copy(ies) of their data?hashtag

With System connectors (Salesforce, Microsoft Dynamics, Service Now)

chevron-rightAre network security technologies used to establish and enforce security requirements and block unauthorized traffic between segregated systems and other systems?hashtag

Cloudflare Zero Trust

Last updated