<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.tsnocode.dev/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=80.161.14.74</id>
	<title>TS NoCode wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.tsnocode.dev/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=80.161.14.74"/>
	<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Special:Contributions/80.161.14.74"/>
	<updated>2026-04-11T14:22:30Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.37.0</generator>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5144</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5144"/>
		<updated>2021-11-16T15:49:42Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Hosting Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking: Access to database, Storate- and RAM-sufficiency&lt;br /&gt;
* Database is dumped nightly, replicated to encrypted storage in EU&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
Backups are securely stored in a redundant environment. Data is stored in encrypted form and adequate measures enable recovery in case of system failure or interruption. The environment is backed up as follows:&lt;br /&gt;
*'''A) Daily''' full server backups, stored for 30 days, after which they are overwritten.&lt;br /&gt;
*'''B) Monthly''' full server backups, stored for 3 months, after which they are overwritten.&lt;br /&gt;
&lt;br /&gt;
The purpose is to ensure that Recovery Point Objective and Recovery Time Objective for environments are 24 hours where possible. For data recovery older than 60 days, a time frame of at least 72 hours is required.&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5143</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5143"/>
		<updated>2021-11-16T15:46:11Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Hosting Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
Backups are securely stored in a redundant environment. Data is stored in encrypted form and adequate measures enable recovery in case of system failure or interruption. The environment is backed up as follows:&lt;br /&gt;
*'''A) Daily''' full server backups, stored for 30 days, after which they are overwritten.&lt;br /&gt;
*'''B) Monthly''' full server backups, stored for 3 months, after which they are overwritten.&lt;br /&gt;
&lt;br /&gt;
The purpose is to ensure that Recovery Point Objective and Recovery Time Objective for environments are 24 hours where possible. For data recovery older than 60 days, a time frame of at least 72 hours is required.&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5142</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5142"/>
		<updated>2021-11-16T15:44:21Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Technology Stack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
Backups are securely stored in a redundant environment. Data is stored in encrypted form and adequate measures enable recovery in case of system failure or interruption. The environment is backed up as follows:&lt;br /&gt;
*'''A) Daily''' full server backups, stored for 30 days, after which they are overwritten.&lt;br /&gt;
*'''B) Monthly''' full server backups, stored for 3 months, after which they are overwritten.&lt;br /&gt;
&lt;br /&gt;
The purpose is to ensure that Recovery Point Objective and Recovery Time Objective for environments are 24 hours where possible. For data recovery older than 60 days, a time frame of at least 72 hours is required.&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5141</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5141"/>
		<updated>2021-11-16T15:44:15Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Backup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5140</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5140"/>
		<updated>2021-11-16T15:42:36Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Backup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
Backups are securely stored in a redundant environment. Data is stored in encrypted form and adequate measures enable recovery in case of system failure or interruption. The environment is backed up as follows:&lt;br /&gt;
*'''A) Daily''' full server backups, stored for 30 days, after which they are overwritten.&lt;br /&gt;
*'''B) Monthly''' full server backups, stored for 3 months, after which they are overwritten.&lt;br /&gt;
&lt;br /&gt;
The purpose is to ensure that Recovery Point Objective and Recovery Time Objective for environments are 24 hours where possible. For data recovery older than 60 days, a time frame of at least 72 hours is required.&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5139</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5139"/>
		<updated>2021-11-16T15:42:01Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Backup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
Backups are securely stored in a redundant environment. Data is stored in encrypted form and adequate measures enable recovery in case of system failure or interruption. The environment is backed up as follows:&lt;br /&gt;
*'''A) Daily''' full server backups, stored for 30 days, after which they are overwritten.&lt;br /&gt;
*'''B) Monthly''' full server backups, stored for 3 months, after which they are overwritten.&lt;br /&gt;
&lt;br /&gt;
LES will ensure that Recovery Point Objective and Recovery Time Objective for environments are 24 hours where possible. For data recovery older than 60 days, a time frame of at least 72 hours is required.&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5138</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5138"/>
		<updated>2021-11-16T15:41:24Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Hosting Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Backup ==&lt;br /&gt;
Backups are securely stored in a redundant environment. Data is stored in encrypted form and adequate measures enable recovery in case of system failure or interruption. The environment is backed up as follows:&lt;br /&gt;
A) Daily full server backups, stored for 30 days, after which they are overwritten.&lt;br /&gt;
B) Monthly full server backups, stored for 3 months, after which they are overwritten.&lt;br /&gt;
LES will ensure that Recovery Point Objective and Recovery Time Objective for environments are 24 hours where possible. For data recovery older than 60 days, a time frame of at least 72 hours is required.&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5137</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5137"/>
		<updated>2021-11-16T15:35:06Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Hosting Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetsEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5136</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5136"/>
		<updated>2021-11-16T15:34:35Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Application */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistleblower Platform is fully managed by Tempus Serva ApS.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Case Triager: Assignes cases to applicable lawyer &lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower has the option to return to his/her case, using a randomized code generated during the report process.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4016</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4016"/>
		<updated>2021-11-16T15:27:23Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Activity and data logging (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* '''Access Log''': Can be activated on an entity in an application. This automatically generates a log of which users have accessed and/or edited a given record. &lt;br /&gt;
* '''Status Log''': Can be activated for an entity in an application. This automatically generates a log of the history of the created records, which shows how long a record has been in each status&lt;br /&gt;
* '''Change Log''': Can be activated for an entity in an application. This automatically generates a log of what changes have been made to the individual records. Including who has changed what and when (timestamp).&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on the &amp;quot;Documents&amp;quot; and &amp;quot;Files&amp;quot; field types. In addition, data revisions can be supported on each entity. This automatically builds an audit log for each record.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR Deletion Policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and System Logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4015</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4015"/>
		<updated>2021-11-16T15:22:17Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Versioning (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* '''Access Log''': Can be activated on an entity in an application. This automatically generates a log of which users have accessed and/or edited a given record. &lt;br /&gt;
* '''Status log''': Can be activated for an entity in an application. This automatically generates a log of the history of the created records, which shows how long a record has been in each status&lt;br /&gt;
* '''Change log''': Can be activated for an entity in an application. This automatically generates a log of what changes have been made to the individual records. Including who has changed what and when (timestamp).&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on the &amp;quot;Documents&amp;quot; and &amp;quot;Files&amp;quot; field types. In addition, data revisions can be supported on each entity. This automatically builds an audit log for each record.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR Deletion Policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and System Logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4014</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4014"/>
		<updated>2021-11-16T15:18:30Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Activity and data logging (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* '''Access Log''': Can be activated on an entity in an application. This automatically generates a log of which users have accessed and/or edited a given record. &lt;br /&gt;
* '''Status log''': Can be activated for an entity in an application. This automatically generates a log of the history of the created records, which shows how long a record has been in each status&lt;br /&gt;
* '''Change log''': Can be activated for an entity in an application. This automatically generates a log of what changes have been made to the individual records. Including who has changed what and when (timestamp).&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR Deletion Policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and System Logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4013</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4013"/>
		<updated>2021-11-16T15:14:48Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Activity and data logging (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* '''Access Log''': can be activated on an entity in an application. This automatically generates a log of which users have accessed and / or edited a given record. &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR Deletion Policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and System Logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4012</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4012"/>
		<updated>2021-11-16T15:14:33Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Activity and data logging (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* '''Access :og''': can be activated on an entity in an application. This automatically generates a log of which users have accessed and / or edited a given record. &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR Deletion Policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and System Logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4011</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4011"/>
		<updated>2021-11-16T15:02:38Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Event and system logging (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR Deletion Policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and System Logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4010</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4010"/>
		<updated>2021-11-16T15:02:17Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* GDPR deletion policies (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR Deletion Policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4009</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4009"/>
		<updated>2021-11-16T14:58:53Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Activity and data logging (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Activity and Data Logging includes the automatic creation of a series of log files. Logging can be set up for each entity in an application providing insight and transparency in relation to: user activity, creation, changes and status of different records in an application. &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5135</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5135"/>
		<updated>2021-11-16T14:54:40Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. However, IP logging on server requests is deliberately disabled to ensure the anonymity of external users.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5134</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5134"/>
		<updated>2021-11-16T14:52:25Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* '''Activity and data logging''' Activity and Data Logging is enabled. IP logging on server requests is disabled in order to ensure anonymity of the user.&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5133</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5133"/>
		<updated>2021-11-16T14:46:24Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain special character(s).&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5132</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5132"/>
		<updated>2021-11-16T14:45:53Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must contain one or more special characters.&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4008</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4008"/>
		<updated>2021-11-16T14:39:50Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Multi-factor Authentication (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using session-specific, one-time-passcodes sent to the users mobile phone via regular or Flash SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4007</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4007"/>
		<updated>2021-11-16T14:32:09Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Multi-factor Authentication (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
TS No-code Platform offers native Multi-factor Authentication to protect against unauthrised access by requiring a user to provide multiple authentication factors to prove their identity. At present two different options are available:&lt;br /&gt;
* MFA using one-time-passcodes sent to the users mobile phone via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4006</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4006"/>
		<updated>2021-11-16T14:22:22Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Password Policies (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce the use of strong passwords through an appropriate password policy. Specify attribute requirements that control complexity and lifetime of passwords such as:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
Two different options exist (choose one)&lt;br /&gt;
* MFA using codes sent to the users mobile via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4005</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4005"/>
		<updated>2021-11-16T14:18:55Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Password Policies (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce fine-grained password policies. Specify attribute requirements like:&lt;br /&gt;
* Mimimum password length&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum password age&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
Two different options exist (choose one)&lt;br /&gt;
* MFA using codes sent to the users mobile via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4004</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4004"/>
		<updated>2021-11-16T14:09:37Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Password policies (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password Policies (recommended) ===&lt;br /&gt;
TS No-code Platform allows you to setup and enfoce Password Policies. Specify requirements like:&lt;br /&gt;
* Mimimum character length&lt;br /&gt;
* Complexity&lt;br /&gt;
* Special characters&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
Two different options exist (choose one)&lt;br /&gt;
* MFA using codes sent to the users mobile via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4003</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4003"/>
		<updated>2021-11-16T14:03:56Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Multifactor authentication (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password policies (recommended) ===&lt;br /&gt;
Password should have rules in order to prevent guessing&lt;br /&gt;
* Requirements to length and complexity&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multi-factor Authentication (recommended) ===&lt;br /&gt;
Two different options exist (choose one)&lt;br /&gt;
* MFA using codes sent to the users mobile via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5131</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5131"/>
		<updated>2021-11-16T14:02:27Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Hosting setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting Setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must special characters.&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5130</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5130"/>
		<updated>2021-11-16T14:02:17Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security Setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must special characters.&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5129</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5129"/>
		<updated>2021-11-16T14:02:07Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must special characters.&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) sent to the users mobile phone as either a regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5128</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5128"/>
		<updated>2021-11-16T13:58:09Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must special characters.&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccessful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5127</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5127"/>
		<updated>2021-11-16T13:56:39Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must special characters.&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* '''Event and system logging''' Is enabled to automatically log unsuccesful login attempts, system events, user errors, etc.  &lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4002</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4002"/>
		<updated>2021-11-16T13:52:37Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Event and system logging (recommended) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password policies (recommended) ===&lt;br /&gt;
Password should have rules in order to prevent guessing&lt;br /&gt;
* Requirements to length and complexity&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multifactor authentication (recommended) ===&lt;br /&gt;
Two different options exist (choose one)&lt;br /&gt;
* MFA using codes sent to the users mobile via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
When Event and System Logging are turned on for an application, the following events are logged automatically: &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4001</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4001"/>
		<updated>2021-11-16T13:49:44Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* GDPR deletion policies (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password policies (recommended) ===&lt;br /&gt;
Password should have rules in order to prevent guessing&lt;br /&gt;
* Requirements to length and complexity&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multifactor authentication (recommended) ===&lt;br /&gt;
Two different options exist (choose one)&lt;br /&gt;
* MFA using codes sent to the users mobile via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, enabling automatic deletion or anonymization in accordance with the specified rules. The application will thus automatically delete or anonymize data and files in the application, cf. specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
The following events will be logged automatically &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5126</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5126"/>
		<updated>2021-11-16T13:33:04Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must special characters.&lt;br /&gt;
* '''Multi-factor authentication''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5125</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5125"/>
		<updated>2021-11-16T13:32:46Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria: Minimum 8 characters, Must contain uppercase and lowercase letters, Must contain numbers, Must special characters.&lt;br /&gt;
* '''Multi-factor authentication (SMS)''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5124</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5124"/>
		<updated>2021-11-16T13:31:30Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* '''Multi-factor authentication (SMS)''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* '''GDPR Deletion Policies''' In accordance with applicable data protection rules, archived data is automatically anonymized after 60 days. In order to ensure an independent fourth party, a written agreement has been entered into that the sub-data processor may not give LES users access to the server and backend.&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4000</id>
		<title>Security setup</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Security_setup&amp;diff=4000"/>
		<updated>2021-11-16T13:28:39Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* GDPR deletion policies (optional) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Security baseline ==&lt;br /&gt;
&lt;br /&gt;
=== Security by design ===&lt;br /&gt;
The platform is security designed in accordance with [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf OWASP version 4]:&lt;br /&gt;
* Level 2: Compliant&lt;br /&gt;
* Level 3: +90% supported&lt;br /&gt;
&lt;br /&gt;
In addition the platform supports a wide range of security schemes and logging features, needed for support of ISO27001, ISAE3000 etc.&lt;br /&gt;
&lt;br /&gt;
The platform is subject to periodic penetration testing. Last customer testing was july 2021.&lt;br /&gt;
&lt;br /&gt;
===Default security ===&lt;br /&gt;
By default the Tempus Serva is verifiably secure to all common threat vectors, such as &lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-Site Scripting&lt;br /&gt;
* Session highjacking&lt;br /&gt;
* Login replays&lt;br /&gt;
* [https://owasp.org/www-project-top-ten/ etc]&lt;br /&gt;
&lt;br /&gt;
Protective measure includes common hardening efforts, such as&lt;br /&gt;
* Data sanitization&lt;br /&gt;
* Request throtling&lt;br /&gt;
* CSRF tokens&lt;br /&gt;
* [https://owasp.org/www-pdf-archive/OWASP_Application_Security_Verification_Standard_4.0-en.pdf etc]&lt;br /&gt;
&lt;br /&gt;
In addition to this baseline additional features can be activated per installation.&lt;br /&gt;
* Built-in: Features in the product itself&lt;br /&gt;
* External: Measures controlled in application server or operating system&lt;br /&gt;
&lt;br /&gt;
== Security built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Password policies (recommended) ===&lt;br /&gt;
Password should have rules in order to prevent guessing&lt;br /&gt;
* Requirements to length and complexity&lt;br /&gt;
* Maximum number of tries&lt;br /&gt;
&lt;br /&gt;
'''How to:''' The polices can be changed in server configurations  in the group ''Password policies''&lt;br /&gt;
&lt;br /&gt;
'''Note:''' The password polices will have no impact on SSO authentication&lt;br /&gt;
&lt;br /&gt;
=== Multifactor authentication (recommended) ===&lt;br /&gt;
Two different options exist (choose one)&lt;br /&gt;
* MFA using codes sent to the users mobile via SMS&lt;br /&gt;
** You will need to create an account for sending SMS &lt;br /&gt;
** Cost is approx. 0,30 DKK per message)&lt;br /&gt;
* MFA using af dedicated app from&lt;br /&gt;
** Apple&lt;br /&gt;
** Google&lt;br /&gt;
** Microsoft&lt;br /&gt;
&lt;br /&gt;
SMS requires very little of the users, while App based MFA is considered (slightly) more secure.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' If using singlesignon (SSO) the MFA will not be used&lt;br /&gt;
&lt;br /&gt;
=== Geolocation blocking (optional) ===&lt;br /&gt;
Geoblocking will allow the servers to deny requests from certain countries.&lt;br /&gt;
&lt;br /&gt;
The geoblocking will match the clients IP against af Geo service. The county will be matched to the servers whitelist of country names.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Change the system configurations starting with ''ipBlocker''&lt;br /&gt;
* Activate setting '''ipBlockerActive'''&lt;br /&gt;
* Set allowed countries in '''	ipBlockerAllowedCountries'''&lt;br /&gt;
&lt;br /&gt;
=== Request throttling (optional) ===&lt;br /&gt;
As specified in OWASP v4 system should be able to limit the mount of request a user can carry out in a system.&lt;br /&gt;
&lt;br /&gt;
Limitations can be set on&lt;br /&gt;
* Pages hit&lt;br /&gt;
* WebDAV requests&lt;br /&gt;
* Upload (size/count)&lt;br /&gt;
* REST operations&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Edit server configurations starting with ''limit''&lt;br /&gt;
&lt;br /&gt;
=== Brute force prevention (optional) ===&lt;br /&gt;
This protection is handled by not serving too many requests to the login page, regardless of the source in question.&lt;br /&gt;
This will prevent brute force attacks on distributed accounts using multiple machines. In case the detection triggers, login requests will be ignored for at set amount of time, while allready logged in users can continue their work.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Define systems configurations starting with ''bruteforce''&lt;br /&gt;
&lt;br /&gt;
=== Additional configurations ===&lt;br /&gt;
* File whitelisting (uploadWhitelist)&lt;br /&gt;
* OWASP compliance (owaspCompliance)&lt;br /&gt;
&lt;br /&gt;
== Security external ==&lt;br /&gt;
&lt;br /&gt;
=== Virus scanning ===&lt;br /&gt;
Scanning of uploaded fiels are left to software installed on the system.&lt;br /&gt;
&lt;br /&gt;
The upload feature will temporarily store the files on the file system, so that detection mechanisms can quarantine the files in case they are infected.&lt;br /&gt;
&lt;br /&gt;
=== Storage encryption ===&lt;br /&gt;
Storage encryption is normally supported by the underlying technologies, with the possible exception of password hashes (handled with BCrypt). &lt;br /&gt;
&lt;br /&gt;
MySQL (+8) supports multiple encryption schemes&lt;br /&gt;
* The whole database&lt;br /&gt;
* Single schema (each TS installation)&lt;br /&gt;
&lt;br /&gt;
Read more about encryption for [https://mysqlserverteam.com/controlling-table-encryption-in-mysql-8-0/ MySQL] and [https://mariadb.com/kb/en/data-at-rest-encryption-overview/ MariaDB]&lt;br /&gt;
&lt;br /&gt;
O/S level encryption technology includes&lt;br /&gt;
* Windows: BitLocker&lt;br /&gt;
* Linux: LUKS&lt;br /&gt;
&lt;br /&gt;
=== Transport encryption (https) ===&lt;br /&gt;
Minimum requirements are SSL certificates. On Linux these can easily be obtained for free via LetsEncrypt.&lt;br /&gt;
&lt;br /&gt;
Optionally the server can also apply to HSTS, using the following [https://www.javaprogramto.com/2018/09/adding-http-strict-transport.html guideline for Tomcat].&lt;br /&gt;
&lt;br /&gt;
=== Denial of service attacks ===&lt;br /&gt;
Protection against DOS attacks are best handled using dedicated services such as Cloudflare.&lt;br /&gt;
&lt;br /&gt;
== Compliance built-in ==&lt;br /&gt;
&lt;br /&gt;
=== Activity and data logging (optional) ===&lt;br /&gt;
Each entity can support the following &lt;br /&gt;
* Access log: User that has edited or viewed an item &lt;br /&gt;
* Status log: History of items time spent in each step&lt;br /&gt;
* Change log: Copy of old data along with timestamp and user that has changed the item (see below)&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Each option is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
'''Pro tip:''' Especially the status log can be used for setting up performance charts on dashboards, as it can give detailed information of how much time was spent in each step.&lt;br /&gt;
&lt;br /&gt;
=== Versioning (optional) ===&lt;br /&gt;
By default file versioning is supported on document fields.&lt;br /&gt;
&lt;br /&gt;
In addition data revisions can be supported on each individual entity.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' Data revisions is activated on the entity Advanced page.&lt;br /&gt;
&lt;br /&gt;
=== GDPR deletion policies (optional) ===&lt;br /&gt;
For each entity in a TS Application, a GDPR Deletion Policy can be set up, which enables automatic deletion in accordance with the specified deletion policy. The application will automatically delete or anonymize data and files in the application based on the specified criteria.&lt;br /&gt;
&lt;br /&gt;
'''How to:''' &lt;br /&gt;
# Set up an action on a entity status&lt;br /&gt;
# Check of deletion policy&lt;br /&gt;
# Choose between anonoumization or deletion&lt;br /&gt;
# Optionally select log data to also be deleted&lt;br /&gt;
&lt;br /&gt;
In case you choose &amp;quot;anonoumization&amp;quot; you should define how each field should be handled&lt;br /&gt;
# Click on a field&lt;br /&gt;
# Click on Assignment&lt;br /&gt;
# Check of anoumization&lt;br /&gt;
# Optionally set value after change&lt;br /&gt;
&lt;br /&gt;
=== Event and system logging (recommended) ===&lt;br /&gt;
The following events will be logged automatically &lt;br /&gt;
* User logins&lt;br /&gt;
** Succesfull normal user logins are hidden&lt;br /&gt;
** Also contains client IP (used for MFA)&lt;br /&gt;
* System events&lt;br /&gt;
** User errors&lt;br /&gt;
** Scheduled services&lt;br /&gt;
** Administrator logins&lt;br /&gt;
&lt;br /&gt;
Error events will include stacktraces if available.&lt;br /&gt;
&lt;br /&gt;
The eventlog can be cleaned automatically on a regular schedule.&lt;br /&gt;
&lt;br /&gt;
== Compliance external ==&lt;br /&gt;
&lt;br /&gt;
=== Request logging ===&lt;br /&gt;
The webserver itself can be set up to do make detailed logs in file , containing for example&lt;br /&gt;
* Request timestamp, IP and session ID&lt;br /&gt;
* Stacktraces on errors&lt;br /&gt;
&lt;br /&gt;
Depending on your security setup you might want to log these to a central repository&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5123</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5123"/>
		<updated>2021-11-16T13:24:46Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* '''Multi-factor authentication (SMS)''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a randomized, session-specific OTP (One-Time-Password) delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5122</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5122"/>
		<updated>2021-11-16T13:22:18Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* '''Password policy''' The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* '''Multi-factor authentication (SMS)''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5121</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5121"/>
		<updated>2021-11-16T13:21:50Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy - The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* '''Multi-factor authentication (SMS)''' Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* '''Scrubbing of files''' All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5120</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5120"/>
		<updated>2021-11-16T13:21:05Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy - The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* '''Multi-factor authentication (SMS)''' - Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* '''Storage encryption (AWS + LUKS)''' - Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* '''Encryption During Transmission''' - Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* '''Scrubbing of files''' (personally identifiable meta-data) -&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5119</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5119"/>
		<updated>2021-11-16T13:20:07Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy - The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS) - Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS) - Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission - Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5118</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5118"/>
		<updated>2021-11-16T13:19:03Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy: The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS)&lt;br /&gt;
Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS)&lt;br /&gt;
Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission&lt;br /&gt;
Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5117</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5117"/>
		<updated>2021-11-16T13:18:30Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Password policy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy &lt;br /&gt;
The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS)&lt;br /&gt;
Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS)&lt;br /&gt;
Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission&lt;br /&gt;
Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5116</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5116"/>
		<updated>2021-11-16T13:18:03Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
= Password policy =&lt;br /&gt;
The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS)&lt;br /&gt;
Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS)&lt;br /&gt;
Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission&lt;br /&gt;
Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5115</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5115"/>
		<updated>2021-11-16T13:17:37Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy&lt;br /&gt;
The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS)&lt;br /&gt;
Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS)&lt;br /&gt;
Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission&lt;br /&gt;
Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5114</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5114"/>
		<updated>2021-11-16T13:17:18Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy&lt;br /&gt;
The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
* Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS)&lt;br /&gt;
Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS)&lt;br /&gt;
Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission&lt;br /&gt;
Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5113</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5113"/>
		<updated>2021-11-16T13:17:04Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policy&lt;br /&gt;
The enabled policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS)&lt;br /&gt;
Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS)&lt;br /&gt;
Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission&lt;br /&gt;
Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
	<entry>
		<id>https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5112</id>
		<title>Whistleblower</title>
		<link rel="alternate" type="text/html" href="https://wiki.tsnocode.dev/index.php?title=Whistleblower&amp;diff=5112"/>
		<updated>2021-11-16T13:16:04Z</updated>

		<summary type="html">&lt;p&gt;80.161.14.74: /* Security setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Application ==&lt;br /&gt;
The LES Whistlebloaer Portal is fully managed by Tempus Serva Aps.&lt;br /&gt;
&lt;br /&gt;
The system supports the following roles and usecases&lt;br /&gt;
* Lawyer: Handles whistleblower cases&lt;br /&gt;
* Tenant user: Handles whistleblower cases &lt;br /&gt;
* Whistleblower: Anonoumous users that creates new cases&lt;br /&gt;
&lt;br /&gt;
Whistleblower have the option to return to their case using a randomized code.&lt;br /&gt;
&lt;br /&gt;
== Hosting setup ==&lt;br /&gt;
The LES Whistleblower Portal is hosted by Amazon Webservices EC2 in the data center in Stockholm, which complies with the following standards PCI DSS 3.2 Level 1 Service Provider, FIPS 140-2, ISO 27001. The server is protected by 2 layers of firewalls and utilizes the following supported services:&lt;br /&gt;
&lt;br /&gt;
* SSL certificates are automatically updated monthly from LetEncrypt&lt;br /&gt;
* UptimeRobot polls the server each minute checking &lt;br /&gt;
** Access to database&lt;br /&gt;
** Sufficient storage and RAM&lt;br /&gt;
* Database is dumped nightly &lt;br /&gt;
** Replicated to encrypted storage in EU&lt;br /&gt;
** Rentention daily 60 days, monthly 2 years&lt;br /&gt;
* Office365 SMTP service for sending emails&lt;br /&gt;
&lt;br /&gt;
== Technology Stack ==&lt;br /&gt;
The technological stack consists of:&lt;br /&gt;
&lt;br /&gt;
* LES Whistleblower Portal&lt;br /&gt;
* TS No-code Platform &lt;br /&gt;
* Apache Tomcat&lt;br /&gt;
* MySQL&lt;br /&gt;
* Amazon Linux 2&lt;br /&gt;
&lt;br /&gt;
== Security setup ==&lt;br /&gt;
The following security and compliance features are enabled and active:&lt;br /&gt;
* Password policies&lt;br /&gt;
The enabled password policy forces users to create passwords based on the following minimum criteria:&lt;br /&gt;
** Minimum 8 characters&lt;br /&gt;
** Must contain uppercase and lowercase letters&lt;br /&gt;
** Must contain numbers&lt;br /&gt;
** Must contain special characters&lt;br /&gt;
* Multi-factor authentication (SMS)&lt;br /&gt;
Access to case management for attorney/lawyer at LES (ombudsman) and contact persons in the company, respectively, is protected with a username and password, followed by a session-specific One-Time-Password delivered as regular or Flash SMS, to verify the user’s identity.&lt;br /&gt;
* Storage encryption (AWS + LUKS)&lt;br /&gt;
Storage is encrypted with LUKS (Linux Unified Key Setup – 256-bit AES disk encryption). Thus, persons with physical access to hardware cannot access stored data.&lt;br /&gt;
* Encryption During Transmission&lt;br /&gt;
Communication is protected with SSL certificates and HTTPS (TLS). Numeric suites for HTTPS are continuously updated.&lt;br /&gt;
* Activity and data logging&lt;br /&gt;
* Versioning&lt;br /&gt;
* GDPR deletion policies (anonymize after 60 days)&lt;br /&gt;
* Event and system logging&lt;br /&gt;
* Scrubbing of files (personally identifiable meta-data)&lt;br /&gt;
All files uploaded via the portal are cleaned of personally identifiable meta-data such as name, initials, geotags, etc. LES Whistleblower Portal supports all common file formats, including: MS O ce files, PDF, image formats like PNG, JPG, BMP etc., as well as media files MP3 and MP4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note that IP logging on server requests is disabled, in order to secure anonomity of the users.&lt;br /&gt;
&lt;br /&gt;
See [[Security_setup|Security setup]] for additional information on security and compliance features available on TS No-code Platform.&lt;/div&gt;</summary>
		<author><name>80.161.14.74</name></author>
	</entry>
</feed>