Table of contents
- Data center and network security
- Application security
- Product security features
- Compliance certification and memberships
We ensure the confidentiality and integrity of your data with industry best practices. CafeX hosts service data in AWS data centers that have been certified as ISO 27001 and PCI/DSS Service Provider Level 1 compliant.
If you have questions for the CafeX security team, or need to contact them regarding security alerts and events, send an email to: email@example.com.
|Facilities||CafeX hosts service data in AWS data centers that have been certified as ISO 27001and PCI/DSS Service Provider Level 1 compliance.|
AWS infrastructure services includes back-up power, HVAC systems, and fire suppression equipment to help protect servers and your data.
|On-site security||AWS on-site security includes a number of features such as security guards, fencing, security video feeds, intrusion detection technology and other security measures.|
Learn more about AWS physical security.
|Monitoring||All production network systems, networked devices and circuits are constantly monitored and logically administered by CafeX staff. |
Physical security, power and internet connectivity are monitored by AWS.
|Location||CafeX leverages AWS data centers in the East Coast of the United States of America.|
|Dedicated security Team||The CafeX security team is globally distributed to respond to security alerts and events.|
|Protection||Our network is protected through the use of key AWS security services, regular audits, and network intelligence technologies that monitors and blocks malicious traffic and network attacks.|
|Architecture||Our network security architecture consists of multiple AWS security availability zones.|
|Network vulnerability scanning||Network security scanning gives CafeX deep insight for quick identification of out-of-compliance or potentially vulnerable systems.|
|Third-party penetration tests||CafeX has an extensive internal scanning and testing program. Each year CafeX employs third-party security experts to perform a broad penetration test across the CafeX production network.|
|Intrusion detection and prevention||Service ingress and egress points are instrumented and monitored to detect anomalous behaviour. These systems are configured to generate alerts when incidents and values exceed predetermined thresholds, and use regularly updated signatures based on new threats. This includes 24/7 system monitoring.|
|Threat intelligence program||CafeX participates in several threat intelligence sharing programs. CafeX monitors threats posted to these threat intelligence networks and take action based on risk and exposure.|
|Logical access||Access to the CafeX production network is restricted by an explicit need-to-know basis, utilizes least privilege, is frequently audited and monitored.|
|Security incident response||In case of a security alert events are escalated to CafeX teams teams providing operations, network engineering and security coverage. Employees are trained on security incident response processes, including communication channels and escalation paths.|
|Encryption in transit||Communications between you and CafeX servers are encrypted using industry best-practices protocols, such as HTTPS and Transport Layer Security (TLS), over public networks. TLS is also supported for encryption of emails.|
|Encryption at rest||Customers of CafeX benefit from the protections of encryption at rest for their data. Service Data is encrypted at rest in AWS using AES 256 key encryption.|
|Tenant specific encryption||CafeX uses keys that are specific to a tenant to encrypt data. It is not possible for one tenant to decrypt the data of another tenant.|
|Uptime||CafeX maintains a publicly available system status page that includes system availability details, scheduled maintenance, service incident history, and relevant security events.|
See: CafeX status page
|Redundancy||CafeX employs service clustering and network redundancies to eliminate single points of failure. The CafeX strict back-up regime and Enhanced Disaster Recovery service allow us to deliver a high level of service availability, as Service Data is replicated across availability zones.|
|Disaster recovery||The CafeX Disaster Recovery (DR) program ensures that CafeX services remain available or are easily recoverable in the case of a disaster. This is accomplished through building a robust technical environment, creating Disaster Recovery plans, and testing activities.|
|Enhanced disaster recovery||The Enhanced Disaster Recovery package adds contractual objectives for Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These are supported through CafeX’s capability to prioritize operations of Enhanced Disaster Recovery customers during any declared disaster event. *Only available with Advanced Security Add-on|
|Scalable service||CafeX monitors network systems; if values exceed predetermined thresholds the architecture scales to meet the increase in demand, to ensure the quality of service is maintained across tenancies.|
CafeX takes steps to develop securely and test against security threats to ensure the safety of CafeX customer data. In addition, CafeX employs third-party security experts to perform detailed penetration.
|Security training||At least annually, engineers participate in secure code training covering OWASP Top 10 security risks, common attack vectors, and CafeX security controls.|
|Quality assurance||The CafeX Quality Assurance (QA) department reviews and tests the CafeX code base. Dedicated application security engineers on staff identify, test, and triage security vulnerabilities in code.|
|Separate environments||Testing and staging environments are logically separated from the production environment. |
No actual service data is used in the development of test environments.
|Dynamic vulnerability Scanning||CafeX uses qualified third-party tooling to continuously dynamically scan the CafeX core applications against the OWASP Top 10 security risks. CafeX monitor these results actively and has a dedicated team to remediate any discovered issues.|
|Static code analysis||The source code repositories of CafeX are scanned for security issues using CafeX’s integrated static analysis tooling.|
CafeX makes it seamless for customers to manage access and sharing policies with authentication and single-sign on (SSO) options. All communications with CafeX servers are encrypted using industry-standard protocols, such as HTTPS, over public networks, meaning the traffic between you and CafeX is secure.
|Authentication options||For CafeX, you have the choice of registering and logging in using the CafeX Authentication Service or SSO for end-user authentication.|
|Single sign-on (SSO)||Single sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials for your CafeX instance.|
|Secure credential storage||CafeX follows secure credential storage best practices by never storing passwords in human readable format, and only as the result of a secure, salted, one-way hash.|
|API security and authentication||The CafeX API is TLS only. You can authorize against the API using either basic authentication with your username and password, or with a username and API token. OAuth authentication is also supported.|
|Tenant segregation||Customers can bring their own storage, that is only used for their data.|
Data that CafeX stores uses different encryption keys such that it cannot be decrypted, or modified, by another tenant.
|Role-based access controls||Access to data within CafeX applications is governed by role-based access control (RBAC), and can be configured to define granular access privileges. CafeX has various permission levels for users.|
|Transmission security||All communications with the CafeX UI and API are encrypted using industry standard HTTPS/TLS over public networks. This ensures that all traffic between you and CafeX is secure during transit. For email, the CafeX product also leverages opportunistic TLS by default. Transport Layer Security (TLS) encrypts and delivers email securely, mitigating eavesdropping between mail servers where peer services support this protocol.|
CafeX implements security best practices to meet industry-based compliance and the most stringent requirements.
|ISO 27001:2013||CafeX is ISO 27001:2013 certified. The certificate is available for download, see: CafeX ISO 27001:2013 certificate|
|TRUSTe® privacy certification programs||CafeX has certified compliance with the US-EU and Swiss – US Privacy Shield frameworks.|
This demonstrates that CafeX’s privacy programs, policies, and practices meet the requirements of EU-US Privacy Shield and Swiss-US Privacy Shield.
Department of Commerce list of self-certified Privacy Shield.
Our certifications confirm that we comply with the Privacy Shield Principles for the transfer of European and Swiss personal data to the United States.
|Using CafeX in a PCI environment||To ensure credit card data security, we have undergone PCI-DSS compliance. |
See: CafeX PCI Certificate
See also: CafeX Legal and Compliance.