Editor pass for: https://github.com/fleetdm/fleet/pull/5484
14 KiB
Security policies
Information security policy and acceptable use policy
This Information Security Policy is intended to protect Fleet Device Management Inc's employees, contractors, partners, customers, and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, web browsing, and file transfers, are the property of Fleet Device Management Inc. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations.
Effective security is a team effort involving the participation and support of every Fleet Device Management Inc employee or contractor who deals with information and/or information systems. It is the responsibility of every team member to read and understand this policy and conduct their activities accordingly.
Acceptable use of end-user computing
Created from JupiterOne/security-policy-templates. CC BY-SA 4 license
Policy owner | Effective date |
---|---|
@GuillaumeRoss | 2022-06-01 |
Fleet requires all workforce members to comply with the following acceptable use requirements and procedures, such as:
-
The use of Fleet computing systems is subject to monitoring by Fleet IT and/or Security teams.
-
Fleet team members must not leave computing devices (including laptops and smart devices) used for business purposes, including company-provided and BYOD devices, unattended in public.
-
Device encryption must be enabled for all mobile devices accessing company data, such as whole-disk encryption for all laptops.
-
Use only legal software with a valid license installed through the internal "app store" or trusted sources. Well-documented open source software can be used. If in doubt, ask in #g-security.
-
Avoid sharing credentials. Secrets must be stored safely, using features such as GitHub secrets. For accounts and other sensitive data that need to be shared, use the company-provided password manager.
-
At Fleet, we are public by default. Sensitive information from logs, screenshots, or other types of data (memory dumps, for example), must be sanitized to remove any sensitive or confidential information prior to posting.
-
Anti-malware or equivalent protection and monitoring must be installed and enabled on all endpoint systems that may be affected by malware, including workstations, laptops and servers.
-
It is strictly forbidden to download or store any secrets used to sign Orbit installer updates on end-user computing devices, including laptops, workstations, and mobile devices.
-
Only company-owned and managed computers are allowed to connect directly to Fleet autoupdater production environments.
-
Fleet team members must not let anyone else use Fleet-provided and managed workstations unsupervised, including family members and support personnel of vendors. Use screen sharing instead of allowing them to access your system directly.
-
Device's operating system must be kept up to date. Fleet-managed systems will receive prompts for updates to be installed, and BYOD devices are to be updated by the team member using it or they might lose access.
-
Team members must not store sensitive data on portable storage.
-
The use of Fleet company accounts on "shared" computers, such as hotel kiosk systems, is strictly prohibited.
Risk management policy
Created from JupiterOne/security-policy-templates. CC BY-SA 4 license
Policy owner | Effective date |
---|---|
@GuillaumeRoss | 2022-06-01 |
Fleet policy requires that:
-
A thorough risk assessment must be conducted to evaluate potential threats and vulnerabilities to the confidentiality, integrity, and availability of sensitive, confidential, and proprietary electronic information Fleet stores, transmits, and/or processes.
-
Risk assessments must be performed with any major change to Fleet's business or technical operations and/or supporting infrastructure, no less than once per year.
-
Strategies shall be developed to mitigate or accept the risks identified in the risk assessment process.
Secure software development and product security policy
Created from JupiterOne/security-policy-templates. CC BY-SA 4 license
Fleet policy requires that:
-
Fleet software engineering and product development are required to follow security best practices. The product should be "Secure by Design" and "Secure by Default."
-
Fleet performs quality assurance activities. This may include:
- peer code reviews prior to merging new code into the main development branch (e.g., master branch).
- thorough product testing before releasing it to production (e.g., unit testing and integration testing).
-
Risk assessment activities (i.e., threat modeling) must be performed for a new product or major changes to an existing product.
-
Security requirements must be defined, tracked, and implemented.
-
Security analysis must be performed for any open source software and/or third-party components and dependencies included in Fleet software products.
-
Static application security testing (SAST) must be performed throughout development and prior to each release.
-
Dynamic application security testing (DAST) must be performed prior to each release.
-
All critical or high severity security findings must be remediated prior to each release.
-
All critical or high severity vulnerabilities discovered post-release must be remediated in the next release or as per the Fleet vulnerability management policy SLAs, whichever is sooner.
-
Any exception to the remediation of a finding must be documented and approved by the security team or CTO.
Human resources security policy
Created from JupiterOne/security-policy-templates. CC BY-SA 4 license
Policy owner | Effective date |
---|---|
@GuillaumeRoss | 2022-06-01 |
Fleet is committed to ensuring all workforce members participate in security and compliance in their roles at Fleet. We encourage self-management and reward the right behaviors.
Fleet policy requires all workforce members to comply with the HR Security Policy.
Fleet policy requires that:
-
Background verification checks on candidates for employees and contractors with production access to the Fleet automatic updater service must be carried out in accordance with relevant laws, regulations, and ethics. These checks should be proportional to the business requirements, the classification of the information to be accessed, and the perceived risk.
-
Employees, contractors, and third-party users must agree to and sign the terms and conditions of their employment contract and comply with acceptable use.
-
Employees will perform an onboarding process that familiarizes them with the environments, systems, security requirements, and procedures that Fleet already has in place. Employees will also have ongoing security awareness training that is audited.
-
Employee offboarding will include reiterating any duties and responsibilities still valid after terminations, verifying that access to any Fleet systems has been removed, and ensuring that all company-owned assets are returned.
-
Fleet and its employees will take reasonable measures to ensure no sensitive data is transmitted via digital communications such as email or posted on social media outlets.
-
Fleet will maintain a list of prohibited activities that will be part of onboarding procedures and have training available if/when the list of those activities changes.
-
A fair disciplinary process will be used for employees suspected of committing breaches of security. Fleet will consider multiple factors when deciding the response, such as whether or not this was a first offense, training, business contracts, etc. Fleet reserves the right to terminate employees in the case of severe cases of misconduct.
-
Fleet will maintain a reporting structure that aligns with the organization's business lines and/or individual's functional roles. The list of employees and reporting structure must be available to all employees.
-
Employees will receive regular feedback and acknowledgment from their managers and peers. Managers will give constant feedback on performance, including but not limited to during regular one-on-one meetings.
-
Fleet will publish job descriptions for available positions and conduct interviews to assess a candidate's technical skills as well as soft skills prior to hiring.
-
Background checks of an employee or contractor must be performed by operations and/or the hiring team prior to the start date of employment.
Encryption policy
Created from JupiterOne/security-policy-templates. CC BY-SA 4 license
Policy owner | Effective date |
---|---|
@GuillaumeRoss | 2022-06-01 |
Fleet requires all workforce members to comply with the encryption policy, such that:
-
The storage drives of all Fleet-owned workstations must be encrypted, and enforced by the IT and/or security team.
-
Confidential data must be stored in a manner that supports user access logs.
-
All Production Data at rest is stored on encrypted volumes.
-
Volume encryption keys and machines that generate volume encryption keys are protected from unauthorized access. Volume encryption key material is protected with access controls such that the key material is only accessible by privileged accounts.
-
Encrypted volumes use strong cipher algorithms, key strength, and key management process as defined below.
-
Data is protected in transit using recent TLS versions with ciphers recognized as secure.
Local disk/volume encryption
Encryption and key management for local disk encryption of end-user devices follow the defined best practices for Windows, macOS, and Linux/Unix operating systems, such as Bitlocker and FileVault.
Protecting data in transit
-
All external data transmission is encrypted end-to-end. This includes, but is not limited to, cloud infrastructure and third-party vendors and applications.
-
Transmission encryption keys and systems that generate keys are protected from unauthorized access. Transmission encryption key materials are protected with access controls and may only be accessed by privileged accounts.
-
TLS endpoints must score at least an "A" on SSLLabs.com.
-
Transmission encryption keys are limited to use for one year and then must be regenerated.
Access control policy
Created from JupiterOne/security-policy-templates. CC BY-SA 4 license
Policy owner | Effective date |
---|---|
@GuillaumeRoss | 2022-06-01 |
Fleet requires all workforce members to comply with the following acceptable use requirements and procedures, such that:
-
Access to all computing resources, including servers, end-user computing devices, network equipment, services, and applications, must be protected by strong authentication, authorization, and auditing.
-
Interactive user access to production systems must be associated with an account or login unique to each user.
-
All credentials, including user passwords, service accounts, and access keys, must meet the length, complexity, age, and rotation requirements defined in Fleet security standards.
-
Use a strong password and two-factor authentication (2FA) whenever possible to authenticate to all computing resources (including both devices and applications).
-
2FA is required to access any critical system or resource, including but not limited to resources in Fleet production environments.
-
Unused accounts, passwords, and access keys must be removed within 30 days.
-
A unique access key or service account must be used for different applications or user access.
-
Authenticated sessions must time out after a defined period of inactivity.
Access authorization and termination
Fleet policy requires that:
-
access authorization shall be implemented using role-based access control (RBAC) or a similar mechanism.
-
standard access based on a user's job role may be pre-provisioned during employee onboarding. All subsequent access requests to computing resources must be approved by the requestor’s manager prior to granting and provisioning of access.
-
access to critical resources, such as production environments, must be approved by the security team in addition to the requestor’s manager.
-
access must be reviewed on regularly and revoked if no longer needed.
-
upon termination of employment, all system access must be revoked, and user accounts terminated within 24 hours or one business day, whichever is shorter.
-
all system access must be reviewed at least annually and whenever a user's job role changes.
Shared secrets management
Fleet policy requires that:
-
use of shared credentials/secrets must be minimized.
-
if required by business operations, secrets/credentials must be shared securely and stored in encrypted vaults that meet the Fleet data encryption standards.
Privileged access management
Fleet policy requires that:
-
automation with service accounts must be used to configure production systems when technically feasible.
-
use of high privilege accounts must only be performed when absolutely necessary.