Security Whitepaper - YSoft SAFEQ Cloud | Page 8

SECURITY WHITEPAPER

SECURITY WHITEPAPER

Application Logs
Application logs for troubleshooting are collected in cloud provider ’ s central log repository and available to support personnel on an as-needed basis . Logs do not expose any access / credentials related or document content information .
Customer ( tenant ) specific metadata ( users , devices , reporting , print job information , …)
Role-based administrator access allows portal management of devices and system reports . This access can be assigned to the business ’ administrator and / or maintained by a certified Y Soft partner reseller .
Access to the customer application management web interface is limited to support personnel on an as-needed basis upon authorization by the customer during incident management sessions .
For ( alternative ) shared infrastructure deployments , there is also a set of support accounts granted only to an extremely limited number of highly trained specialists responsible for application maintenance and management on an as-needed basis . Access to the data is logged to cloud provider ’ s audit logs .
Application / Edge Device Updates
Edge device application is managed by industry-standard tools and protocols and systems provided by cloud provider platform . Deployment is managed via tiered environment with separated development , testing , staging and production environment plus dedicated deployment plans per customer . Updates are transferred via encrypted and device authenticated HTTP / S communication .
Application components are stored in cloud provider ’ s secured artifact repository and deployed to cloud instances and edge devices using automated and secured state-of-the are tools ( also provided by the cloud platform ). All artefacts are created and deployed using secured development lifecycle process and managed by team of highly trained specialists responsible for application maintenance and management
Shared Infrastru cture
Shared Infrastructure
The cloud-based application , in this case YSoft SAFEQ Cloud provides services to multiple businesses , each one considered a separate ‘ tenant .’ In this multitenant scenario , each tenant must have its own metadata identification , separation , and protection
All above mentioned points apply
Each tenant owns a unique security certificate associated with its metadata
YSoft SAFEQ Cloud - 8 - YSOFT . COM