SlideShare a Scribd company logo
1 of 3
Download to read offline
Copyright © ActionStep Limited Page 1 of 3 Updated October 2014
Infrastructure and Security
Introduction
ActionStep is a “Cloud” based service meaning that the software and data are centrally hosted and
accessed by clients using a web browser and Internet connection. This document is intended to answer
questions around the infrastructure, security, and intellectual property rights associated with the software
and the data.
ActionStep takes data security very seriously and follows generally-accepted best practices to ensure that
clients’ data is backed-up and protected against unauthorized access.
Hosting Environments
Except for New Zealand, ActionStep uses the secure Amazon Web Services (AWS) infrastructure to
provide a secure and scalable platform to clients around the world. ActionStep clients are generally hosted
in the AWS region that meets their data sovereignty and performance requirements. Security specifications
can be found on http://aws.amazon.com/security/, and locations at http://aws.amazon.com/about-
aws/globalinfrastructure/ .
United Sates and Canada
Clients can choose between the following regions:
• AWS US West 2 (Oregon)
• AWS US East 1 (N. Virginia)
United Kingdom and Europe
AWS EU West 1 (Ireland).
New Zealand
In New Zealand the servers are located in purpose-built high-availability data centres with a Tier II or
higher classification. The data centres have 7×24 video surveillance, sophisticated access control policies
(for example biometrics and photo ID), fire protection, and power backup.
Australia
AWS AP Southeast 2 (Sydney).
Data Sovereignty
New Zealand clients are hosted at primary and secondary data centres in New Zealand and no hosted
information is stored outside of New Zealand. Australian clients can choose have their data hosted in New
Zealand or on any of the currently supported AWS regions. Clients in other countries can choose to have
their data hosted on one of the currently-supported AWS regions.
Copyright © ActionStep Limited Page 2 of 3 Updated October 2014
Password Policies
ActionStep allows clients to implement password policies by system role. The password policies include
the following settings:
• Minimum length
• Inclusion of special characters
• Forced mixed case or numeric content
• Expiry time
• Password rotation minimum
• Time of day and day of week access windows
• Source IP address restrictions
User Permissions
Clients can control who has access to the system by adding and removing logins as required. Each login is
associated with a specific system role which governs the access rights to all aspects of the application such
as which pages or menu items they can see and whether they can create, view, edit or delete data.
Audit Trails
Audit trails and session logs record user activity and changes made to the data by each user.
Intrusion Detection
The servers run perimeter protection software and log unauthorized attempts to access the systems and
add these to blacklists.
Network Layer Security
The networks are split into private (non-routable) and public subnets with a firewall between them. Access
to the private subnets can only be achieved over encrypted Virtual Private Network (VPN) links. The
public subnets restrict access to HTTP(S) ports only and all other ports are disabled. Password access is
disabled for all servers and the only access is via encrypted keys over SSH.
Application Layer Security
All data transmitted between ActionStep and the user is encrypted via HTTPS.
System Administration Procedures
Systems administrators monitor the systems in real-time for any errors or unusual activity and record the
events and action taken in an electronic log.
Frequently Asked Questions
Is my data encrypted?
All data transmitted between you and ActionStep are encrypted using SSL.
Can full backups of data be provided as an automatic download?
Yes. You can extract your data to vendor-neutral spreadsheet and HTML formats and documents are
provided in their original formats (DOC, XLS, JPEG, etc). You can request a backup whenever you wish by
Copyright © ActionStep Limited Page 3 of 3 Updated October 2014
pressing the “Backup” button in Workflow Admin and providing an encryption password to protect your
backup during download. Once the backup is completed you will be emailed a download link.
Alternatively to can arrange to have a dedicated backup to one of your internal servers. ActionStep will
send an initial full backup to your server followed by nightly incremental backups. Additional fees apply for
this service.
Who owns the intellectual property?
Anything you enter into ActionStep belongs to you. ActionStep owns the core system and any modules or
extensions we develop. Data ownership rights are clearly set forth in the Terms of Use – See
http://www.actionstep.com/terms.
The intellectual property with respect to workflow configurations and associated document templates are
owned by the originator. If a client creates their own custom configurations then these intellectual
property rights belong to the client. Configurations can be distributed or sold by the copyright holder if
they wish.
Who has access to your data and under what circumstances?
The client has exclusive access to the data via username and password. ActionStep support staff may
access client’s data for support purposes with the client’s permission.
Can ActionStep staff see my password?
No. Passwords are encrypted on the servers. If you forget your password ActionStep can create a new
password for you but are not able to see your current password.
If you terminate the service, how is your data returned to you?
You can request a full backup of all your data and documents upon termination of the agreement.
If you terminate the service, what happens to your data on the provider’s servers?
ActionStep will remove all data from the servers after termination.
Does the provider have a policy to ensure confidentiality?
Yes. Confidentiality is set forth in the Service Utilization Agreement between the client and ActionStep.
ActionStep staff are required to enter into a confidentiality agreement under the terms of their
employment.

More Related Content

What's hot

Azure security infographic 2014 sec
Azure security infographic 2014 secAzure security infographic 2014 sec
Azure security infographic 2014 secKesavan Munuswamy
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudNexgen Technology
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbmsZaid Shabbir
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageNagamalleswararao Tadikonda
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditingPapitha Velumani
 
BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare Ryan Gallavin
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Naveena N
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security FundamentalsLorenzo Barbieri
 
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...chennaijp
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloudSusheenthiran Sujith
 
expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...swathi78
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Shakas Technologies
 
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...European Collaboration Summit
 

What's hot (17)

Azure security infographic 2014 sec
Azure security infographic 2014 secAzure security infographic 2014 sec
Azure security infographic 2014 sec
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudOruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Cloud computing & dbms
Cloud computing & dbmsCloud computing & dbms
Cloud computing & dbms
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Oruta privacy preserving public auditing
Oruta privacy preserving public auditingOruta privacy preserving public auditing
Oruta privacy preserving public auditing
 
BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
IJSRED-V2I5P16
IJSRED-V2I5P16IJSRED-V2I5P16
IJSRED-V2I5P16
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...JPJ1407   Expressive, Efficient, and Revocable Data Access Control for Multi-...
JPJ1407 Expressive, Efficient, and Revocable Data Access Control for Multi-...
 
Data sharing with accountability in cloud
Data sharing with accountability in cloudData sharing with accountability in cloud
Data sharing with accountability in cloud
 
expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...
 
Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds Privacypreservingdelegatedaccesscontrolinpublicclouds
Privacypreservingdelegatedaccesscontrolinpublicclouds
 
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...ECS19 -  Bram De Jager - Design a secure collaboration solution with Azure In...
ECS19 - Bram De Jager - Design a secure collaboration solution with Azure In...
 

Viewers also liked (20)

Schema act
Schema actSchema act
Schema act
 
Journal du Citoyen 5
Journal du Citoyen 5Journal du Citoyen 5
Journal du Citoyen 5
 
Belles maximes de vie
Belles maximes de vieBelles maximes de vie
Belles maximes de vie
 
Cima 75
Cima 75Cima 75
Cima 75
 
Harmonisation des prescriptions "béton" dans les CCTP de la DIR CE
Harmonisation des prescriptions "béton" dans les CCTP de la DIR CEHarmonisation des prescriptions "béton" dans les CCTP de la DIR CE
Harmonisation des prescriptions "béton" dans les CCTP de la DIR CE
 
Aaaaaaaaaaaaaaaaaaaaaaaaa
AaaaaaaaaaaaaaaaaaaaaaaaaAaaaaaaaaaaaaaaaaaaaaaaaa
Aaaaaaaaaaaaaaaaaaaaaaaaa
 
CFI - Bulletin #4
CFI - Bulletin #4CFI - Bulletin #4
CFI - Bulletin #4
 
Svg canvas
Svg canvasSvg canvas
Svg canvas
 
Gazette du 28 août au 4 octobre 2012
Gazette du 28 août au 4 octobre 2012Gazette du 28 août au 4 octobre 2012
Gazette du 28 août au 4 octobre 2012
 
Défiléhippodrome
DéfiléhippodromeDéfiléhippodrome
Défiléhippodrome
 
French presentation
French presentationFrench presentation
French presentation
 
Cauchemars de la cuisine
Cauchemars de la cuisineCauchemars de la cuisine
Cauchemars de la cuisine
 
Programme La route du Cirque
Programme La route du CirqueProgramme La route du Cirque
Programme La route du Cirque
 
Défiléjeanned'arc
Défiléjeanned'arcDéfiléjeanned'arc
Défiléjeanned'arc
 
7 giambono, retable du couronnement de la vierge vernier-lopin
7 giambono, retable du couronnement de la vierge vernier-lopin7 giambono, retable du couronnement de la vierge vernier-lopin
7 giambono, retable du couronnement de la vierge vernier-lopin
 
[Tutoriel] Studio de développement RPG SilverDev Designer
[Tutoriel] Studio de développement RPG SilverDev Designer[Tutoriel] Studio de développement RPG SilverDev Designer
[Tutoriel] Studio de développement RPG SilverDev Designer
 
Europatour
EuropatourEuropatour
Europatour
 
Pack office
Pack officePack office
Pack office
 
Phrases module 3
Phrases module 3Phrases module 3
Phrases module 3
 
Au fil de l'eau
Au fil de l'eauAu fil de l'eau
Au fil de l'eau
 

Similar to Infrastructure and security (2)

Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security OvervewIvotefan
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudRightScale
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaperrun_frictionless
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxgriffinruthie22
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology EssayPamela Wright
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfAmazon Web Services
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxcockekeshia
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 

Similar to Infrastructure and security (2) (20)

Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security Overvew
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Circuit security
Circuit securityCircuit security
Circuit security
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
 
Unit-II-part 3.pdf
Unit-II-part 3.pdfUnit-II-part 3.pdf
Unit-II-part 3.pdf
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
Paper2
Paper2Paper2
Paper2
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 

Recently uploaded

Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Dipal Arora
 
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls JaipurRussian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...perfect solution
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋TANUJA PANDEY
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiAlinaDevecerski
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomdiscovermytutordmt
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...narwatsonia7
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableDipal Arora
 
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...Taniya Sharma
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...aartirawatdelhi
 
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeCall Girls Delhi
 
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Recently uploaded (20)

Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
 
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls JaipurRussian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD available
 
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
 
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
 
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
 

Infrastructure and security (2)

  • 1. Copyright © ActionStep Limited Page 1 of 3 Updated October 2014 Infrastructure and Security Introduction ActionStep is a “Cloud” based service meaning that the software and data are centrally hosted and accessed by clients using a web browser and Internet connection. This document is intended to answer questions around the infrastructure, security, and intellectual property rights associated with the software and the data. ActionStep takes data security very seriously and follows generally-accepted best practices to ensure that clients’ data is backed-up and protected against unauthorized access. Hosting Environments Except for New Zealand, ActionStep uses the secure Amazon Web Services (AWS) infrastructure to provide a secure and scalable platform to clients around the world. ActionStep clients are generally hosted in the AWS region that meets their data sovereignty and performance requirements. Security specifications can be found on http://aws.amazon.com/security/, and locations at http://aws.amazon.com/about- aws/globalinfrastructure/ . United Sates and Canada Clients can choose between the following regions: • AWS US West 2 (Oregon) • AWS US East 1 (N. Virginia) United Kingdom and Europe AWS EU West 1 (Ireland). New Zealand In New Zealand the servers are located in purpose-built high-availability data centres with a Tier II or higher classification. The data centres have 7×24 video surveillance, sophisticated access control policies (for example biometrics and photo ID), fire protection, and power backup. Australia AWS AP Southeast 2 (Sydney). Data Sovereignty New Zealand clients are hosted at primary and secondary data centres in New Zealand and no hosted information is stored outside of New Zealand. Australian clients can choose have their data hosted in New Zealand or on any of the currently supported AWS regions. Clients in other countries can choose to have their data hosted on one of the currently-supported AWS regions.
  • 2. Copyright © ActionStep Limited Page 2 of 3 Updated October 2014 Password Policies ActionStep allows clients to implement password policies by system role. The password policies include the following settings: • Minimum length • Inclusion of special characters • Forced mixed case or numeric content • Expiry time • Password rotation minimum • Time of day and day of week access windows • Source IP address restrictions User Permissions Clients can control who has access to the system by adding and removing logins as required. Each login is associated with a specific system role which governs the access rights to all aspects of the application such as which pages or menu items they can see and whether they can create, view, edit or delete data. Audit Trails Audit trails and session logs record user activity and changes made to the data by each user. Intrusion Detection The servers run perimeter protection software and log unauthorized attempts to access the systems and add these to blacklists. Network Layer Security The networks are split into private (non-routable) and public subnets with a firewall between them. Access to the private subnets can only be achieved over encrypted Virtual Private Network (VPN) links. The public subnets restrict access to HTTP(S) ports only and all other ports are disabled. Password access is disabled for all servers and the only access is via encrypted keys over SSH. Application Layer Security All data transmitted between ActionStep and the user is encrypted via HTTPS. System Administration Procedures Systems administrators monitor the systems in real-time for any errors or unusual activity and record the events and action taken in an electronic log. Frequently Asked Questions Is my data encrypted? All data transmitted between you and ActionStep are encrypted using SSL. Can full backups of data be provided as an automatic download? Yes. You can extract your data to vendor-neutral spreadsheet and HTML formats and documents are provided in their original formats (DOC, XLS, JPEG, etc). You can request a backup whenever you wish by
  • 3. Copyright © ActionStep Limited Page 3 of 3 Updated October 2014 pressing the “Backup” button in Workflow Admin and providing an encryption password to protect your backup during download. Once the backup is completed you will be emailed a download link. Alternatively to can arrange to have a dedicated backup to one of your internal servers. ActionStep will send an initial full backup to your server followed by nightly incremental backups. Additional fees apply for this service. Who owns the intellectual property? Anything you enter into ActionStep belongs to you. ActionStep owns the core system and any modules or extensions we develop. Data ownership rights are clearly set forth in the Terms of Use – See http://www.actionstep.com/terms. The intellectual property with respect to workflow configurations and associated document templates are owned by the originator. If a client creates their own custom configurations then these intellectual property rights belong to the client. Configurations can be distributed or sold by the copyright holder if they wish. Who has access to your data and under what circumstances? The client has exclusive access to the data via username and password. ActionStep support staff may access client’s data for support purposes with the client’s permission. Can ActionStep staff see my password? No. Passwords are encrypted on the servers. If you forget your password ActionStep can create a new password for you but are not able to see your current password. If you terminate the service, how is your data returned to you? You can request a full backup of all your data and documents upon termination of the agreement. If you terminate the service, what happens to your data on the provider’s servers? ActionStep will remove all data from the servers after termination. Does the provider have a policy to ensure confidentiality? Yes. Confidentiality is set forth in the Service Utilization Agreement between the client and ActionStep. ActionStep staff are required to enter into a confidentiality agreement under the terms of their employment.