Application Security
Application Architecture
- Role based access
- Organizations, Functiions/Groups
- Permission Templates
- Whitelisting IPs for exclusive access
Under Metroleads, each customer has a separate database, and we ensure that the code always fetches the data that belongs to only the logged in user. Per this design, no customer has access to another customer’s data. Access to the application by the Metroleads development team is also controlled, managed and audited . Access to the application and the infrastructure are logged for subsequent audits with AWS.
Physical Security
The Metroleads development centre in Pune is under 24×7 physical security protection. Only authorized personnel have access to the building and offices. Employees are granted access to the office only after authorization using biometric authentication. Important documents are stored in cabinets accessible only to authorized persons. The office is equipped with surveillance cameras and its images are regularly monitored by authorized persons. A policy has been implemented to approve and regulate visitor access to the building. The office is provided with 24×7 power supply, supported by an alternative uninterrupted power supply system to ensure smooth functioning in the event of power failure. Metroleads hosts its application and data in Amazon Web Services, whose data centres have been thoroughly tested for security, availability and business continuity.
Application Engineering and Development
We follow secure software development lifecycle, where security testing is part of development, testing and pre-release acceptance.
Software Changes and Release Management
Production deployments are only done by authorized Dev-ops team members, and nobody else has access to our production environment. Changes in our production environment follow a very well-defined, systematic process from development and test environments to verifying the changes finally on staging before production deployment.
Data Security
Data at rest is encrypted using AES-256 bit standards (key strength – 1024) with the keys being managed by AWS Key Management Service. All data in transit is encrypted using FIPS-140-2 standard encryption over a secure socket connection for all accounts hosted with us. Different environments are in use for development and testing purposes, access to systems are strictly managed, based on the principles of need to do/know basis appropriate to the information classification, with Segregation of Duties built in, and reviewed on a quarterly basis.
HIPAA Compliant
The certification is applicable across the entire Metroleads products and cloud services.
Data Deletion
When a customer account with Metroleads is terminated, we ensure that all their data is handed over to the customer and then deleted cleanly.
Network Security
The Metroleads office network where updates are developed, deployed, monitored and managed is secured by industry-grade firewalls and antivirus software, to protect internal information systems from intrusion and to provide active alerts in the event of a threat or an incident. Firewall logs are stored and reviewed periodically. Access to the production environment is via SSH and remote access is possible only via the office network. Audit logs are generated for each remote user session and reviewed. Also, the access to production systems are always through a multi-factor authentication mechanism. Our data centres are hosted in AWS are HIPAA compliant.
Reporting issues and threats
Public Disclosure Policy
By default, this program is in “PUBLIC NONDISCLOSURE” mode which means: “THIS PROGRAM DOES NOT ALLOW PUBLIC DISCLOSURE. ONE SHOULD NOT RELEASE THE INFORMATION ABOUT VULNERABILITIES FOUND IN THIS PROGRAM TO PUBLIC, FAILING WHICH SHALL BE LIABLE FOR LEGAL PROCEEDINGS!”
**We may modify the terms of this program or terminate this program at any time.