Hamurlabs takes the confidentiality and integrity of its customer data very seriously and strives to assure data is protected from unauthorized access and is available when needed.
This policy outlines many of the procedures and technical controls in support of data protection.
Production systems that create, receive, store, or transmit Hamurlabs customer data (hereafter “Production Systems”) must follow the requirements and guidelines described in this policy.
The acting information security officer and team will facilitate and maintain this policy and ensure all employees have reviewed and read the policy.
Hamurlabs policy requires that:
Hamurlabs hosts on Google Cloud Platform (GCP) in the US-Central1 (Iowa) region by default. Data is replicated or backed up across multiple regions for redundancy and disaster recovery.
All Hamurlabs employees adhere to the following processes to reduce the risk of compromising Production Data:
Hamurlabs employee access to production is guarded by an approval process and by default is disabled. When access is approved, temporary access is granted that allows access to production. Production access is reviewed by the security team on a case-by-case basis.
Customer data is logically separated at the database/datastore level using a unique identifier for the customer. The separation is enforced at the API layer where the client must authenticate with a chosen account and then the customer unique identifier is included in the access token and used by the API to restrict access to data to the account. All database/datastore queries then include the account identifier.
Hamurlabs uses Google Stackdriver and Elastic Cloud to monitor the entire cloud service operation. If a system failure and alarm is triggered, key personnel are notified by text, chat, and/or email message in order to take appropriate corrective action.
Hamurlabs uses confidentiality or non-disclosure agreements to protect confidential information using legally enforceable terms. NDAs are applicable to both internal and external parties. NDAs will have the following elements:
All databases, data stores, and file systems are encrypted according to Hamurlabs’s Encryption Policy.
Stored data must be properly categorized and a retention schedule applied accordingly in conjunction with Hamurlabs’s Asset Management Policy, Data Classification Policy, and Data Deletion Policy. Considerations for retention timeframe include:
Stored data must be properly stored and handled while at rest. Considerations for storage and disposal of data at rest in conjunction with Hamurlabs’s Asset Management Policy, Data Classification Policy, and Data Deletion Policy include:
Data will only be transferred where strictly necessary for effective business processes.
Before choosing the method of data transfer, the following must be considered:
To ensure the safety of data in transit:
Restricted and sensitive data is not allowed to be sent over electronic end-user messaging channels such as email or chat, unless end-to-end encryption is enabled.
All Hamurlabs systems that handle confidential information, accept network connections, or make access control (authentication and authorization) decisions will record and retain audit-logging information sufficient to answer: What activity was performed? Who performed it? Where, when, and how (with what tools) was it performed? And, what was the status, outcome, or result of the activity?
The logs will be created whenever the system is asked to perform any of the following activities:
Each log will identify or contain at least the following elements, directly or indirectly (unambiguously inferred):
To safeguard and prevent manipulation of logs by privileged users the following will be implemented where appropriate and possible: