Generate Security Protocols

Guidelines for Secure Deployment and Configuration

As the product owners of Generate, we are committed to providing you with a secure and robust software solution. This document outlines our security practices and highlights important configuration items to consider when implementing Generate in your environment. 

Security Requirements

Authentication and Authorization 

Our software supports LDAP or OAuth integration to connect with your state’s active directory, ensuring centralized and secure user management. Regular auditing and updating of user access controls are crucial to maintaining the security of your system. 

Data Encryption

Data encryption is critical for protecting sensitive information. We encourage users to enable end-to-end encryption for data in transit using TLS 1.2 or higher and use SQL Server encryption for data at rest.  

Input Validation

To prevent common attacks such as SQL injection and XSS, we utilize input validation libraries to sanitize user inputs. Implementing regular security testing is ab essential step in our SDLC to ensure only valid data is processed by the application. 

Session Management

Secure session handling with strict timeouts and proper session termination mechanisms are managed through .NET and IIS session management components.  

Error Handling

Our secure error handling practices ensure that error messages do not expose sensitive information. Errors are logged securely, and users are directed to a general error page to avoid information leaks. 


Development Lifecycle Security Practices

Security Training

We mandate annual security awareness training for our developers and staff to stay updated on the latest security threats and best practices. Specialized training focuses on secure coding practices to mitigate common vulnerabilities. 

Code Reviews

Regular code reviews are conducted with a focus on identifying security vulnerabilities. Automated code review tools are employed to catch security issues early in the development process. 

Static Code Analysis

We utilize SonarQube for continuous static code analysis to identify and address security vulnerabilities, code smells, and security hotspots. SonarQube checks are integrated into our CI/CD pipeline to ensure coding standards are maintained. 

Dependency Management

Keeping third-party libraries and frameworks updated to their latest versions is a priority to mitigate known vulnerabilities.  


Deployment Security

Secure Configuration Management

We use GitHub and SourceTree for Configuration Management of Generate releases. Software changes are continuously deployed and monitored on the build server. Security scans are run on modified software to detect and fix security vulnerabilities.

.NET Updates

Our software relies on the .NET framework, and we prioritize keeping it updated to the latest stable versions. This ensures our application benefits from Microsoft’s latest security patches and performance improvements. 

Angular Code Updates

We consistently update our front-end Angular code to align with the latest security practices and OWASP recommendations. Implementing security features such as Content Security Policy (CSP) helps protect against client-side vulnerabilities like XSS. 

Network Segmentation

We recommend deploying Generate behind your state’s firewall for an additional layer of protection. Network segmentation helps isolate critical systems and limit the impact of potential security breaches. 

Logging

Comprehensive logging includes user login activity, access attempts, and error events. Using centralized logging solutions allows for effective analysis and incident response. Regularly reviewing logs for unusual activity helps in promptly addressing security incidents. 


Incident Response Plan

ISO/IEC 27001 Compliance

Our ISO/IEC 27001 certification demonstrates our commitment to information security management best practices. We regularly review and update our incident response plan to address emerging threats and vulnerabilities, and conduct regular drills and training to ensure we are prepared for security incidents. 

Implementing these security practices and configuration recommendations will help you maintain a secure environment for deploying and running the Generate application. If you have any questions or need further assistance, please do not hesitate to contact us. 

Last updated

Was this helpful?