Software security¶
Software security is one of the most important aspect of software development life cycle as it ensures not only protection of customer data but also protect software from attackers. Software security depends on the nature and architecture of the software. In our solution IEM Virtual as the name Virtual explain everything that is deployed in virtual form is using tools and servers like VMWare workstation, ESXi on customer infrastructure. When it comes to virtual backup of a software will be main aspect in developing and deploying a software. So IEM Virtual should be deployed in restricted environment.
In our solution, IEM is deployed in a virtual environment on the customer's infrastructure. The customer needs to protect it by the following means:
-
Deployment: Customer should deploy IEM Virtual in a strict and secure location. Because it is deployed as a virtual machine, the customer must ensure that no unauthorized physical access is allowed to the virtual machine.
-
Network security: The customer must ensure that IEM Virtual can only be accessed from an authorized network and cannot be accessed by unauthorized users.
-
Confidentiality: In IEM Virtual, confidentiality can be understood as keeping credential and recovery key in safe place as it will be used in disaster recovery. If somehow recovery key is compromised, then attacker can login to service & maintenance user interface and perform some operation like OS update, log, shutdown, regenerate recovery key.
-
Data security and Host system security: Currently, IEM Virtual is deployed on customer infrastructure, so maintaining network security and confidentiality is not enough. The customer must also secure the hardware where the system is deployed, such as:
- Only authorized persons should have access to this system.
- Continuous monitoring when host resources are shared with other software.
- Recovery key.
-
Data Protection: Current release of IEM Virtual does not support TPM for disk encryption. So if required then user can add extra layer for data protection by encrypting VM from virtualization environment.