Security Design Template
Security Design Template
V2.1
September 24, 2012
[ COVER PAGE ]
[ Version No. ]
[ Date ]
2
Part 1: Introduction
Project Overview
3
Part 2: Architecture
Infrastructure Overview
Configuration Diagrams
No aplica
Monitoring
4
2.2 Application Security Architecture
Cuenta con API’s que utilizan XML y SOAP para entrega de la información
Diagram showing interaction between application logical components, including back-end and
manual processes.
Authentication Design
En este caso cuenta con un método de autenticación que puede conectarse con el AD de
Scotiabank, otra manera puede crear usuarios propios y asignar roles propios.
Los algoritmos de que utiliza para encriptar la información es Advanced Encryption Standard
(AES) de 128 bits.
Authorization Design
Application Security
• SAML 2
• CAS 2
• Oauth
Utiliza una herramienta de terceros que realiza el monitoreo de sistema de métricas, vía
SNMP.
5
2.3 Network Security Architecture
No aplica.
No aplica.
Hardening Baseline
Describe management of server hardening process from start to finish, including UAT and
Production environments, or confirm standard process as follows:
UAT Baseline
Production Baseline
6
2.5 Database Security Architecture
Hardening Baseline
DBR Classification
No aplica.
No aplica.
BCP Requirements
No aplica
7
2.9 Third-Party Processing Requirements
No aplica
8
Part 3: Component Descriptions
Complete the template on this page for each component in the processing environment
(Production and UAT). A component is a physical device, e.g. server, host, network device,
client device, etc.
Narrative
Other
9
Part 4: Security Implementation and Operations Design
Design of Controls:
10
Security Service Component Security Mechanism Residual Exposure
Components the following:
. stress testing strategy
. max. concurrent sessions
required (incl. front-end to
back-end relationship)
Management & Reporting:
Measurement Of . ISS Scans
Security Controls . Bindview scans
. Other
Processing Controls Production processing
requirements
Exception Handling Error handling requirements and
escalations
Monitoring Standard monitoring tools are
implemented and tested, where
appropriate:
. CPU
. memory
. disk I/O
. disk availability
. network connections
. sockets
. handlers
11
Application Controls Strategy
Module Reference:
Description:
12