AVM Cloud Security Whitepaper - 20 Nov
AVM Cloud Security Whitepaper - 20 Nov
AVM Cloud Security Whitepaper - 20 Nov
DISCLAIMER 2
CONTRIBUTORS 3
INTRODUCTION 4
INFORMATION SECURITY GOVERNANCE 5
INFORMATION SECURITY POLICIES 5
PERSONNEL QUALIFICATIONS 5
BEST-IN-CLASS SECURITY 6
COMPLIANCE CERTIFICATIONS 6
DATA SECURITY 6
DATA PROTECTION 6
Data In-Transit 7
Data At-Rest 7
DATA HANDLING 7
DATA CONTROL REQUIREMENTS 7
DATA ACCESS RESTRICTIONS 7
DATA STORAGE 8
DATA DELETION 8
SYSTEM ACQUISITION, DEVELOPMENT, AND MAINTENANCE 9
STEADY STATE PROTOCOLS 9
REQUIREMENT ANALYSIS AND RISK ASSESSMENT 9
TESTING AND QUALITY ASSURANCE (QA) PROCEDURES 9
CONFIGURATION MANAGEMENT 10
CHANGE MANAGEMENT 10
VULNERABILITY MANAGEMENT 10
VENDOR MANAGEMENT 10
PHYSICAL SECURITY 11
COMMUNITY SECURITY 12
NETWORK AND BOUNDARY SECURITY 12
OPERATIONAL SECURITY 13
ACCESS CONTROL 13
MULTI-FACTOR AUTHENTICATIN 13
ACCESS AND AUDIT LOGGING 13
ANTIVIRUS AND ANTI-MALWARE 13
SECURITY MONITORING 14
VULNERABILITY SCANNING 14
PENETRATION TESTING 14
DISASTER RECOVERY PLAN (DRP) 15
INCIDENT RESPONSE 15
INCIDENT NOTIFICATION 15
POST-CLOSURE ANALYSIS 15
Written By:
Nat Chan (Head of Pre-Sales Solutions Architect, AVM Cloud Sdn. Bhd.)
Edited By:
Hafis Murty (Product Specialist, AVM Cloud Sdn. Bhd.)
Reviewed By:
Andrew Lee Yin Chun (Cloud Operation Manager, AVM Cloud Sdn. Bhd.)
Jacky Ku Shin Haw (Senior Support Manager, AVM Cloud Sdn. Bhd.)
Lim Tee Keat (Senior System Engineer, AVM Cloud Sdn. Bhd.)
Wong Jyh Yian (Cloud Product Manager, AVM Cloud Sdn. Bhd.)
Endorsed By:
Lim Hui Sieng (ISO Compliance Manager, AVM Cloud Sdn. Bhd.)
Lai Eong Hua (General Technical Division Manager, AVM Cloud Sdn. Bhd.)
Kenny Lim (Chief Technology Officer, AVM Cloud Sdn. Bhd.)
AVM Cloud also provides customers with the ability to operate, access, and manage applications built upon
it. Users will be able to provision their own application environment based on our cloud-optimized reference
architecture. Once provisioned, users can develop, tailor, and manage the underlying application and data
components to meet their respective needs with full functional parity of the features, capabilities, and
services available on the AVM Cloud platform.
With this operating model, AVM Cloud customers administer and control the platform, the solutions built upon it, and
the data those applications present. AVM Cloud will maintain the supporting cloud platform and cloud infrastructure on
behalf of its customers.
AVM Cloud is committed to maintaining the highest levels of security on behalf of its customers. AVM
Cloud’s governance and security controls are structured around industry-standard security encryption
requirements, various management systems and protocols as described below.
PERSONNEL QUALIFICATIONS
AVM Cloud follows a formalized hiring practice that verifies that all potential new employees or internal
transfers are qualified for the responsibilities of their job functions. AVM Cloud’s Human Resources
department conducts and verifies background checks on all new employees and contractors. Upon
acceptance of employment, employees are required to acknowledge receipt and understanding of
compliance with the AVM Cloud code of conduct and confidentiality policies.
AVM Cloud requires that newly hired personnel, including employees, interns, and contractors, who support
the AVM Cloud Services receive and acknowledge Information Security Management System (ISMS)
awareness briefing related to organizational privacy and security requirements. This briefing and
acknowledgement are facilitated by AVM Cloud’s ISO Compliance team.
COMPLIANCE CERTIFICATIONS
AVM Cloud and its set of partners comply with the risk management and information security frameworks
listed below. This compliance is verified and certified, where appropriate, by way of comprehensive
assessments performed at least annually by qualified third-party and internal resources.
The AVM Cloud Group of Services complies with each of the following industry-recognized certifications,
accreditations, and regulations.
Note: ISO/IEC 27017:2015 which focuses on Cloud Security has been achieved as an extension of ISO/IEC 27001:2013
DATA SECURITY
AVM Cloud recognizes the importance of data privacy for our customers and their end users. To maintain
the utmost levels of data privacy, protection, and handling, its compliance and legal teams have developed
comprehensive privacy controls to restrict the level of personal information visible and accessible to
employees who manage AVM Cloud Services environments on our customers’ behalf.
DATA PROTECTION
AVM Cloud values data security and ensures that data in-transit and at-rest are protected by encrypting
data across all virtual instances and backup environments leveraging on state-of-the-art encryption tools
and key management systems provided by our Technology Partners.
Customers (Tenants) have the responsibility of handling encryption of their in-transit data outside of the
AVM Cloud environment and within their own internal environment. This can be carried out using an end-
to-end encrypted tunnel during data transmission which could be subscribed via AVM Cloud’s security
services.
For customers who require encrypted communication for remote access to applications hosted within AVM
Cloud, they can leverage on AVM Cloud’s SSL VPN Service. Our SSL VPN service allows up to 100 unique
VPN users to connect to the services hosted within AVM Cloud through an encrypted tunnel from anywhere
via an SSL VPN Client.
Alternatively, when a site-to-site tunnel is required, this can also be carried out via an establishment of a
secured IPSEC tunnel between customers’ on-premises firewall and AVM Cloud’s Firewall services.
Data At-Rest
AVM Cloud utilizes industry standard cryptography (AES-256) to protect and secure data at rest anywhere
within AVM Cloud Services boundaries for all management plane workloads. For customers who have
compliance and security requirements in encrypting data at rest within their subscribed storage services,
AVM Cloud can enable storage-based encryption for customers’ VDC on a per request basis.
DATA HANDLING
Significant measures are taken to ensure that customers retain complete ownership of their data when using
AVM Cloud Services. AVM Cloud, having obtained Sovereign Cloud status, allows Customers (Tenants) to
use the full benefits of Cloud Services while complying with data residency and sovereignty regulations. In
other words, these Sovereign Cloud solutions are built specifically to deliver security and data access that
meet the strict requirements of regulated industries and local jurisdiction laws on data privacy, access, and
control.
To ensure higher measures in monitoring and handling data access, Customers (Tenants) are strongly
advised to implement an end-to-end Role Based Access Control (RBAC) within the deployed environment
to ensure that highly privileged roles are assigned only to Customers’ (Tenants) VPC administrator users. In
order to further enhance security through an additional layer of user control that allows real-time session
monitoring, Customers (Tenants) can subscribe to AVM Cloud’s PAM Services. This service only allows
users with the right control and authority to access certain workloads and subsequently the data, with
additional features such as session monitoring for traceability of user actions performed during a privileged
session.
DATA STORAGE
AVM Cloud is deeply committed to maintaining customer data privacy. AVM Cloud customer data is not
stored in any on-premises environment outside of that individual AVM Cloud instance. Secure media
handling and destruction procedures are handled by AVM Cloud Support team.
DATA DELETION
AVM Cloud regularly assesses its compliance for adherence to secure data deletion policies and processes.
When a contract termination occurs, AVM Cloud issues a 7-day notice period during which customers can
validate that all data migration has been completed. An extended period for validation and data migration
is available upon request.
Upon receiving a final confirmation from the customer, all customer data and any possible copies are
completely deleted by AVM Cloud. If there is no confirmation given by the customer within the 7-day or
extended period, AVM Cloud will remove all customer’s data by default.
CHANGE MANAGEMENT
AVM Cloud documents any proposed changes to its cloud offering within a secure, internal ticketing system.
Change request tickets must outline detailed descriptions, implementation steps, impact assessments,
backout procedures, and requisite approvals for each proposed change.
Every proposed change must be reviewed and approved prior to implementation by the AVM Cloud internal
team, comprised of senior technical leaders spanning the Information Security, IT Operations, Cloud, and
Support teams.
Upon approval, AVM Cloud engineering team implements the required changes either during standard
maintenance windows or during time periods pre-approved by the customer. A post-deployment QA
validation is performed for each change to ensure system functionality and integrity are maintained once
implemented.
VULNERABILITY MANAGEMENT
AVM Cloud develops, documents, and disseminates a set of procedures for implementing vendor-provided
security patches, quick-fix engineering, and updates for Microsoft Windows- and Unix-based system
components that is used to build AVM Cloud Services. AVM Cloud support team implements these
procedures at least once a month within a scheduled maintenance window. If critical or zero-day
vulnerabilities are identified, AVM Cloud works with individual customers to establish a scheduled
maintenance window in which to update or patch the critical vulnerability in AVM Cloud environment within
one month of detection.
VENDOR MANAGEMENT
AVM Cloud performs extensive vetting activities with all vendors before permitting system access or
engaging in its offered services. Due diligence activities include risk assessments, attestations of
compliance reviews, and regular reassessments to ensure that the individual personnel at each vendor
adhere to and continually comply with the same regulations, requirements, and standards that AVM Cloud
is required to maintain on behalf of its customers. Additionally, AVM Cloud requires all vendors to read and
acknowledge their understanding of all applicable access control policies and procedures required to
perform applicable duties. Besides that, all vendors are required to attend an Information Security
Management Briefing (ISMS) conducted by AVM Cloud’s ISO team.
In general, access to our critical assets used to support AVM Cloud Services are governed by AVM Cloud’s
operation and user control access and strict Operating Procedures practiced by our trusted and certified
Data Centre partner.
Our Data Centre partner practices a 8 layer security mechanism in ensuring physical access security.
Customers (Tenants) can setup a first line of defence before accessing the VPC. AVM Cloud provides
different network firewall options that can serve as a perimeter firewall to protect the customers’ VPC.
Customers (Tenants) may also choose NSX Edge Gateway and Firewall Services which provides NAT,
routing and networking services that connect networks within the VPC to networks outside of the VPC.
Alternatively, Customers (Tenants) can also opt for FortiGate Firewall which is an industry leader within the
security scene.
In ensuring virtual machine security protection, Customers (Tenants) may also choose to leverage on TREND
MICRO DEEP SECURITY SERVICE where Customers (Tenants) will also be eligible for additional features
such as Intrusion Prevention (IPS), Firewall, Web Reputation, Integrity Monitoring (IM) and Log Inspection.
Besides that, AVM Cloud also offers Managed Services for Firewall and Cyber Security where Customers
(Tenants) are able to offload IT personnel from the operational task of managing and monitoring Firewalls in
the Customers’ (Tenants) AVM VPC subscription. Customers (Tenants) will also receive monthly reports and
incident alerts that the SOC (Security Operation Centre) discovers.
Alternatively, Customers (Tenants) may opt to subscribe to Anti-DDoS services on top of the subscribed
dedicated bandwidth offered by AVM Cloud. This allows for Customers’ (Tenants) applications to have
connectivity to the public internet while having in-line DDOS protection. Traffic targeted towards Customers’
(Tenants) VPC will be screened through and scrubbed if any unusual spike in traffic is observed.
Customers (Tenants) who are hosting websites or web applications on AVM Cloud can safeguard their
websites and web applications against various cyber threats targeted towards the application layer through
the implementation of a web application firewall (WAF). AVM Cloud provides different WAF services targeted
for different use cases, where Customers (Tenants) can opt for a shared WAF (AVM WAF Services) or
dedicated WAF (FORTIWEB) to be deployed within each Customers’ (Tenants) individual account to provide
additional application layer protection. Both WAF offerings filter, monitor, and block malicious HTTP traffic
to and from a web service which in turn protects the Customers’ (Tenants) business-critical web applications
from attacks that target known and unknown vulnerabilities.
Besides that, AVM Cloud also offers Managed Services for WAF where Customers (Tenants) are able to
offload IT personnel from the operational task of managing and monitoring Web Application Firewall (WAF)
in the Customers’ (Tenants) AVM VPC subscription.
ACCESS CONTROL
The AVM Cloud Support team leverages centralized directory services and automated technical
solutions to provision, monitor, modify, or revoke privileged user accounts established for each unique
deployment. These components provide Role-based Access Control (RBAC), which is the ability to
strictly control access to each environment.
MULTI-FACTOR AUTHENTICATION
AVM Cloud requires that all remote and privileged access to its management stack are protected by multi-
factor authentication (MFA), reducing the possibility of identity theft and unauthorized access. Within the
application layer, customers may also choose to integrate with their own MFA solutions for their end users
or leverage AVM Marketplace’s MFA solution provided by our trusted partner.
For Customers’ (Tenants) workloads, Customers (Tenants) may also subscribe to AVM Cloud’s
KIWISYSLOG SERVER to monitor servers, switches, firewalls, and routers. AVM Cloud’s self-service syslog
allows Customers (Tenants) to easily setup and capture syslog messages and store them in a centralized
location, providing a unified view of system events across Customers' (Tenants) network, whether it is within
AVM’s VPC or Customers' (Tenants) on-premise servers.
Alternatively, Customers (Tenants) may also subscribe to these services from AVM Cloud. AVM Cloud offers
TREND MICRO DEEP SECURITY SERVICE which can cater to Customers (Tenants) requirement for Anti-
Malware protection. This Agent-based Anti-Malware solution is a proven and widely used software for data
protection.
VULNERABILITY SCANNING
AVM Cloud employs extensive vulnerability scanning and analysis across all levels of its technology stack.
AVM Cloud assigns fully qualified internal resources and leverages automated technical solutions to
conduct vulnerability scans quarterly in accordance with industry-accepted guidelines. When and if
applicable, qualified external resources perform remediation scans until all requirements are met.
PENETRATION TESTING
AVM Cloud also enlists the services of a qualified third-party provider to perform penetration testing services
for AVM Cloud, complete security reviews of the platform application and network boundary, tests ingress
and egress controls, and test isolation and segregation controls. When applicable, this third-party provider
performs remediation scans within 60 days until all requirements are met.
Customers’ (Tenants) DRP is dependent on the requirements and needs and will require additional
solutioning based on the Recovery Point Objective (RPO) and Recovery Time Objective (RTO) needs. AVM
Cloud has multiple services that could contribute to a DR solution and additional services will be required
to complete a DRP.
INCIDENT RESPONSE
AVM Cloud implements a coordinated incident response process to effectively identify and resolve any
security incidents involving AVM Cloud information systems and associated data for these environments.
AVM Cloud implements detective measures to identify potential security incidents and determine severity
and impacts in a coordinated manner, and to ensure all incidents are properly investigated and tracked to
resolution by trained AVM Cloud personnel.
INCIDENT NOTIFICATION
If a confirmed security incident impacts an AVM Cloud customer, AVM Cloud Support team will promptly
notify the affected customer based on respective contractual obligations and in accordance with
established incident response plan policies and procedures, unless otherwise delayed by direction from law
enforcement. It should also be noted that incident notifications are only given to customers who have
subscribed to AVM Cloud’s Security Operations Centre (SOC) and Firewall services only.
POST-CLOSURE ANALYSIS
Closed incidents are routinely reassessed to identify systemic weaknesses, threats, vulnerabilities, and any
trends that can help the AVM Cloud Support team perform preventive measures that may proactively
decrease the occurrence of specific incidents.