Security
Accops HySecure offers a robust set of inbuilt security features and compliances for clients to securely connect to organizational resources. These features likely cover a wide range of standard security measures and regulatory requirements.
However, for customers who have specific compliance requirements beyond the standard features offered by Accops HySecure, there is a provision to address these on a case-by-case basis. This involves connecting with the support team to discuss and potentially implement additional compliance measures tailored to their specific needs.
System Security
-
For on-premise solutions, HySecure is delivered as a part of an ISO image of a security-hardened Linux-based distribution. The hardening is based on bank-grade security standards and industry best practices.
-
All passwords are maintained in an encrypted form.
-
Regular and stringent vulnerability assessments and penetration testing of HySecure are done based on OWASP Top 10 standards and industry best practices.
-
External third-party VA/PT reviews are conducted frequently.
-
Customizable TLS 1.2/1.3 cipher is set, which can be further hardened based on the organization's requirements and standards.
Audit Security
-
Detailed admin logs to track changes made by the privileged users.
-
Configuration of email notifications for sensitive events such as: - Users' First Login - User Login (For Critical Users) - User Logout - Account Lockout - Application Access - Access Control Expiry - New Device Registrations
-
In-built SIEM product - Accops Reporting Server; to provide analysis, reporting, and visualization of security anomalies.
-
Integration with existing syslog servers to dump activity/event logs.
-
Security Hotfixes & Patches released on the website and regular notifications are sent to the customers via email.
Authentication Support
-
Wide range of authentication mechanisms, including support for Active Directory, LDAPS, Radius, and SAML.
-
Mandatory certificate-based login mechanism for privileged users for added security.
Additional Support
-
Ability to screen a wide range of parameters like WAN IP, Geo Location, Device Details, etc., and create access policies to allow/disallow access to resources.
-
Support for customized password policies (for local native users) to be in line with the organization's internal policy.
-
Provision to automatically disable dormant accounts based on pre-configured rules.
-
Provides Stale User Management feature, that empowers the Administrator/Security officer to automatically revoke policies and registered profiles of users who have been deleted from Active Directory/LDAP Server.
-
Merge users with similar access requirements to a specific user group. Ability to apply policies that affect the group instead of setting up individual policies for each user.
-
Customize the web access portal's key sections like logos, titles, and other potentially identifiable information to obfuscate such details.