This statement provides an overview of OffshoreAlert’s approach to cyber security.
Cyber Security Statement
- Home
- Cyber Security Statement
Security policy
Our policies address the handling of personal, sensitive and confidential information. Policies are reviewed and communicated to all staff.
Third parties
Like many organizations, we use third parties to host or process customer information. We conduct technical due diligence against these third parties for their cyber risks and ensure our legal agreements with them appropriately address security and data handling. Where personal data will be processed outside the United States, we ensure appropriate safeguards are in place.
Employee security practices
We check our employee’s ID, references, and right to work. Cyber security is covered at employee inductions and training is offered on an ongoing basis, including bespoke training if relevant to the role. Violations of relevant policies could result in HR process enacting disciplinary action, up to and including dismissal.
Physical office & data center facilities
Our major offices and all data center facilities we use entry controls and we have controls in place to protect our systems from unauthorized access. These data centers are in the United States.
Infrastructure protection
We install anti-virus/malware on laptops and desktops. We install anti-virus/malware on servers that are normally affected. Our policy is to apply critical security patches immediately, and less severe updates within one month on servers, where practical. Our user and system networks are segregated. We deploy Network Intrusion Detection systems, run regular vulnerability scans, proactively scan encrypted connection (Transport Layer Security) configurations, and source code for vulnerabilities. Security logs are collected centrally (Security Event Information Management system).
Data protection
We encrypt all public system traffic in transit to international standards, and internally for all new systems. It is our policy to encrypt at rest where possible and practical. We dispose of old equipment securely and ethically. We limit access to production environments to only those who need access, and have environments for development, test and production.
Access control
We centrally manage access to many services. We use two-factor authentication wherever possible, especially for administrative access on key systems and for all staff using our remote access VPN. Our users have named accounts, and we prohibit shared users. We log activity and access for audit reasons and have password complexity and rotation policies in place. Users who have privileged or network access are reviewed on a regular basis and those who no longer need this access are removed.
Internal processes
Security requirements and design are considered for all projects and products, and we follow secure development practices. We have access controls on source code, and access is managed. All releases are tested. Our release checklist includes considering security issues. Where we do store user credentials (passwords) they are hashed. We use a third party to run periodic penetration tests of our systems, and review code, and we follow best application practices. We also have a bug bounty program to encourage responsible disclosure.
Business & incident management
We have cyber security incident response policies and plans in place. These cover detection, response, and reporting. We also have a 24×7 incident team.