At FormAssembly, we’re dedicated to following security best practices both for our customers and our organization. Read on to learn about how we keep your account and data safe with different security policies and features, like our incident response policy, web application firewall, and intrusion detection system.
NIST CYBERSECURITY FRAMEWORK
We follow the NIST CyberSecurity Framework, which is a voluntary Framework consisting of standards, guidelines, and best practices to manage cybersecurity-related risks. The Framework helps to promote the protection and resilience of critical infrastructure and other sectors important to FormAssembly.
PCI DSS, GDPR, HIPAA, FERPA, EU-U.S. Privacy Shield Compliant
Our Policies, Procedures and Standards reference best practices:
ISO, FFIEC, GLBA, HIPAA, PCI DSS, NIST
DATA CENTER LOCATIONS
Our commitment to upholding
All FormAssembly employees undergo background checks and privacy and security training. FormAssembly also maintains a comprehensive and regularly updated set of Information Security policies that cover a wide range of best practices for secure workplace procedures. All policies, procedures, and standards are reviewed and approved annually.
Incident Response Policy
FormAssembly has an established Incident Response policy and procedure based on NIST guidelines that activates upon a security breach. In the event of an incident, we will notify you in a timely manner of any unauthorized access to your data. The FormAssembly Incident Response plan is tested annually or as needed.
FormAssembly has Disaster Recovery and Business Continuity plans in place, and all relevant personnel are apprised of their roles. In the event of a disaster, the FormAssembly Customer Support team will provide a disaster declaration notice to all affected customers. Disaster Recovery and Business Continuity plans are tested on an annual basis.
FormAssembly maintains a robust centralized logging environment where logs are reviewed on a daily basis. Logging is enabled in order to establish a sufficient audit trail for all access. Logging is performed at the application level as well. Automated audit trails are implemented to reconstruct system events and they’re secured, so they cannot be altered in any way. File Integrity Monitoring is monitoring these actions along with several other security controls to ensure we maintain confidentiality, integrity, and availability of all data.
Web Application Firewall
WAF, Security Groups, and IPtables are configured with deny-by-default policies. FormAssembly’s Web Application Firewall protects your data against common web attacks. We follow OWASP top 10 and SANS top 25 to ensure confidentiality, integrity, and availability of your data. Access control lists are reviewed throughout the year and any change must go through Change Management.
Intrusion Detection System
IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) are deployed at FormAssembly to increase network and server security. IDS/IPS monitor traffic and inspect packets for suspicious data. Detection in both systems is mainly based on signatures already detected and recognized. Signatures are updated and alerts are reviewed on a daily basis. Logs are sent to our centralized logger where they are reviewed on an ongoing basis. .