Árvore de páginas

Versões comparadas

Chave

  • Esta linha foi adicionada.
  • Esta linha foi removida.
  • A formatação mudou.

Índice
maxLevel4
outlinetrue
exclude.*ndice
stylenone


Nota
titleNotification

Click here to check out our recommendations on Good security practices for your environment on the TOTVS Fluig Platform.

Purpose

...

This guide aims to

Purpose

To describe the security controls available within the fluig platform TOTVS Fluig Platform and its execution in internal environments ( on-premises) and on the cloudpremise or cloud environments.

...


Encryption

fluig Learn more about HTTPS configuration fluig 3
Data traffic

All communication between

the TOTVS Fluig platform and customers is made through HTTPS/TLS – the most popular and reliable protocol available on the market.

 Saiba mais sobre configuração HTTPS

The customer must provide a valid certificate to be used by the

Fluig server, e.g. fluig.empresa.com.br.

If the customer does not have a certificate, we suggest using the following address:

2-month HTTPS certificate

Informações

It is also recommended to configure a DMZ network for the platform.

PasswordsSensitive user data are written in a manner so that the original content cannot be discovered.
The PBKDF2WithHmacSHA1 algorithm is used for storing user passwords in TOTVS Identity.
AuthenticationThe Single Sign On (SSO) process occurs via the SAML Protocol, with a certificate generated internally, with no information being exchanged.


Availability and Continuity

Serviceson fluig the Serviceson fluig Services fluig

TOTVS Identity

services

in the Cloud

Minimum availability of the

Identity environment is 99.5% per month on the production environment.

All monitoring and notifications about

changes to the service status are available at: http://status.fluigidentity.com

Analytics

service

in the Cloud

Minimum availability of the
Fluig Analytics environment is 99.5% per month on the production environment.
CLOUD
service

Availability and continuity policies change according to the business proposal. Our plans start with 97.5% availability per month.

Check out the specific use and availability values on our proposal.

High availability

On premises

The on-premises customer is responsible for creating an environment that meets their availability and performance needs.

We have recommendations on how a customer should configure their environment to ensure greater availability.

Learn more about how to create high availability

environments.

We offer support packages to help customers better manage their environment.


Physical

...

Environment

Depending on use and contract, the customer can be allocated in the TOTVS NIMBVS or the Amazon data center. Each of these data centers has different characteristics.

fluig Data
NIMBVS Environment

Certifications

  • ISAE 3402 Type II
  • ISO 9001:2008
  • TIER III Data Center
  • Vulnerability management provided by expert consultants
  • 24/7 monitoring and defense against DDOS attacks
  • SIEM
  • Next-Generation Firewall
  • Backup policy as per business proposal
  • Data delivery policy in case of unrecoverable failure in the TOTVS data center as per business proposal
  • Data integrity guarantee as per contract

Location

Data centers are located in São Paulo, Brazil

Amazon Environment

The following certifications are included for

Fluig Viewer services and for customers allocated on the Amazon cloud:

  • ISO 27001
  • SOC 1 and SOC 2/SSAE 16/ISAE 3402 (previously SAS 70 Type II)
  • PCI Level 1
  • FISMA Moderate
  • Sarbanes-Oxley (SOX)

More details about certifications on the Amazon environment

Location

Allocated data centers are in the São Paulo Zone, Brazil


Add-on Services Environment

For the platform operation, based on the fog computing concept concept, some services run on cloud services. For transparency purposes, here are the services and locations.

fluig
Identity Environment (Production)

Location

Data centers are located in the São Paulo Zone, Brazil, in the Amazon Web Services (AWS)

Analytics Environment

For more information on the architecture and security for the Analytics Services, see the security guide.

Location

Data centers allocated in the United States, in the Rackspace services

Messaging Environment

Location

Data centers allocated in the United States, in the Google Cloud Platform services

Fluig Viewer Environment

Location

Data centers are located in the São Paulo Zone, Brazil, in the Amazon Web Services (AWS)


Integration with External Systems

Fluig The platform can be integrated with various systems in different scenarios. For security reasons,  we we recommend checking all integrations available.

Legacy systems

One of the

fluig’s

TOTVS Fluig platform's most used features when creating projects is the integration with

the

systems that the company already has, whether for query or processing purposes.

Supported integration types:

  • SOAP (HTTP and HTTPS)
  • REST (HTTP and HTTPS)
  • JDBC (encryption depends on the Database supplier)

Supported REST authentications:

  • Basic
  • OAuth 1
  • OAuth 2
  • Custom (written in JavaScript)
  • None
Mandatory
Development servicesThe platform provides various services that enable the development of customizations and integrations. Therefore, we recommend reviewing the access security to APIs, datasets, and web services. See the user guide for more information.

Required components

On-

Premises

Premise - License Server

The License Server must be installed to check the customer’s contract. The server connects to the cloud to check the contract to which the customer has access.

 Learn

Learn more about the license server.

On-

Premises

Premise - Database

As per the

Portability Matrix, fluig

portability matrix, the platform requires the use of a database. Check the supplier’s documentation for more details on this component’s security features.

Optional components

Microsoft Active Directory

or OpenLDAP

Microsoft Active Directory

A directory service

can be used for user authentication. Both the platform and

fluig

Identity have connections

and, in fluig

. In Identity’s case, we have Identity | SmartSync, which is used to make this communication even more secure.

SMTP -

E

Sending e-

mailing

mail

We use the SMTP protocol with SSL or TLS to send notification e-mails. Learn more about e-mail settings.

PUSH Notifications

Both the Google® and Apple® infrastructures are used for notifying mobile application users: small messages with no business-critical data are sent by the technology partner UrbanAirship, centralizing all messages sent to

fluig

TOTVS Fluig customers.


Mobile Environment

Fluig The platform may be accessed via mobile devices through fluig Fluig Mobile, available for Android and iPhone/iPad.

fluig fluig fluig fluig fluig OAuth
Data traffic

Communication between

Fluig Mobile and the

Fluig server occurs via a network connection, with all data traffic being sent via HTTP.

For access via cellular data network (3G/4G),

Fluig must have its address published on the internet. HTTPS may be enabled to provide for greater security, using valid certifications for mobile devices.

If the address is not published on the internet, the mobile device on which

Fluig Mobile is installed must be connected to a network that allows access to the

Fluig server.

E.g., Company’s Wi-Fi, VPN connection, etc.

AuthenticationAuthentication is provided by
oAuth, a secure authorization protocol that does not store the user and password at login, only the authentication key (token).


Network and application security

Pentest last performed: March/2017
Followed recommendationIn most security actions, OWASP recommendations are taken into account.
Vulnerability testing

Third parties perform independent Pentests on a regular basis.

Any vulnerability detected is evaluated according to the impact and probability of the failure, and correction tasks are created for the responsible team.

To ensure this process, customers are advised to open a ticket reporting the situation mapped in the Pentest, along with the impact.

Each ticket opened will be evaluated by the TOTVS security team. If the vulnerability is confirmed, the ticket will enter the standard maintenance process.

Each situation should have a separate ticket, and it is advised to avoid creating a ticket that combines multiple situations.

It is important that tests be conducted in an environment updated with the latest version of Fluig, available for download on the Customer Portal.

Security incidents

In the event of an information leak or detected vulnerability, we allocate our technical professionals to remedy the issue.

To ensure this process, customers are advised to open a ticket reporting the situation.