Our security approach
Our approach to security is based on the following four pillars:
- Meet customer expectations and information needs around Snobal security and practices;
- Approach security practises from an agile perspective including continually reviewing practises and approach ensuring it takes account of current cybersecurity information, trends and requirements;
- Approach security as a shared responsibility between Snobal and our customers and partners.
- Continually evaluate our approach to security (including in comparison to our industry peers) with the aim to identify opportunities for continous improvement. This includes examining potential vulnerabilities with the aim to reduce identified risk to an acceptable level.
The information on this page applies to Snobal platform and products unless otherwise specified.
Our security team
We have a designated security team made up of key Snobal senior leadership and technical experts. This team meets regularly to review and analyse our approach to security.
Also, all Snobal team members play a key role in enabling us to meet our security requirements and needs and to this end our team are made aware of our mission, vision and goals as well as our approach to security from their commencement and through to workflow processes.
Shared security approach
In terms of Snobal’s shared security approach, customers are responsible for protecting all their endpoints and for following best practises for password construction requirements.
Snobal follows recommendations from the The NIST Password Guidelines also known as NIST Special Publication 800-63B. These guidelines were originally published in 2017 and updated in March of 2020 under” Revision 3 “or” SP800-63B-3. They are considered one of the most influential standards for password creation and use policies. As such, all Snobal employees, including vendors and partners with access to Snobal’s systems are responsible for taking the appropriate steps to select and secure their password.
Managing customer data
- Encryption of data
All data with Snobal Cloud is encrypted at rest and in transit with one of the strongest ciphers available: 256-bit Advanced Encryption Standard (AES-256), with AWS Key Management Service (KMS), server-side encryption (SSE-S3), and Transport Layer Security (TLS). AWS KMS is designed in a way that no one, including AWS employees, can decrypt or access the data.
All Snobal Cloud data has automated backup.
Our cybersecurity policies
Snobal recognizes that security vulnerabilities are an inherent part of any software development and that vulnerability management and remediation is addressed at all stages including at the earliest stages of the Snobal software development life cycle. To that end, we have implemented a multi-faceted approach to vulnerability management that relies on a combination of both automated and manual processes. We’re constantly evolving our approach by incorporating the latest tools, methods and to ensure our handling of vulnerabilities remains effective into the future.
If you would like to view a copy of our cybersecurity policy please request off your Snobal account manager.
Access and privilege management
We understand that effective protection of business information creates a competitive advantage and is important to preserve the reputation of Snobal and helping reduce the risk of the occurrence of negative events and incidents. As such at Snobal:
- We limit access to information only to those that need it for processing.
- We classify information into different categories so that we can ensure that it is protected properly and that we allocate security resources appropriately.
- We expect all customers and partners as well as Snobal employees and contractors to take responsibility to manage access to their endpoints.
- We require all employees to comply by industry stanadard password guidelines
- We request Snobal customers and Snobal employees follow industry standards when selecting passwords
- User profiles and priviliges and passwords are used to manage access to Snobal Cloud and Snobal Cloud extensions.
- From July 2021 access will be managed by multi-factor authentication / SSO
All data with our platform. Snobal Cloud is encrypted at rest and in transit with one of the strongest ciphers available: 256-bit Advanced Encryption Standard (AES-256), with AWS Key Management Service (KMS), server-side encryption (SSE-S3), and Transport Layer Security (TLS). AWS KMS is designed in a way that no one, including AWS employees, can decrypt or access the data including:
- Encryption in transit across all sites via TLS.
- Encryption at rest enabled by default
Identity and access management
Snobal has established identity and access management policies and procedures as well as implemented technical measures including:
- Policies and procedures established to store and manage identity information about every person who accesses to Snobal infrastructure and to determine their level of access.
- Access to Snobal Cloud infrastructure and application is appropriately restricted following the rule of least privilege based on job function
- Policies developed to ensure Snobal employees and suppliers are aware not to leave unattended workspaces openly visible (e.g., on a desktop) with sensitive documents and user computing sessions open
- Policies developed to Snobal ensure employee and supplier awareness are made aware of their roles and responsibilities for maintaining compliance with maintatining a safe and secure working environment
Cybersecurity incident management
The goal of the Snobal Incident Response is to detect and react to computer security incidents, to enable the determination of security scope and risk, respond appropriately to all incidents and to ensure we communicate the results and actions to all stakeholders in a timely and transparent manner seeking to ensure the likelihood of similar incidents not happening again.
Snobal recognises that an incident response is not in the hands of one team member but rather requires the input of the Snobal incident response team (ITR).
The Snobal IRT is a mix of Snobal experienced, technical, and non-technical personnel who work together to understand the scope of the incident, how it can be mitigated, and ultimately remediated.
- The plan:- outlines roles and responsibilities of the Snobal IRT.
- Severity rating – incidents are categorised according to the potential for data exposure or criticality of resource using the following severity rating.
- Cyber Incidents and responses – provides a list of common cyber incident types, along with the corresponding response activities (which form the typical minimum response).
- Potential threat vectors -outlines potential threat vectors which seek to support Snobal in identifying potential weak spots or commonly targeted aspects of our network and systems.
- Checklist for process – outlines checklist for incident process response.
- Incident response lifecycle – outlines the incident response lifecycle
Change request management process
All Snobal Cloud and Snobal extension system and infrastructure change requests to the production environment follow an approved process and methodology of a specific project in development with clear lines of reporting and accountability.
Security awareness training
All Snobal employees and suppliers receive security awareness training when appropriate. All individuals with access to Snobal organizational data receive appropriate awareness training and updates on organizational procedures, processes, and policies relating to their professional function relative to the organization.
Code of IT Ethics
All Snobal employees and supplier agree to a set of principles or IT ethics designed to assist in engaging in sound professional judgement while upholding ethical ideas and obligations around our platform, products and information system use.
Snobal seeks to ensure appropriate data handling procedures are followed to uphold the security and integrity of customer data. This includes that any data that considered to be reasonably sensitive, vulnerable or subject to privileges is subject to authorisation by Snobal in compliance with any confidentiality procedures.
Server and system backup
All files in Snobal Cloud are stored in S3 and have a retention period of 90 days after deletion. Data stored in the database are backed up daily via database snapshot and has a retention period of 30 days.
Supplier and vendor management
All Snobal suppliers and vendors are onboarded and managed in accordance with Snobal’s supplier and vendor due diligence process.
The Snobal supplier and vendor disclosure process articulates Snobal’s expectations so that suppliers and vendors do not have to guess. It establishes Snobal’s leadership regarding expectations of conduct with a supplier or vendor. It encourages all Snobal suppliers and vendors to help shape Snobal’s aspirations so it can achieve its mission in a constructive way.
Snobal recognizes that security vulnerabilities are an inherent part of any software development. To that end, we have implemented a multi-pronged approach to vulnerability management that relies on a combination of both automated and manual processes. We’re constantly evolving our security approach by incorporating the latest tools, methods and to ensure our handling of vulnerabilities remains effective into the future.
Infrastructure ( Snobal Cloud infrastructure)
All EC2 instances and database cluster sits on AWS private VPC behind Cloudfront and AWS WAF.
Application ( Snobal Cloud )
Security audit of the application dependencies for vulnerabilities NPM Audit is run as part of our software development life cycle (SDLC) to ensure software dependencies are updated regularly and all patches are up-to-date.
Report a vulnerability
Snobal defines a vulnerability as a bug, weakness or flaw in the software or system that could allow unauthorised access to the system. If you believe you have located a vulnerability in Snobal Cloud please submit a ticket to our security and technical support team.
Include the following information:
- Type of issue
- Snobal Cloud platform or APK version and/or XR solution and version
- Step-by-step instructions to enable replication of the issue
Questions about Security?
If you have a question that has not been answered here, please contact us.
Our platform and product roadmap
Want the latest on our platform and product roadmap? Check our Updates. Still have a question? Reach out.