PrintFleet Enterprise 2.2 Security Overview

Similar documents
Data Collector Agent: Best Practices

McKesson Radiology 12.0 Web Push

HIPAA Compliance Guide

Wells Fargo Payment Manager for Eclipse. Release 9.0.3

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE

PrintFleet Data Collection Agent (DCA) Installation Procedure

Rev B. Getting Started with the ISDS Platform User Guide

Data Privacy Statement

MEET THE NEXT GENERATION OF PROGRESSIVE MANAGEMENT SYSTEMS: BEPS

PrintFleet Data Collection Agent (DCA) Installation Procedure

CASH MANAGEMENT SCHEDULE WIRE TRANSFER SERVICES ON SANTANDER TREASURY LINK

Electronic Banking Service Agreement and Disclosure

AGREEMENT FOR THE DESIGN, DEVELOPMENT, IMPLEMENTATION, OPERATION, UPGRADING, SUPPORT AND MAINTENANCE OF STATEWIDE E-FILING COURT RECORDS PORTAL

Messages and Processor Codes March 2008

Investor's guide to the TCPMS v1.33

Merchant Reporting Tool

Bell Aliant PC Phone Installation/Removal Guide

CyberSource Payment Manager 6.5 SP2

Sage Accpac epos 5.5

OATS Reporting Technical Specifications

Cyber ERM Proposal Form

U.S. Eagle Federal Credit Union Mobile Banking Agreement

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS

PCI Training. If your department processes credit card information, it is CRITICAL that you understand the importance of protecting this data.

Georgia Health Information Network, Inc. Georgia ConnectedCare Policies

E-payment Technical manual Version 0711 ( ) Table of contents

TERMS & CONDITIONS FOR INTERNET BANKING SERVICES

ONLINE BANKING SERVICES AGREEMENT

Configuring the Dolby Conference Phone 3.0.x with Unify OpenScape Enterprise Express 8.0.x

IBM Agreement for Services Acquired from an IBM Business Partner

Oracle GoldenGate Management Pack

FIRST NORTHERN BANK & TRUST ONLINE BANKING AGREEMENT

Internet Banking Agreement

ABBOTT DIABETES CARE Effective Date: February 4, 2018

Online Banking Service Agreement

Business Online Banking Services Agreement

Credit Card Handling Security Standards

United Security Bank Online Banking Agreement

INVITATION FOR BID VENDOR: BID OPENING:

Regulations of trading operations BT Technologies LTD

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

FIRST NATIONAL BANK OF MENAHGA & SEBEKA

JBookTrader User Guide

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

ELECTRONIC BILL PAYMENT OVERVIEW

Connexus Credit Union Online and Mobile Banking Service Agreement and Disclosures

FATCA Administration and Configuration Guide. Release 2.0 May 2014

1 Welcome to. 1-1 Features of the e-tax software Usage image of the e-tax software... 4

INFORMATION AND CYBER SECURITY POLICY V1.1

CyberSource Payment Manager Messages and Processor Codes

Contract Award. aka Unisource Document Products / UDP 8058 Flint Lenexa, KS 66214

Oracle Banking Digital Experience

Version 1.0. Requirements for Participating in Freddie Mac s emortgage Initiative

Using Student Financials Self Service

Opening a pensionsync account for the first time

Ball State University

GOLDEN EAGLE COMMUNTY BANK ONLINE SERVICES USER AGREEMENT

INDEPENDENT BANK ELECTRONIC BANKING SERVICES AGREEMENT AND DISCLOSURE STATEMENT

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

THE ELECTRONIC BANKING SERVICES AGREEMENT I. ACCEPTING THE ELECTRONIC BANKING SERVICE AGREEMENT

Internet procedure to notify Final Terms

FATCA Administration and Configuration Guide. Release April 2015

HIPAA PRIVACY AND SECURITY AWARENESS

HSBCnet. Product Disclosure Statement. Effective 1 December 2016

PRIORITY BASED BUDGETING. A Proposal and Agreement for The City of Monroe, Wisconsin

Load Test Report. Moscow Exchange Trading & Clearing Systems. 07 October Contents. Testing objectives... 2 Main results... 2

GENERAL BUSINESS CONDITIONS FOR ELECTRONIC BANKING SERVICES

Air Academy Federal Credit Union. Remote Deposit Capture Services Terms and Conditions

Margin Direct User Guide

business online banking agreement

REF STANDARD PROVISIONS

University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions

Solar Eclipse Credit Card Authorization. Release 9.0.4

Oracle Banking Digital Experience

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

California Independent System Operator Corporation Fifth Replacement FERC Electric Tariff

COUNTY of KANE PURCHASING DEPARTMENT KANE COUNTY GOVERNMENT CENTER ADDENDUM 1

RADIUS BANK ONLINE BANKING SERVICES AGREEMENT

The Firemen s Annuity & Benefit Fund of Chicago, Illinois

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim)

SmartNotes. How does the Thermo Scientific Qtegra ISDS Software assist me in routine operation in a GxP compliant laboratory? Qtegra ISDS Software

ONLINE BANKING SERVICES AGREEMENT

MAINTENANCE PARTNER, LLC TERMS AND CONDITIONS

Product Overview. A technical overview of xcurrent. October 2017

CITIZENS BANK MOBILE BANKING AND REMOTE DEPOSIT CAPTURE AGREEMENT & DISCLOSURES GENERAL TERMS AND CONDITIONS

Oracle Banking Digital Experience

COMPTROLLER POLICY MANUAL

Getting Started Guide Lindorff invoice and instalment solution via Netaxept

Data Solutions SIF Agent for Follett Destiny 9.9

ONLINE SERVICES AGREEMENT

Genium INET PRM User's Guide

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

Easy Ways to Use EFTPS. For Tax Practitioners, Accountants and. Payroll Companies

ALLY BANK ONLINE BANKING SERVICES AGREEMENT. Version 7.0, February 19, 2015

Rules for the Technical Installations of the Trading Systems

PCI security standards: A high-level overview

ebanking Agreement and Disclosure

APPENDIX VIII EXAMINATIONS OF EBT SERVICE ORGANIZATIONS

Rabo Commercial Banking (RCB) Agreement

Transcription:

PrintFleet Enterprise 2.2 Security Overview PrintFleet Inc. is committed to providing software products that are secure for use in all network environments. PrintFleet software products only collect the critical imaging device metrics necessary to manage a printing environment, and never collect any personal or user information. This document discusses network and information security as it relates to: PrintFleet Enterprise server hardware PrintFleet Data Collector Agent software PrintFleet Optimizer web console PrintFleet software testing and release process PrintFleet source code security It is also explained why using PrintFleet software applications will not impact compliance of the following laws: Health Insurance Portability & Accountability Act (HIPAA) Sarbanes-Oxley Gramm-Leach-Bliley Act (GLBA) Federal Information Security Management Act (FISMA) PrintFleet Enterprise Server Hardware You have the option of hosting your own PrintFleet Enterprise server, or taking advantage of PrintFleet s hosting services. The physical security of the server depends on which of these options you choose. PrintFleet Enterprise Self Hosted By choosing the self-hosted version of PrintFleet Enterprise, you are responsible for acquiring appropriate server hardware, and ensuring its physical security. As part of the PrintFleet Enterprise Installation Requirements Agreement, you must do the following: Request and install an SSL 128-bit security certificate for your PrintFleet Enterprise server. Store your PrintFleet Enterprise server in a physically secured data center within a server rack cabinet. Assign a public IP address and URL to the PrintFleet Enterprise server. Allow PrintFleet Support personnel access into the PrintFleet Enterprise server via remote desktop for periodic maintenance, updates, and support. PrintFleet Enterprise Hosted By choosing PrintFleet hosting services, PrintFleet is responsible for acquiring the appropriate server hardware, and ensuring its physical security. Hosted servers are stored in a class A data center with the following security measures: Redundant, computer grade air conditioning and humidity control systems Gas fire suppression system and pre-action sprinkler systems

Biometric access control systems and video camera surveillance with 24/7 onsite security personnel Hosted servers are also provided with the following measures to guarantee maximum uptime and prevent data loss: Redundant fiber-based backbone connections to multiple Tier 1 Internet backbone providers Full UPS battery and diesel generator power backup that supports in-use refueling Automated data backup PrintFleet Data Collector Agent and Local Print Agent Software Overview The PrintFleet Data Collector Agent (DCA) is a software application that is installed on a non-dedicated networked server at each location where imaging device metrics are to be collected. DCA is capable of data collection from imaging devices that have network interface and are connected to the network DCA is set up to scan (Network Devices). The PrintFleet Local Print Agent is a software application that is installed on a nondedicated networked server or on a networked workstation with one or many nonnetworked imaging devices connected to the server / workstation (Local Devices). The PrintFleet Local Print Agent acts as a proxy between a PrintFleet DCA v.4.0 and Local Devices receiving requests from the DCA, transforming these requests into printer-compatible commands, and sending device responses back to the DCA. DCA 3.x does not support PrintFleet Local Print Agent. The DCA and the Local Print Agent run as Windows services, allowing them to operate 24 hours a day, 7 days a week. Also, DCA can optionally run as a scheduled task. PrintFleet DCA Activation and DCA Submission Authentication PrintFleet DCA has to be activated on a PrintFleet Enterprise server prior to data submission to the server. DCA Activation is managed by PFE Server Administrators and includes: Creation of a DCA Account on the PFE Server Association of a DCA Installation and the DCA Account based on a unique PIN Generation of a unique Shared Key used to encrypt data exchange between the PFE Server and the DCA Installation (for DCA v. 4.0 and later) DCA Accounts can have an Expiration Date when their credentials to submit data to the PFE Server are revoked automatically; PFE Server Administrator also can revoke these credentials at any time by De-Activating the DCA. Data submissions from a DCA start being rejected by the PFE Server immediately after the DCA Expiration Date comes or the DCA is De-Activated. For DCAs v.4.0 and later, PFE Server checks if the submitting DCA has an Active account on the Server prior to data acceptance. If the DCA account exists and is

Active, the data is saved in a file on the Server for further processing; otherwise, the submission is ignored and no data is saved on the Server. For DCA 3.x, the submission data is saved on the PFE Server in file. The check for DCA account existence and Activation status happens when the file is processed. If no matching DCA account exists, by default a new DCA 3.x account will be automatically created to facilitate upgrades. The Shared Key that is used to encrypt data exchange between a PFE Server and a DCA is stored in the PFE Server database and is protected by security means of MS Windows Server and MS SQL Server. It is responsibility of the MS Windows Server and MS SQL Server Administrator to implement appropriate security policies to exclude possibility of unauthorized access to the Shared Key. Neither PrintFleet Optimizer (PFE Server User Interface) nor other PrintFleet components exposure Shared Keys to users. For DCA 4.0 and later, DCA Installation stores the Shared Key in an encrypted local storage. The encryption algorithm uses hardware parameters and Windows Product ID of the DCA Host; this ensures that the Shared Key will not be used on DCA Installations other that the one where it was stored during DCA Activation. DCA 3.x stores data in unencrypted files, but starting with DCA 3.2 adds a message digest code to the filename for data integrity checks. The PFE Server will reject any files where the message digest code does not pass validation, and optionally can be set to reject files missing a message digest code (files from versions prior to DCA 3.2). The only time files are ever encrypted is with HTTPS when it is being used for transmission. Device Data Collection with PrintFleet Data Collector Agent and Local Print Agent Types of information collected The PrintFleet DCA attempts to collect the following information from networked printing devices during a network scan: IP address (can be masked) Toner cartridge serial number Device description Maintenance kit levels Serial number Non-toner supply levels Meter reads Asset number Monochrome or color identification Location LCD reading MAC address Device status Manufacturer Error codes Firmware Toner levels Miscellaneous (machine specific) For Local Devices, PrintFleet DCA with assistance of PrintFleet Local Print Agent attempts to collect the following information: Manufacturer Asset number Device description Location Serial number MAC address

Meter reads Miscellaneous (machine specific) OS version of Local Print Agent Host IP address of the machine the Local Print Agent is installed on (Local Print Agent Host) No print job or user data is collected. Data collection methods The DCAs versions 3.x and 4.0 collect networked imaging device metrics at a specified interval by polling networked devices using SNMP v1, ICMP, and HTTP. DCAs version 4.0 and later collect Local Device metrics at a specified interval by polling PrintFleet Local Print Agents using TCP and UDP requests at a predefined port (port 35). Request and response data is transferred using PrintFleet proprietary format. Data transmission methods DCA transmits the collected data to the centralized database via HTTPS (port 443 recommended), HTTP (port 80), FTP (port 21/port 20), or SMTP (port 25, sends via e-mail). The following table describes protocols used by different DCA versions: DCA version HTTPS recommended HTTP FTP SMTP DCA v 3.x Yes Yes Yes Yes DCA v 4.0 Yes Yes Not available Not available It is recommended that users transmit data using HTTPS, because this provides SSL 128-bit encryption of the data during transmission. HTTP, FTP, and SNMP do not provide encryption. To transmit using HTTPS, the machine receiving the transmitted data must be installed with an SSL security certificate. Data transmission formats DCAs v.4.0 and later encrypt submission data using the Shared Key and DCA Host hardware parameters and MS Windows Product ID. This adds an additional layer of data protection during transfer from the DCA to the PFE Server, and provides server validation during DCA submission. PrintFleet software uses Encryption providers integrated into the Microsoft.Net Framework to encrypt data exchange between DCA 4.0 and PFE Server. DCA 3.x transmits data as comma-delimited files in plain text format. Therefore, it is highly recommended to use HTTPS transmission protocol to ensure data protection. Network traffic The network traffic created by the DCA is minimal, and will vary depending on the number of IP addresses being scanned. The table below outlines the network load associated with the DCA compared to the network load associated with loading a single standard webpage.

Network Byte Load Associated with the DCA Event Approximate Total Bytes Loading a single standard webpage 60 KB DCA scan, single empty IP address 5.2 KB DCA scan, 1 printer only 7.2 KB DCA scan, 1 printer, 254 total IPs 96 KB DCA scan, 15 printers, 254 total IPs 125 KB Additional PrintFleet DCA functionality Optional remote updates The DCA contains an optional remote update feature, which is activated by enabling the Health Check and Intelligent Update options. Health Check will periodically ensure that the DCA service is operating, and if not, it will restart the DCA service. Intelligent Update allows the DCA to check for a receive software updates and DCA configuration changes posted by an administrator on the PrintFleet Enterprise server. These features are enabled and disabled at the end user site, and are not required. DCA Semaphore The DCA Semaphore functionality allows PrintFleet PFE Server Administrators to manage DCAs Activated on the Server remotely by sending commands; available commands include: Deactivate forces the target DCA to de-activate itself MIB Walk forces the target DCA to request all available OIDs from the device whose IP is specified in the command's parameter Redirect forces the target DCA to stop files submission to its old PFE Server, to start submission to the PFE Server whose URL is specified in "ServerUrl" parameter of the command, and, if "DeActivate" parameter is set to "True", to de-activate itself on the old PFE Server Update forces the target DCA to check for updated available for its current version and, if there are updates available, to upgrade itself using the update Uninstall forces the target DCA to uninstall itself None of these commands leads to data collection beyond Types of Information Collected as described above. Data exchange between DCA 4.0 and PFE Server is encrypted using the same algorithm that is used for Data Submission and is based on a unique Shared Key. DCA 4.0 and above receives software updates from its associated PFE Server. DCAs prior to 4.0 receive updates from the PrintFleet-hosted server secure.printfleet.com. DCA Semaphore functionality uses HTTPS (port 443 recommended) or HTTP (port 80) for Semaphore Commands sending from PFE Server to DCAs. DCA Service Bridge The DCA Service Bridge functionality allows Technicians to request a VPN connection to a networked imaging device from another network. A technician initiates a connection request by selecting the target device on the remote network, and which

ports to access. The PFE Server provides a PIN to the technician, but at this point, no communication has happened to the DCA or on the network the DCA is on. The technician provides the PIN to a user to enter into the DCA graphical user interface (the DCA must be active on the PFE Server). The user can then see the device s IP and ports being accessed, and accept or reject the connection. At any point, either the technician or the DCA user can close the connection. Communication to the PFE Server is done using web services, using the same method as regular DCA communication/activation. Service Bridge Session authorization leads to a Layer Two Peer-to-Peer VPN connection initialization between the technician s computer and the DCA Host computer, and then the DCA proxies requests to the device being accessed. On both the DCA and technician sides, the VPN client connects to a supernode running on the PFE Server (port 1685 udp/tcp), which negotiates a direct connection between the two, even if one or both is behind a NAT (network address translation) router/firewall. Communications between the two clients happens on a random high port (10000 to 65534) using UDP. PrintFleet Optimizer Web Console PrintFleet Optimizer is the online interface for the PrintFleet Enterprise system. Permissions based user management Access to the PrintFleet Optimizer web console is controlled with permissions-based user management. Users must log in to PrintFleet Optimizer using a designated username and password. Users are assigned one or more roles, which specify permissions, and are granted access to one or more groups of devices. Administrators will full permissions can specify exactly which screens each user can view and/or interact with. HTTPS access The website can be accessed using HTTPS provided that the web server is installed with an SSL security certificate. Optionally, PrintFleet Enterprise administrators can force users to access the PrintFleet Optimizer website using HTTPS, by redirecting the HTTP version of the website. This is recommended, as it ensures 128-bit encryption of data being transferred over the Internet. PrintFleet software testing and release process Each major and minor release of the software goes through a quality control process, whereby multiple PrintFleet personnel test altered portions of the system to ensure there has not been a downgrade in security or functionality of the system. Major releases go through a beta release process where select clients run the new and old systems in parallel. PrintFleet source code security

PrintFleet source code is kept in a secured revision control system, accessible only to the PrintFleet development team. Every change to the source code is tracked, which includes which developer made the change, and why. Products are encrypted and digitally signed with a code-signing certificate before shipping. Health Insurance Portability & Accountability Act (HIPAA) compliance is not affected by usage of PrintFleet software applications The use of PrintFleet software applications will not have an impact on compliance with the Health Insurance Portability & Accountability Act (HIPAA) for covered entities. This is because PrintFleet software applications do not collect, house, or transmit any information regarding the content of print jobs, and thus have no way of accessing, housing, or transmitting electronic protected health information (ephi) as defined by HIPAA. For more information about HIPAA, visit http://www.hhs.gov/ocr/hipaa/ Sarbanes-Oxley compliance is not affected by usage of PrintFleet software applications PrintFleet software is not intended to be used as part of an internal control structure as outlined in Section 404: Management Assessment of Internal Controls, but will not interfere with these controls. Information Technology controls are an important part of complying with Sarbanes- Oxley. Under this Act, corporate executives become responsible for establishing, evaluating, and monitoring the effectiveness of internal control over financial reporting. There are IT systems in the market that are designed specifically for meeting these objectives. PrintFleet software is not designed as an IT control system, but will not interfere or put at risk other systems that are intended for that purpose. For more information about Sarbanes-Oxley, visit http://thecaq.aicpa.org/resources/sarbanes+oxley/

Gramm-Leach-Bliley Act (GLBA) compliance is not affected by usage of PrintFleet software applications The use of PrintFleet software applications will not have an impact on compliance with the Gramm-Leach-Bliley Act (GLBA) for covered entities. This is because PrintFleet software applications do not collect, house, or transmit any information regarding the content of print jobs, and thus have no way of accessing, housing, or transmitting customers personal financial information, even if this information is printed or otherwise sent to print devices monitored by PrintFleet software applications. For more information about the Gramm-Leach-Bliley Act, visit http://www.ftc.gov/privacy/privacyinitiatives/glbact.html Federal Information Security Management Act (FISMA) compliance is not affected by usage of PrintFleet software applications PrintFleet software applications are not intended to be part of an internal control system for FISMA, but will not interfere with these controls. The use of PrintFleet software applications will not have an impact on compliance with the Federal Information Security Management Act (FISMA) for covered entities. This is because PrintFleet software applications do not collect, house, or transmit any information regarding the content of print jobs, and thus have no way of accessing, housing, or transmitting high risk information, even if this information is printed or otherwise sent to print devices monitored by PrintFleet software applications. For more information about the Federal Information Security Management Act, visit http://csrc.nist.gov/groups/sma/fisma/index.html For more information on PrintFleet products, contact PrintFleet at 1.613.549.3221 or visit www.printfleet.com.