Laserfiche WebLink
maintenance windows, risks, etc. Not all updates are relevant in every environment, so each is <br />evaluated for relevance and risk before implementation. <br />Protection From Attacks <br />The OWASP standards are built into development processes and manual testing is performed in <br />addition to peer review as required by our SDLC. WEX uses an automated dynamic application <br />security testing (DAST) solution that scans web applications to find vulnerabilities and provide <br />guidance on remediation. <br />WEX receives vulnerability announcements, for relevant systems, from vendors, third parties, <br />NIST, FDIC, FBI, and other threat feeds and has a dedicated security operations team managing <br />and maintaining the vulnerability management program. The Vulnerability management <br />procedure requires a ticket to be generated and assigned to Information Technology operations <br />teams for patching. <br />Logging and Log Monitoring <br />Logs are aggregated and correlated using an on premise, commercially available, SIEM platform. <br />Logs are kept for one year. Additionally, WEX has managed services contracts with a well known <br />global service to assist in monitoring and responding to log events. <br />Remote Access <br />Remote access to WEX networks from a non -trusted network requires an authorized device, the <br />use of VPN and two -factor authentication. <br />Network based intrusion detection is used at critical points of the network infrastructure. <br />Network access control has been implemented to ensure only authorized devices that have the <br />correct security posture are admitted onto the network. <br />Media Destruction <br />WEX utilizes a third -party vendor for media destruction. WEX also has onsite degauss capability <br />that meets Department Of Defense requirements for media sanitization. <br />Access <br />Access is granted through the provisioning of a unique user ID, with least privilege rights granted. <br />Requests are approved by a user's manager, and provisioned by a systems access group. Initial <br />logon requires a password change, and access is disabled upon termination. Key password <br />parameters: Min. Length of 8 characters must choose 3 out of the 4 of the following: capital letter, <br />lower case letter, number, special character. <br />Lock out is three unsuccessful attempts and expiration is 90 days. User authentication can be <br />performed, depending on the application, by: Active Directory, LDAPS, or Oracle access manager. <br />Encryption Policies and Standards <br />WEX encryption policies and standards govern encryption for data in transit and/or at rest. <br />Standard algorithms are AES 256 and 3DES. WEX SAN data is encrypted at rest using AES256 and <br />mobile devices utilize whole disk encryption. For web applications, SSL is used between web <br />servers and the browser. Console access is SSH. <br />MASTER AGREEMENT No. 00819 - FLEET CARD SERVICES PAGE 107 OF 138 <br />