TUPPY SECURITY EXHIBIT Security Exhibit Rev. 2021 3-3
Whitehat Virtual Technologies maintains a comprehensive, written information security program that
contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope,
and type of Whitehat’s business; (b) the number of resources available to Whitehat; (c) the type of
information that Whitehat will store; and (d) the need for security and confidentiality of such
information.
Whitehat's security program is designed to:
- Protect the confidentiality, integrity, and availability of Customer Data or Professional Services
Data in Whitehat's possession or control or to which Whitehat has access.
- Protect against any anticipated threats or hazards to the confidentiality, integrity, and
availability of Customer Data or Professional Services Data.
- Protect against unauthorized or unlawful access, use, disclosure, alteration, or destruction of
Customer Data or Professional Services Data.
- Protect against accidental loss or destruction of, or damage to, Customer Data or Professional
Services Data; and
- Safeguard information as set forth in any local, state, or federal regulations by which Whitehat may
be regulated. Without limiting the generality of the foregoing, Whitehat's security program
includes:
-
Security Awareness and Training. A mandatory security awareness and training
program for all members of Whitehat's workforce (including management), which includes:
- Training on how to implement and comply with its Information Security Program.
- Promoting a culture of security awareness through periodic communications from senior
management with employees.
- Access Controls. Policies, procedures, and logical controls:
- To limit access to its information systems and the facility or facilities in which they are
housed to properly authorized persons.
- To prevent those workforce members and others who should not have access from obtaining
access; and
- To remove access in a timely basis in the event of a change in job responsibilities or job
status.
- Physical and Environmental Security. Controls that provide reasonable assurance
that access to physical servers at the production data center or the facility housing Whitehat's API
Server, if applicable, is limited to properly authorized individuals and that environmental controls
are established to detect, prevent and control destruction due to environmental extremes. These
controls include:
- Logging and monitoring of unauthorized access attempts to the data center by the data center
security personnel.
- Camera surveillance systems at critical internal and external entry points to the data
center.
- Systems that monitor and control the air temperature and humidity at appropriate levels for
the computing equipment; and
- Uninterruptible Power Supply (UPS) modules and backup generators that provide back-up power
in the event of an electrical failure.
- Security Incident Procedures. A security incident response plan that includes
procedures to be followed in the event of any Security Breach. Such procedures include:
- Roles and responsibilities: formation of an internal incident response team with a response
leader.
- Investigation: assessing the risk the incident poses and determining who may be affected.
- Communication: internal reporting as well as a notification process in the event of
unauthorized disclosure of Customer Data or Professional Services Data.
- Recordkeeping: keeping a record of what was done and by whom to help in later analysis and
possible legal action; and
- Audit: conducting and documenting root cause analysis and remediation plan.
- Contingency Planning. Policies and procedures for responding to an emergency or
other occurrence (for example, fire, vandalism, system failure, pandemic flu, and natural disaster)
that could damage Customer Data or production systems that contain Customer Data. Such procedures
include:
- Data Backups: A policy for performing periodic backups of production file systems and
databases or Professional Services Data on Whitehat's API Server, as applicable, according
to a defined schedule.
- Disaster Recovery: A formal disaster recovery plan for the production data center,
including:
- Requirements for the disaster plan to be tested on a regular basis, currently twice
a year; and
- A documented executive summary of the Disaster Recovery testing, at least annually,
which is available upon request to customers.
- Business Continuity Plan: A formal process to address the framework by which an unplanned
event might be managed in order to minimize the loss of vital resources.
- Audit Controls. Hardware, software, and/or procedural mechanisms that record and
examine activity in information systems that contain or use electronic information.
- Data Integrity. Policies and procedures to ensure the confidentiality, integrity,
and availability of Customer Data or Professional Services Data and protect it from disclosure,
improper alteration, or destruction.
- Storage and Transmission Security. Security measures to guard against unauthorized
access to Customer Data or Professional Services Data that is being transmitted over a public
electronic communications network or stored electronically. Such measures include requiring
encryption of any Customer Data or Professional Services Data stored on desktops, laptops, or other
removable storage devices.
- Secure Disposal. Policies and procedures regarding the secure disposal of tangible
property containing Customer Data or Professional Services Data, considering available technology so
that Customer Data or Professional Services Data cannot be practicably read or reconstructed.
- Assigned Security Responsibility. Assigning responsibility for the development,
implementation, and maintenance of its Information Security Program, including:
- Designating a security official with overall responsibility.
- Defining security roles and responsibilities for individuals with security responsibilities;
and
- Designating a Security Council consisting of cross-functional management representatives to
meet on a regular basis.
- Testing. Regularly testing the key controls, systems, and procedures of its
information security program to validate that they are properly implemented and effective in
addressing the threats and risks identified. Where applicable, such testing includes:
- Internal risk assessments, and
- Service Organization Control 1 (SOC1) and Service Organization Control 2 (SOC2) audit
reports (or industry- standard successor reports)
- Monitoring. Network and systems monitoring, including error logs on servers, disks,
and security events for any potential problems. Such monitoring includes:
- Reviewing changes affecting systems handling authentication, authorization, and auditing.
- Reviewing privileged access to Whitehat Virtual Technologies production systems; and
- Engaging third parties to perform network vulnerability assessments and penetration testing
on a regular basis.
- Change and Configuration Management. Maintaining policies and procedures for
managing changes Whitehat make to production systems, applications, and databases. Such policies and
procedures include:
- A process for documenting, testing and approving the patching and maintenance of the
Service.
- A security patching process that requires patching systems in a timely manner based on a
risk analysis; and
- A process for Whitehat to utilize a third party to conduct web application-level security
assessments. These assessments generally include testing, where applicable, for:
- Cross-site request forgery
- Services scanning
- Improper input handling (e.g., cross-site scripting, SQL injection, XML injection,
cross-site flashing)
- XML and SOAP attacks
- Weak session management
- Data validation flaws and data model constraint inconsistencies
- Insufficient authentication
- Insufficient authorization
- Program Adjustments. Whitehat monitors, evaluates, and adjusts, as appropriate, the
security program considering:
- Any relevant changes in technology and any internal or external threats to Whitehat or the
Customer Data or Professional Services Data.
- Security and data privacy regulations applicable to Whitehat; and
- Whitehat's own changing business arrangements, such as mergers and acquisitions, alliances
and joint ventures, outsourcing arrangements, and changes to information systems.
- Devices. All laptop and desktop computing devices utilized by Whitehat and any
subcontractors when accessing Customer Data or Professional Services Data:
- will be equipped with a minimum of AES 128-bit full hard disk drive encryption;
- will have up to date virus and malware detection and prevention software installed with
virus definitions updated on a regular basis; and
- shall maintain virus and malware detection and prevention software to remain on a supported
release. This shall include, but not be limited to, promptly implementing any applicable
security-related enhancement or fix made available by supplier of such software.
Definitions
“Professional Services” means consulting or professional services provided to Customer
under an agreement between the parties for the provision of consulting or professional services,
including but not limited to the following agreements or terms: the Lifecycle Deployment Program Terms
and Conditions, the Professional Services Agreement, the Delivery Assurance terms, the Professional
Services Attachment, and/or the Consulting and Training Addendum and Amendment.
“Professional Services Data” means electronic data or information that is provided to
Whitehat under a Professional Services engagement with Whitehat for the purpose of being input into the
Whitehat Service, or Customer Data accessed within or extracted from the Customer’s tenant to perform
the Professional Services.
“API Server” means a Secure Application Programming Interface server or its successor
provided and controlled by Whitehat to transfer the Professional Services Data between Customer and
Whitehat for implementation purposes.