{"id":5018,"date":"2023-03-15T09:23:49","date_gmt":"2023-03-15T08:23:49","guid":{"rendered":"https:\/\/wingsknowledge.com\/?page_id=5018"},"modified":"2023-03-30T23:49:01","modified_gmt":"2023-03-30T21:49:01","slug":"security-statement","status":"publish","type":"page","link":"https:\/\/wingsknowledge.com\/en\/security-statement\/","title":{"rendered":"Security Statement"},"content":{"rendered":"\n<div id=\"wp-block-themeisle-blocks-advanced-columns-5931af04\" class=\"wp-block-themeisle-blocks-advanced-columns has-3-columns has-desktop-oneThreeOne-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-unset\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-7e665ce2\" class=\"wp-block-themeisle-blocks-advanced-column\"><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-e0cadf50\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 class=\"wp-block-heading\"><strong>Ales Market Research<\/strong> | <strong>Wingsknowledge<\/strong> <br>Security Statement<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p>The management team of <strong>Ales Market Research<\/strong> is committed to maintaining the confidentiality, availability, and integrity of its physical, electronic, and informational assets in relation to clients, internal resources, and business delivery model.<\/p>\n\n\n\n<p><strong>Ales Market Research<\/strong> is committed to protecting assets from internal and external, intentional and unintentional threats, and our information security requirements will continue to be defined in tandem with these organizational objectives. <strong>Ales Market Research<\/strong> seeks to ensure that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Confidentiality of assets is ensured and protected against unauthorized access.<\/li>\n\n\n\n<li>The integrity of our data assets is maintained.<\/li>\n\n\n\n<li>Availability of assets is ensured, and business continuity plans are produced, updated, and tested.<\/li>\n\n\n\n<li>Regulatory requirements are satisfied.<\/li>\n\n\n\n<li>Information security training is mandatory for all staff members.<\/li>\n\n\n\n<li>Risk assessment and auditing exist within our teams.<\/li>\n\n\n\n<li>Technical and procedural controls are appropriate for their intended use and are applied appropriately.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Physical access to Server room<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>All visitors must be registered and accompanied.<\/li>\n\n\n\n<li>Access control to the server room is further restricted to only key IT infrastructure team personnel.<\/li>\n\n\n\n<li>Third parties who require access to the server room must schedule an appointment and be accompanied while performing their duties.<\/li>\n\n\n\n<li><strong>Ales Market Research<\/strong> employs a certified IT asset disposal specialist and maintains certificates of destruction (CODs) to reconcile with our asset inventory.<\/li>\n\n\n\n<li>Uninterruptible Power Supply (UPS) units are in operation to provide short-term protection against power outages and service damage.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Internet and Network Security<\/h3>\n\n\n\n<p><strong>Ales Market Research<\/strong> desires to provide a high level of assurance to our staff and clients that our servers and devices connected to the <strong>Ales Market Research<\/strong> network provide an adequate level of Confidentiality, Integrity, and Availability. <strong>Ales Market Research<\/strong> offers services that satisfy the following criteria:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>All client login data shall be encrypted in transit. Firewall and network switch management is restricted to <strong>Ales Market Research<\/strong> infrastructure personnel, and its operation is reviewed ad hoc.<\/li>\n\n\n\n<li>Vulnerability and penetration tests are performed on our network resources by <strong>Ales Market Research<\/strong> and accredited third parties under contract. The act of scanning <strong>Ales Market Research<\/strong>&#8216;s resources without authorization is considered unauthorized.<\/li>\n\n\n\n<li><strong>Ales Market Research<\/strong> identifies known client connections in conjunction with the validation of usernames and passwords to authenticate our internet-facing systems.<\/li>\n\n\n\n<li>Inbound and outbound requests are restricted to services required to operate <strong>Ales Market Research<\/strong> products and services.<\/li>\n\n\n\n<li>External access to internal systems is restricted to authorized personnel using VPN and\/or SSH cryptographic keys via known, hardened devices.<\/li>\n\n\n\n<li>Logs of Security and operational events are collected, retained, and analyzed.<\/li>\n\n\n\n<li>Wireless LAN connectivity requires WPA\/WPA2 keys and a specified configuration for settings.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Desktop Environment<\/h3>\n\n\n\n<p>The desktop environment is orchestrated using centrally approved policy engines to control the behavior and profile of our estate; these controls provide consistent security\/operational restrictions in addition to software approval and log requirements for assets. All <strong>Ales Market Research<\/strong> laptops are required to have vulnerability patches, full disk encryption, and managed endpoint protection as a standard feature.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Virus Security<\/h3>\n\n\n\n<p>Our endpoint protection is provided by a top-tier enterprise product that is updated multiple times per day to provide comprehensive internet and device protection options.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security Monitoring<\/h3>\n\n\n\n<p><strong>Ales Market Research<\/strong> is developing a monitoring and alerting capability to connect point solutions and provide greater security event correlation. While a variety of logs are collected, they are typically distinct. Anti-virus, firewall, application servers, proxies, network traffic, Intrusion detection systems, and ISP log data are presently collected for analysis in this manner.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Backup and recovery<\/h3>\n\n\n\n<p>Applications created by <strong>Ales Market Research<\/strong> are backed up frequently and deployed with redundant copies of all components. The data of <strong>Ales Market Research<\/strong> are stored on redundant hardware, with off-site backups. Third-party providers of data or components of our services must meet or exceed these requirements.<\/p>\n\n\n\n<p>Data integrity checks and restore testing are included in the work schedule.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Anti-virus Controls<\/h3>\n\n\n\n<p><strong>Ales Market Research<\/strong> operates a server and endpoint antivirus solution of enterprise class.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Endpoint Encryption<\/h3>\n\n\n\n<p>As part of our data loss prevention strategy, <strong>Ales Market Research<\/strong> has implemented full-disk encryption on all of our endpoints.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Independent Penetration testing<\/h3>\n\n\n\n<p><strong>Ales Market Research<\/strong> employs an independent security consulting firm to perform annual network and application asset penetration testing and report on their posture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Incident Response &#038; Communication<\/h3>\n\n\n\n<p>Information security is a subset of business continuity\/disaster recovery arrangements for <strong>Ales Market Research<\/strong>. Incident response plans are event-specific but adhere to the following structure:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Detect<\/li>\n\n\n\n<li>Declare<\/li>\n\n\n\n<li>Assess<\/li>\n\n\n\n<li>Contain\/Retain<\/li>\n\n\n\n<li>Investigate<\/li>\n\n\n\n<li>Recover<\/li>\n\n\n\n<li>Post-incident investigation<\/li>\n<\/ol>\n\n\n\n<p>During the assess phase of an incident, communications management is addressed by considering the reporting\/update requirements for employees, customers, media, and authority stakeholders.<\/p>\n\n\n\n<p>Post-incident analysis is the process of reviewing response performance and utilizing reflective sources to determine areas for improvement. At the conclusion of the review, interested parties may review this analysis.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Patch Management<\/h3>\n\n\n\n<p><strong>Ales Market Research<\/strong> manages a complex estate of network equipment and enterprise software with varying performance, security, and reliability requirements. Multiple systems are administered by <strong>Ales Market Research<\/strong> to deliver appropriate patch\/update levels and associated reports.<\/p>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-18e862bd\" class=\"wp-block-themeisle-blocks-advanced-column\"><\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-afb3c8f0\" class=\"wp-block-themeisle-blocks-advanced-columns has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-unset\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-c4c22ff4\" class=\"wp-block-themeisle-blocks-advanced-column\"><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","_themeisle_gutenberg_block_has_review":false,"vkexunit_cta_each_option":"","footnotes":""},"class_list":["post-5018","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wingsknowledge.com\/en\/wp-json\/wp\/v2\/pages\/5018"}],"collection":[{"href":"https:\/\/wingsknowledge.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wingsknowledge.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wingsknowledge.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wingsknowledge.com\/en\/wp-json\/wp\/v2\/comments?post=5018"}],"version-history":[{"count":0,"href":"https:\/\/wingsknowledge.com\/en\/wp-json\/wp\/v2\/pages\/5018\/revisions"}],"wp:attachment":[{"href":"https:\/\/wingsknowledge.com\/en\/wp-json\/wp\/v2\/media?parent=5018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}