SECURITY MODEL

The BSRS security model defines the essential aspects of security and their relationship with each operating layer. It provides the required level of understanding on what the implemented key protection are features via the simplified OSI layer.

The security model also helps to ensure that Confidentiality, Integrity, Availability are effectively applied throughout the system.


BSRS - security implementation is based on the started security practice in the industry. All the security features that have been included are in accordance with existing Philippines Cybersecurity and Data Privacy Act.



INFRASTRUCTURE VULNERABILITY ASSESSMENT


Vulnerability Assessment is a process of identifying the vulnerabilities of an application and network infrastructure. Also, Vulnerability Assessment enables us to be aware of all risks and weaknesses inside our Infrastructure that poses a threat that could lead to security breaches such as exploit attacks or social engineering.

To ensure that our system is foolproof to any kind of security risks, we will perform a VA scan using the VA Scanner tool to our application and all Infrastructure involved in this project.

WEB APPLICATION VA SCANNING FLOW


  • Determining application and infra components
  • Preparation and configuring VA scanner Scanning web application and infrastructure
  • Reviewing results and comparing from previous results
  • Mitigation of vulnerabilities Testing of fixed issues Generating reports
  • Validating if all VA findings are mitigated

All VA findings of EMS Application will be mitigated and will go through a series of VA scanning processes until the closure of all the open findings. VA scan will be executed on a quarterly basis for both application and server levels to ensure all security risks have been covered. The vulnerability database available with the US NIST (National Institute of Standards Technology) and US CERT (Computer Emergency Response Team) will be used as reference.


Following are the layers for Vulnerability Assessment:

Application Layer

Web Layer (external and without WAF) Server Layer and Ports


BSRS inherits the security policies and guidelines of TESDA.  BSRS Security incident plan and response mechanism is also enforced.




No luck finding what you're looking for?

Let us know your question or query, click “E-mail Us” and we’ll get back to you as soon as possible.