QuickStream Security Features Guide

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 42

DownloadQuickStream Security Features Guide
Open PDF In BrowserView PDF
A division of Westpac Banking Corporation ABN 33 007 457 141

QuickStream
Security Features Guide

Document History

Date

Version

Description

Author

03-Feb-2003

7.1

Original Version

Qvalent

15-Sep-2003

7.1

Updated

Qvalent

7-Jul-2004

8.0

Updated for v8.0 software

Qvalent

14-Jul-2004

8.01

Updated

Qvalent

24-Jun-2005

8.1

Updated

Qvalent

8-May-2006

8.2

Updated

Qvalent

16-Aug-2006

8.3

Updated

Qvalent

27-Nov-2006

8.4

Updated

Qvalent

31-Dec-2007

9.0

Updated for v9.0

Qvalent

3-Jun-2008

10.0

Updated with LTM information

Qvalent

16-Jul-2008

10.1

Updated

Qvalent

4-Nov-2008

11.0

Updated

Qvalent

5-Nov-2008

11.1

Updated

Qvalent

22-Feb-2010

11.2

Updated

Qvalent

22-Feb-2010

11.3

Updated with FAQ

Qvalent

12-Mar-2010

11.4

Updated

Qvalent

3-May-2010

11.5

Updated

Qvalent

17-Mar-2011

11.6

Updated

Qvalent

7-Oct-2011

11.7

Updated

Qvalent

12-Oct-2011

11.8

Updated

Qvalent

Page 2

A division of Westpac Banking Corporation.
Copyright © 2011, Westpac Banking Corporation, ABN 33 007 457 141. All rights reserved.

QuickStream  Security Features Guide

-3-

Table of Contents
1

Introduction ..................................................................................................... 5

2

Security Features.............................................................................................. 6

2.1

Passwords / Authentication ................................................................................. 6

2.2

Accountability and Auditing ................................................................................. 7

2.3

Single Sign On................................................................................................... 7

2.4

Role Based Security ........................................................................................... 7

2.5

Intrusion Detection Controls ................................................................................ 7

2.6

Inactivity Controls .............................................................................................. 8

2.7

Encryption ........................................................................................................ 8

3

Web Based Application Development ................................................................ 9

3.1

Secure Coding Practices ...................................................................................... 9

3.2

Web Session Management ................................................................................ 10

4

Messaging Controls......................................................................................... 11

5

Credit Card Processing.................................................................................... 13

5.1

Overview ........................................................................................................ 13

5.2

How Does Qvalent Process Cards?...................................................................... 13

5.3

Credit Card Integration Security ........................................................................ 14

5.4

PCI-DSS Compliance ........................................................................................ 15

6

Banking File Transfer ...................................................................................... 22

7

Data Centre Facilities ...................................................................................... 24

7.1

WAN .............................................................................................................. 25
Page 3

A division of Westpac Banking Corporation.
Copyright © 2011, Westpac Banking Corporation, ABN 33 007 457 141. All rights reserved.

QuickStream  Security Features Guide

-4-

7.2

Internet .......................................................................................................... 26

7.3

Network Firewalls ............................................................................................ 26

7.4

BigIP Local Traffic Manager (LTM) ...................................................................... 28

7.5

BigIP Application Security Manger (ASM) ............................................................ 30

7.6

Servers........................................................................................................... 31

7.7

Monitoring and reporting................................................................................... 31

8
8.1
9

Disaster Recovery ........................................................................................... 33
What are Qvalent‟s disaster recovery plans? ........................................................ 34
Backups, Data Storage and Destruction .......................................................... 34

10 General FAQ’s ................................................................................................. 35
11 Glossary ......................................................................................................... 38

Page 4

A division of Westpac Banking Corporation.
Copyright © 2011, Westpac Banking Corporation, ABN 33 007 457 141. All rights reserved.

QuickStream  Security Features Guide

1

-5-

Introduction
Qvalent is a 100% owned subsidiary of the Westpac Banking Corporation and
operations the QuickStream platform for Westpac.
Qvalent treats security as a prime concern. As Qvalent is a 100% wholly owned
subsidiary of the Westpac Banking Corporation, it must conform to all Westpac
security policies. This is to ensure that the Customer‟s and Westpac‟s data is secure,
no insecure network applications are used and all communications between Qvalent
applications themselves or external applications are carried out over secure links. In
addition all financial data transmitted between Qvalent (Westpac) must be encrypted
and digitally signed for both the customer and Westpac‟s protection. Some of the key
security measures used by Qvalent consist of:

















PCI-DSS Compliant (Level 1).
AS2805 Compliant.
Application firewalls to prevent data leakage.
Single sign on for all users;
All applications share same security code base;
Every page validates a user‟s security;
Users are only allowed to view data for companies that they are associated with;
Message encryption using SSL between both internal and external systems;
Basic authentication for all messages sent between Qvalent and external
systems;
Reverse IP lookup‟s to check to origin of received messages;
Full digital certificate (both client & server) support;
All critical user and financial information is stored encrypted using private keys in
the database;
Access to the database is only allowed through security data access objects;
Multiple firewall cells; and
All ports and IP addresses blocked by default, only specific addresses and ports
are open.
Qvalent‟s wide area network is managed by Optus and its data centre / internal
network by Hewlett Packard. Both of these companies use best of breed
practices.

Page 5

A division of Westpac Banking Corporation.
Copyright © 2011, Westpac Banking Corporation, ABN 33 007 457 141. All rights reserved.

QuickStream  Security Features Guide

2

-6-

Security Features

2.1

Passwords / Authentication

The application authenticates users through X.509 certificates or by a user
name/password combination. The database cannot be read to reveal user passwords as
they are held in encrypted form. To this end when a user wishes to change their
password, the system will only transmit the keystrokes encrypted, thus the line cannot
be „sniffed‟ effectively. Once authenticated, the user has a session variable created and
kept as a server-side cookie, which is passed to every page accessed throughout the
user‟s session.
When a user is authenticated, they are assigned user rights within a company. These
security rights can be limited to an individual, group or company level. Access to
information is based on a user‟s security rights and the company administrator controls
this.
Some of Qvalent‟s password management capabilities include:





















Minimum of eight characters;
Must contain letters and numbers;
Can only be changed once in a 24 hour period;
Must be changed every 42 days;
Cannot reuse the last 5 password;
Ability to enforce password expiration;
Passwords stored as a hash;
Ability to require automatic password expirations when initially assigned or reset;
Ability to require re-authentication after 15 minutes of inactivity.
Ability to automatically disable accounts after a period of inactivity (120 days);
Ability to manually lock out a user account;
Ability to lock out an account automatically after a defined number of incorrect logins
(5 attempts);
Password suppression (masked) during entry at sign on dialogue;
Passwords are masked from all outputs (e.g. reports, logs, etc);
Passwords cannot be retrieved or viewed from password database;
Ability to permit user-initiated resetting of passwords;
Forced password re-entry verified (old pw, new pw, and new pw again);
Ability to deactivate or change passwords of vendor supplied Ids;
Ability to force password changes; and
Support for One Time Passwords (OTP).

Page 6

A division of Westpac Banking Corporation.
Copyright © 2011, Westpac Banking Corporation, ABN 33 007 457 141. All rights reserved.

QuickStream  Security Features Guide

2.2

-7-

Accountability and Auditing

Qvalent products provide the following accountability and auditing functionality;











2.3

Audit logs can be secured from unauthorized access;
Ability to log activities performed by specific ID or time of day;
Ability of audit log to time and date stamp all actions for each ID;
Ability to filter the level of logging based on log masks;
Ability to identify and log all subsequent access points - accountability is maintained
throughout session;
Ability to log successful and unsuccessful single sign-on attempts;
Failed access attempts to specific domains, files, directories, URLs can be logged;
Administrative functions can be logged and are auditable;
Ability to maintain the user‟s identity for the duration of the session; and
Ability to prevent the display of passwords on audit logs.

Single Sign On

Qvalent applications allow external validation systems to be used to replace its standard
login processor. A custom “Authenticator” java class that implements a defined interface
can be created to meet specific customer requirements. Typical uses for this
“Authenticator” revolve around a company having a single sign-on system (SSO) that all
users must log on too. Through the use of an “Authenticator”, Qvalent Procurement can
be integrated with such a system. The creation and deletion of Procurement user
accounts can also be managed through Qvalent‟s iConnect technology. This allows users
to be added, updated or deleted automatically via iConnect integration packages. Once
again these packages can be integrated with SSO systems.

2.4

Role Based Security

All users require individual sign ons to the applications, no generic accounts are allowed.
All user id‟s are role based with particular rights assigned to those roles. Quick Stream
provides a flexible framework that allows organisations to be „self managing‟. This
means that within an organisation rights and roles can be assigned by personnel within
that organisation (Community Administrators).

2.5

Intrusion Detection Controls

The Qvalent suite offers a number of Intrusion Detection Controls. These include:


Ability to set an unsuccessful access attempt limit;
Page 7

A division of Westpac Banking Corporation.
Copyright © 2011, Westpac Banking Corporation, ABN 33 007 457 141. All rights reserved.

QuickStream  Security Features Guide








2.6

-8-

Ability to suspend ID after reaching the unsuccessful access threshold;
Ability to display time/date of last successful logon;
Ability to display number of unsuccessful logon attempts since last successful log-in;
Ability to send alerts to administrators for unauthorized access attempts;
Ability to detect incoming messages from unauthorised sources; and
In addition to software control Hewlett Packard provides comprehensive network
event detection and notification management.

Inactivity Controls

Qvalent products provide the following inactivity controls:



2.7

Automatic logoff of ID after a 15 minute period of session inactivity; and
After lock-out, re-access require password authentication

Encryption

Externally, all inbound and outbound sensitive data is encrypted and digitally signed. For
file based transfers this is PGP with a 1024bit key. For stream based exchanges this is
over SSL with 128bit certificates.
Internally, Qvalent uses the triple DES algorithm in cipher-feedback mode and AES for
all two-way data encryption. The encrypted information can optionally be returned in a
base 64 encoded string.

Page 8

A division of Westpac Banking Corporation.
Copyright © 2011, Westpac Banking Corporation, ABN 33 007 457 141. All rights reserved.

QuickStream  Security Features Guide

3

-9-

Web Based Application Development

3.1

Secure Coding Practices

Qvalent web software and applications development philosophy is based on secure
coding guidelines such as the Open Web Application Security Project guidelines. Review
custom application code to identify coding vulnerabilities. See www.owasp.org - “The Ten
Most Critical Web Application Security Vulnerabilities.” Cover prevention of common coding
vulnerabilities in software development processes, to include:


Unvalidated input - All data is validated by a common framework in the application,
where required fields are checked, along with input length and data format (for nonfree text fields).



Broken Access control – Qvalent applications automatically lock out accounts after a
set number of invalid login attempts to prevent „brute force‟ attacks. Broken
authentication and session management (use of account credentials and session
cookies) - Session IDs are generated using a 128-bit cryptographic pseudo-random
number generator, making guessing the next ID implausible. The session ID is 128bits long. The session ID is temporary in nature, and is not stored on the user‟s
disk. It is also only contained in the memory of the application server, and never
written to disk. Sessions are also automatically timed out after a period of inactivity.



Cross Site Scripting (XSS) attacks - Qvalent‟s architecture uses XSL to generate the
HTML displayed to users. The servlets on the application server generate XML which
is then transformed into what the user sees. The underlying technology prevents
this kind of attack, since any dangerous characters in the output (such as
“



Navigation menu