Other options concerning secure development

The following page describes other options available for developing securely:

  1. Read log
    It is possible to define per class if a read log should be kept. This log registers who opened records and when. This can be done on the History tab. The Read log analyser action can be used to find predefined patterns in the read log, this action can be run periodically as part of a job.
  2. Export log
    Every export is also logged. These can be inspected. It is recommended to do this regularly.
  3. Virus scan
    It is possible to have blobs uploaded to the application scanned for viruses. This takes when uploading, but also periodically over all existing blobs. This is done so that new virus profiles can be applied when scanning the blobs.
  4. Cloudflare
    Cloudflare is an American company that offers a service to filter network traffic. Irregular traffic is blocked by Cloudflare. This prevents, among others, DDoS-attacks. Developers can decide for themselves if they want to use Cloudflare. If they do, Crossmarx should be notified, to make necessary adjustments in the SSL-certificates.
  5. NaWas
    NaWas (Nationale Wasstraat) is offered by de NBIP (De Nationale Beheersorganisatie Internet Providers). Among others it offers protection against DDoS-attacks. The Dutch hostingservice of Crossmarx is a part of NBIP. Because of this our servers can be made part of the NaWas. If a server were to be targetted by a DDoS-attack, all traffick will be temporarily routed through a 'wasstraat'. De 'wasstraat' cleans all traffic from irregular element en only let's relevant traffic pass. To use this option there are extra costs involved.
  6. Ransomware
    It is also possible to make an extra backup of your database on a seperate server. This server automatically makes a backup. The architecture is made such that in case of a ransomware attack, the backup will stay out of reach of the attack. To use this option there are extra costs involved.