-
-
-
- Introduction to security
- Secure development
- Security certification
- Field properties concerning security
- Developing user groups securely
- Security considerations for user interface
- Secure file organization
- Securely using the request
- Cross Site Scripting (XSS)
- Other options concerning secure development
- Security analysis
- Secure deployment
- Secure application management
- Scrambling of testdata
- Anonymization of personal data
- Using robots.txt
- Permission settings
- Security measures
- Data encryption
Other options concerning secure development
The following page describes other options available for developing securely:
- Read log
It is possible to define per class if a read log should be kept. This log registers who opened records and when. This can be done on the History tab. The Read log analyser action can be used to find predefined patterns in the read log, this action can be run periodically as part of a job. - Export log
Every export is also logged. These can be inspected. It is recommended to do this regularly. - Virus scan
It is possible to have blobs uploaded to the application scanned for viruses. This takes when uploading, but also periodically over all existing blobs. This is done so that new virus profiles can be applied when scanning the blobs. - Cloudflare
Cloudflare is an American company that offers a service to filter network traffic. Irregular traffic is blocked by Cloudflare. This prevents, among others, DDoS-attacks. Developers can decide for themselves if they want to use Cloudflare. If they do, Crossmarx should be notified, to make necessary adjustments in the SSL-certificates. - NaWas
NaWas (Nationale Wasstraat) is offered by de NBIP (De Nationale Beheersorganisatie Internet Providers). Among others it offers protection against DDoS-attacks. The Dutch hostingservice of Crossmarx is a part of NBIP. Because of this our servers can be made part of the NaWas. If a server were to be targetted by a DDoS-attack, all traffick will be temporarily routed through a 'wasstraat'. De 'wasstraat' cleans all traffic from irregular element en only let's relevant traffic pass. To use this option there are extra costs involved. - Ransomware
It is also possible to make an extra backup of your database on a seperate server. This server automatically makes a backup. The architecture is made such that in case of a ransomware attack, the backup will stay out of reach of the attack. To use this option there are extra costs involved.