Recommendations and Information for Requirement 3.1 and 3.2
- iWay Service Manager (iSM) is a transactional system and does not retain or store any data unless it is configured to do
so for backup, load-balancing, and application purposes. The data is kept only in memory for the duration of the transaction
process. The user is advised to utilize the security features available, such as various encryption, signing, and encoding
functions to protect the data if they choose to persist it as part of the application logic.
- Authentication token is discarded upon the use and user authentication/authorization routine. The data is rendered unusable
automatically by the system and is not accessible to other processes.
- Users are advised to utilize integration with external authentication and authorization systems such as AD/LDAP, where applicable,
and such inherit protection of the sensitive security data provided by those systems.
Recommendations and Information for Requirement 3.4
- Application developers are advised to use provided data masking and encryption services to protect sensitive data prior to
storing it into any repository or persistent store. The application is responsible for securing data prior to its materialization.
Recommendations and Information for Requirement 3.5.3 and 3.5.4
- For the externalized communication using applicable HTTP-based protocols, such as HTTP and AS2, the user is advised to utilize
HSM-enabled facilities to provide an additional level of secure access.
- Any security related files carrying sensitive key information, such as keystores, truststores, certstores, revocation lists,
and others, should be maintained in a secure location with access granted only to the approved personnel.
- The Application developer is advised to review and use the encryption facilities provided by the product to encrypt any
sensitive data while in transit between the systems for further processing purposes, load-balancing, or others.
Recommendations and Information for Requirement 3.6
- iWay applications are not storing any cryptographic key information. iWay applications access the cryptographic information
based on the design and implementation only when needed and configured to do so.
- The system administrator is advised to keep the least possible number of copies of the security keys, phrases, and other
relevant security information. The application should be allowed access to this information in a centralized location to enable
easy maintenance and key replacement/expiration when applicable.