Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
governance [2018_01_30 17:23] – external edit 127.0.0.1governance [2024_03_18 21:10] (current) – [2 Permissions and access control] steven
Line 1: Line 1:
 +====== Governance Settings ======
 +== last updated on April 27, 2020 ==
  
 +===== 1 User Management =====
  
 +{{ ::screenshot_2020-10-30_at_15.23.05.png?600 |}}
  
 +Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server.
  
-====== Cloud File Server Governance Options ======+===== 2 Permissions and access control =====
  
 +{{ ::screenshot_2020-10-30_at_15.25.15.png?600 |}}
  
-===== 1 User Management =====+Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree.
  
 +FAQ: We often get asked if we support Active Directory integration. We support Active Directory integration, and this enables single sign on and group permissions federation.
  
  
-{{:/governance:steps:sme_1_user_management.png}}+===== 3 Notifications =====
  
-Users and user roles can be controlled directly by the Cloud Administrator when setting up the Cloud File Server. 
  
 +{{ ::screenshot_2020-10-30_at_15.27.16.png?600 |}} 
  
-===== 2 Permissions and access control =====+The Access Anywhere Admin can setup Audit Watch notifications. Notifications are based upon rules that are invoked on file events. If a file of a certain description, file name or extension is uploaded, updated, viewed etc, then the nominated users can receive notification alerts.
  
  
 +===== 4 Event Auditing and Other Governance Options =====
  
-{{:/governance:steps:sme_2_permissions_and_acce.png}}+Event logging is built into Access Anywhere and it works above any storage provider that is mapped to Access Anywhere. Which types of events are logged can be controlled by the org. admin from the Security tab of the Policies page\\ \\
  
-Once shared folders for the Cloud File Server have been added, the Cloud File Server Admin can control access to folders and sub folders using an access control list. If a user has no permission to a folder the folder is not displayed at all in their file tree.\\ \\ FAQWe often get asked if we support Active Directory integrationWe support Active Directory integration, and this enables single sign on and group permissions federation. You can find more about Active Directory integration on our Wiki [[organisationcloud/activedirectory|here]].+{{ :cloudappliance:cloudappliance:syslog:events_to_log.png?direct&600 |}}
  
 +===== 5 Displaying and Filtering Event Logs =====
  
-===== 3 Notifications =====+The org. admin can view the events belonging to the org. on the Audit Events Log page which is accessed from the admin's Organization pull-down menu: \\ \\
  
 +{{ :cloudappliance:audit_events_log.png?direct&600 |}} \\ \\
  
  
-{{:/governance:steps:sme_3_notifications.png}}+There are five filters:
  
-The Cloud File Server Admin can setup notifications. Notifications are based upon rules that are invoked on file events. If a file of a certain description, file name or extension is uploaded, updated, viewed etc, then the nominated users can receive notification alerts.+**Search logs**
  
 +The contents of the Log field will be filtered by the value you provide here without regard to case. \\ \\
  
-===== 4 Event Auditing and other Governance options =====+{{ :cloudappliance:better_logs.png?direct&400 |}} \\ \\
  
 +**Type**
  
 +Events are classified by type.  You can filter by any single type or allow all types: \\ \\
  
-{{:/governance:steps:sme_4_event_audtiing_and_o.png}}+{{ :cloudappliance:type.png?direct&200 |}}\\ \\ 
 +**User, Date and Tool**
  
-Auditing is built into the Cloud File Server and it works above any information Cloud that is mapped to the fileserver. The granularity of the events that are logged s controlled by the Cloud File Server Admin.+You can also filter by the user whose action caused the events, the date or range of dates during which the events occurred, and the tool that was used. \\ \\ 
 +{{ :cloudappliance:user_date_range_and_tool.png?direct&200 |}} \\ \\
  
 +The date range is inclusive.  To select events for a specific date set that date as both the From date and the To date.
  
-===== 5 Event Logs ===== 
  
 +You can set values in any or all of the five filters and then search.  The filters are logically combined so that only events that qualify for all of the filter values that have been set are displayed.
  
 +Use the Search button at the bottom left of the page to re-filter the results after you change a filter value. You can reset all of the filters to their default (no value) state by clicking in the link under the Search button. \\ \\
 +{{ :cloudappliance:search_and_reset.png?direct&200 |}} 
 +=== Exporting Audit Logs ===
 +Your filtered set of audit log entries can be downloaded in four forms:
 +  * Excel workbook
 +  * .csv file
 +  * .zip archive.
 +  * PDF file as a formatted report
  
-{{:/governance:steps:sme_5_event_logs.png}}+Access these three options from the Export pulldown near the top of the Audit Event Logs page: \\ \\ 
 +{{ :cloudappliance:ael_-_export.png?direct&200 |}} 
 +=== Archiving and Erasing Audit Logs === 
 +Because audit log entries accumulate quickly you will probably want to archive the entries from time to time and then erase them.  You can access archiving and deletion features from the Options pulldown near the top of the Audit Event Logs page\\ \\ 
 +{{ :cloudappliance:ael_-_archive_and_erase.png?direct&200 |}} \\ \\ 
 +To archive the audit log entries, select Archive from the pulldown menu and a confirmation box will be displayed: \\ \\ 
 +{{ :cloudappliance:archive_confirm.png?direct&200 |}} \\ \\ 
 +Click on Archive to proceed or Cancel to cancel.
  
-Event logs are generated if auditing is turned on and these can be displayedfiltered, exported or archived.+If you proceed a background task will be created which will create a zip file containing the audit log entries.  If you care to inspect the background taskfind its entry on the Tasks tab of the File Manager page: 
  
 +{{ :cloudappliance:archive_cloud_task.png?direct&600 |}}
  
-===== 6 Recording GEO locations =====+Audit logs archives will be placed by the background task in an Audit logs Archive directory in the admin's root directory:
  
 +{{ :cloudappliance:audit_logs_archive.png?direct&400 |}}
  
 +Select Erase Logs from the pulldown menu to erase old audit log entries.
 +<WRAP center round important 60%>
 +When you erase audit log entries they will no longer be available from Access Anywhere.  If you need a historical record, archive these entries before you delete them and be sure that the archive job has completed successfully prior to proceeding.
 +</WRAP>
 +When you erase audit log entries, only entries from before a date that you select will be erased: 
  
-{{:/governance:steps:sme_6_recording_geo_locati.png}}+{{ :cloudappliance:erase_logs_date.png?direct&200 |}}
  
-GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded to. This can ensure companies comply with electronic data laws and international compliance regimes\\+After you have selected the date click on Erase to proceed or click on Cancel if you have changed your mind.
  
 +=== Tracing Downloads by Watermark ===
 +The Access Anywhere provides a [[watermarking|]] feature that affixes a random watermark code to downloaded PDF files. You may sometimes want to learn the details of when a watermarked file was downloaded.  To do this, click on the Watermarking Logs link near the top of the Audit Event Logs page:
  
-===== 7 Disable File Sharing =====+{{ :cloudappliance:ael_watermarking_logs.png?direct&400 |}} 
  
 +This will take you to the Watermarking Logs page: 
  
 +{{ :cloudappliance:watermarking_logs.png?direct&400 |}} 
  
-{{:/governance:steps:sme_7_disable_file_sharing.png}}+When this page loads it displays a list of all watermarked file downloads in reverse chronological order.  To search for downloads for files with a specific watermark code, enter some or all of the code in the Watermark Code text box and click on Filter.  The text you entered will be used without regard for case to filter the watermark downloads by the code in the first column.  You can clear the filter with the "Clear filter" button.
  
-The Cloud FIle Server Admin can disable any sharing or collaboration features of the Cloud File Server entirely by disabling the ability for any user to do any form of file sharing or collaboration.+### Also See
  
 +[[cloudappliance/syslog|Integrating Audit logs with Syslog]]
  
-===== 8 Controlling other Data Clouds =====+===== 6 Recording GEO locations =====
  
  
 +{{ :screenshot_2020-10-30_at_16.07.24.png?600 |}} 
  
-{{:/governance:steps:sme_8_controlling_other_da.png}}+GEO locations are recorded with regards to where a file was uploaded from and also where a file was uploaded toThis can ensure companies comply with electronic data laws and international compliance regimes
  
-As the Organization, or individual users, may user other information clouds, it is preferable for these to be controlled as part of the Cloud File Server rollout in a company. This will enable that any auditing, event logging etc can be setup for such clouds. The Cloud FIle Server admin can decide which Clouds a user can add.\\ \\ For example if each user has a corporate Google Apps Docs account, then the Admin can enable users to add this directly, and any use of it can also be monitored and audited. 
  
 +===== 7 Disable File Sharing =====
  
-===== 9 Encryption options =====+{{ ::screenshot_2020-10-30_at_16.10.52.png?600 |}}
  
 +The Access Anywhere Admin can disable any sharing or collaboration features of Access Anywhere entirely by disabling the ability for any user to do any form of file sharing or collaboration from Access Anywhere policies page.
  
 +===== 8 Controlling User Access to Storage =====
  
-{{:/governance:steps:sme_9_encryption_options.png}}+{{ ::screenshot_2020-10-30_at_16.14.21.png?600 |}}
  
-Cloud Admins can choose for all files to be encrypted when stored on CloudThis encryption is AES 256 bit military grade encryption.+As the Organization, or individual users, may (if configured) user other storage , it is preferable for these to be controlled as part of Access Anywhere rollout in a companyIf available this will also enable that auditing, event logging etc for such storage. The Access Anywhere admin can decide which storage a user can add
  
 +For example if each user has a corporate Google Apps account, then the Admin can enable users to add this directly (with any use also being monitored and audited.
  
-===== 10 File versioning Options ===== 
  
 +===== 9 Encryption options =====
  
 +{{:/governance:steps:sme_9_encryption_options.png}} 
  
-{{:/governance:steps:sme_10_file_versioning_opti.png}}+Cloud Admins can choose for all files to be encrypted when stored on private cloud storage. This encryption is AES 256 bit military grade encryption.
  
-To ensure the lifecycle of a file is tracked then file versioning can be turned "on" which results in all changed versions of a file being kept rather than overwritten.+See the [[cloudencryption|encryption section]] for further information.
  
  
-===== 11 HIPAA Compliance =====+===== 10 File versioning Options =====
  
 +{{:/governance:steps:sme_10_file_versioning_opti.png}} 
  
 +To ensure the lifecycle of a file is tracked then file versioning can be turned "on" which results in all changed versions of a file being kept rather than overwritten.
  
-{{:/governance:steps:sme_11_hipaa_compliance.png}} +For further information see the [[versions|versioning section]].
- +
-HIPAA provides national minimum standards to protect an individual’s health information.\\ \\ Although many vendors advertise HIPAA compliance, there is no standard "HIPAA certificate of compliance" for backup / cloud products and services. However there are guidelines and we can lay out how our governance features work within this guidelines:\\ \\ General Compliance guidelines for HIPAA:\\ \\ - Ensure confidentiality, integrity and availability of all electronically protected health information that the covered entity either creates, receives, maintains or transmits.\\ - Protect against any reasonably anticipated threats or hazards to the security or integrity of such aforementioned information.\\ - Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required.\\ - Ensure that there is compliance by the workforce.\\ \\ Ways in which the Storage Made Easy Cloud Appliance satisfies HIPAA:\\ \\ **//Data Access://** This can be controlled using access control lists, to enable data to be only accessed by authorised personnel over https. Also IP GEO-restrictions can be implemented to restrict geographic access.   The actual legislative wording regarding restricted access to data is:\\ \\ "//Allow access only to those persons or software programs that have been granted access right.//” (Section 164.312(a)(2)(1))\\ \\ \\ **//Remote / Offsite Access to data:://** Storage Made Easy provides a service which can be configured to be part of a disaster recovery plan enabling data to be accessed in the event of fire,flood, natural disaster, inadvertent deletions, viruses, hacking, theft or any other contingency. The actual legislative wording is:\\ \\ "//Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information.//” (HIPAA, Section 164.308(a)(7)(i)).\\ \\ **//Physical Security of Data://** Storage Made Easy supports over 35 clouds and in our opinion the most pertinent cloud to use for storing HIPAA data is Amazon. Our [[https://storagemadeeasy.com/ownFileserver/|Cloud Appliance]] can be hosted on Amazon EC2 and HIPAA data can be stored using the   Amazon S3 data cloud. Further information on Amazon and HIPAA can be found in the [[http://d36cz9buwru1tt.cloudfront.net/AWS_HIPAA_Whitepaper_Final.pdf|PDF white paper]] entitled " Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services"\\ \\ **//Event Logging://** HIPAA solutions should enabled audit logging and drill down of file events to enable checks on file access and change and from which IP Address these were made. Such audit and event logging is built into the Storage Made Easy solution.\\ \\ **//Encryption://** The privacy rules regulations describe ensuring data is encrypted when "in flight" and when "at rest".   Storage Made Easy and Amazon directly both support AES 256 bit encryption at a file level and data can be sent over secure channels.\\ \\ **//Disclaimer//**  \\ \\ This information is not intended to constitute legal advice.   You are advised to seek the advice   of counsel regarding compliance with HIPAA or refer to the HIPAA section of the U.S. Department of Health and Human Services' website, which can be found at: http://www.hhs.gov/ocr/hipaa/\\ \\ \\ +
  
 +### Also See
  
 +* [[features/md5hash|File Verification]]  
 +* [[geoip|IP white listing / black listing]]  
 +* [[antivirus|Virus Scanning Protection]]  
 +* [[watermarking|Watermarking Documents]]