GroverDB hosts its web application and storage at a local SSAE16 Type 2 certified datacenter.
The network layer of security protects the servers on the network from hacking attacks.
- Firewall: We use dual-redundant pfSense firewalls with a default-deny policy on the firewall. Only the ports absolutely necessary to run the business are allowed through.
- Patches: pfSense patches are checked and applied weekly.
- VPN: All admin access to the servers is through an IPSec encrypted Virtual Private Network or VPN.
Penetration Testing scans the IP ports and attempts to identify security holes.
PCI compliance requires a Pen Test annually or whenever there’s a significant change to the network architecture.
The third-party service GroverDB uses for Pen Testing performs a daily Pen Test.
Web Application to Browser Security
The Web Application connectivity level of security is how the data is protected as it is transported between the Web backend software and the client’s browser.
- Outside Firewall: This firewall opens only the necessary ports for browser access and the VPN.
- Encryption in Flight: All data being passed between the web application server and the client browser is encrypted using a 256-bit SSL certificate to prevent hacking and man-in-the-middle attacks.
Web Application Server to SQL Server Security
This level of connectivity involves the data within our internal network, behind our outside firewall, as it’s passed between the web backend and SQL Server.
- Internal Firewall: A pfSense firewall exists between the web backend server and the internal network. No outside connection, even if they somehow get access to the DMZ network, can access the internal network.
- Encryption in Flight: All data between the Web Application Server and the SQL Server is encrypted using a 256-bit SSL certificate. Furthermore, SQL Server login credentials are automatically encrypted by Microsoft.
- SQL Server Credentials: The client database’s SQL Server IP Address, database, login account, and password are not stored with the application or passed to the client’s browser. Instead they are stored in a GroverDB master database, which is accessed by account number when the user logs in.
Availability and Disaster Recovery
Availability refers to the ability of the infrastructure and software to maintain operational functionality in the event of a partial hardware failure.
Disaster recovery describes how the organization recovers from a significant loss of functionality, such as losing an entire data center.
Availability measures (within the primary data center) are as follows:
- Firewalls are redundant (Primary and Failover).
- Domain Controllers are redundant (Primary and Failover).
- All SSD drives are mirrored for all servers.
Availability Groups - SQL Server Availability groups provide database redundancy. If the primary SQL Server fails, the system automatically switches to the failover SQL Server.
Database Backups – A Full Database backup is performed every night and retained for 2 weeks for all editions of the application. For Enterprise clients, a Transaction Log Backup is performed every 15 minutes and retained for 48 hours. Backups are encrypted and password protected. Backups are stored on the data center’s Virtual Private Servers, and are instantly synced with an off-site using a secure cloud account.