Anycloud Security Statement
Anycloud is committed to the security and privacy of our partners, distributors, and their customers. We strive to implement and maintain security processes, procedures, standards, and take all reasonable care to prevent unauthorized access to customer data. We apply appropriate administrative, operational, and technical security controls to help ensure that our customer data is handled and processed in a responsible and secure manner. This Security Statement is aimed at providing you with more information about our security infrastructure and practices.
Information Security Policy
Anycloud maintains a written Information Security policy that defines employee responsibilities and acceptable use of information system resources. The company receives signed acknowledgement from users indicating that they have read, understand, and agree to abide by the rules of behavior before providing authorized access to Anycloud information systems. This policy is reviewed annually and updated as necessary.
Our comprehensive security policies cover a diverse range of security related subjects including but not limited to general standards with which every employee must comply, such as account, data, and physical security, to more specialized security standards covering internal applications and information systems.
Information security roles and responsibilities are defined within the organization. The Anycloud security department focuses on information security, global security auditing and compliance, as well as defining the security controls for protection of Anycloud’s hardware and cloud infrastructure. The team receives information system security notifications on a regular basis and distributes security alert and advisory information to the organization on a routine basis after assessing the risk and impact as appropriate.
Anycloud adheres to the International Organization for Standardization (ISO) 27001 Framework employing a multi-layered security control approach to identify, prevent, detect, and respond to security incidents. The security team is also responsible for tracking incidents, vulnerability assessments, threat mitigation, and risk management.
Anycloud data and information system assets are comprised of partner, distributor, and end-user assets as well as corporate assets. These asset types are managed under our security policies and procedures. Anycloud authorized personnel are trained to understand how these assets contribute to our overall security posture and trained to comply with the policies and procedures when procuring and managing them.
Anycloud employees are required to conduct themselves in a manner consistent with the company’s guidelines, including those regarding confidentiality, business ethics, appropriate usage, and professional standards. All newly hired employees are required to sign confidentiality agreements and to acknowledge Anycloud policies. The policies outlines the company’s expectation that every employee will conduct business lawfully, ethically, with integrity, and with respect for each other and the company’s users, partners, and competitors. Processes and procedures are in place to address employees who are on-boarded and off-boarded from the company.
Employees are provided with security training as part of new hire orientation. In addition, each Anycloud employee is required to read, understand, and take training courses twice a year for security, avoidance of breaches and data protection.
Physical and Environmental Security
Anycloud has policies, procedures, and infrastructure to handle both the physical security of its data centers as well as the environment from which the data centers operate. Our information systems and infrastructure are hosted in data centers that are geographically dispersed to provide high availability and redundancy to Anycloud and its partners and distributors. The standard physical security controls implemented at each data center include electronic card access control systems, fire alarm and suppression systems, interior and exterior cameras, and security guards. Physical access is centrally managed and strictly controlled by data center personnel. All visitors and contractors are required to present identification, are required to log in, and be escorted by authorized staff through the data center.
Access to areas where systems or system components are installed or stored are segregated from general office and public areas. The cameras and alarms for each of these areas are centrally monitored 24/7 for suspicious activity, and the facilities are routinely patrolled by security guards. Servers have redundant internal and external power supplies. Data centers have backup power supplies and can draw power from diesel generators and backup batteries. These data centers have undergone SSAE 16 audits, which produced a Service Organization Control (SOC) 2 Type II attestation letters. Furthermore, the data centers are ISO 27001 certified.
Anycloud maintains a change management process to ensure that all changes made to the production environment are applied in a deliberate manner. Changes to information systems, network devices, and other system components, and physical and environment changes are monitored and controlled through a formal change control process. Changes are reviewed, approved, tested, and monitored post-implementation to ensure that the expected changes are operating as intended.
Supplier and Vendor Relationships
Anycloud collaborates with suppliers and vendors that operate with the same or similar values around lawfulness, ethics, and integrity that Anycloud does. As part of its review process, Anycloud rigorously assess our suppliers and vendors and bind them to uphold appropriate confidentiality and security obligations, including requirements for appropriate management of any data they may handle.
Auditing and Logging
We maintain system audit logs which provide an account of which personnel have accessed which systems. We limit access of our auditing and logging tools to authorized individuals. Security events are logged, monitored, prioritized, and addressed by trained security team members. Network components, workstations, applications, and any monitoring tools are enabled to monitor user activity. Organizational responsibilities for responding to security events are defined. Critical system configuration changes create audit events, which are recorded and reviewed at the time of change. Retention schedules for the various logs are defined in our security control guidelines.
Antivirus and Malware Protection
Antivirus and malicious code protection are centrally managed and configured to retrieve the updated signatures and definitions available. Malicious code protection policies automatically apply updates to these protection mechanisms. Anti-virus tools are configured to conduct scans, virus detection, monitor real-time file write activity, and signature file updates. Laptop and remote users are covered under virus protection. Furthermore, well-documented procedures are in place to identify and eliminate unauthorized or unsupported applications.
Anycloud has established comprehensive backup standards, guidelines, and corresponding procedures to facilitate systematic backup and restoration of data in a timely manner. Controls have been implemented to ensure the security and protection of backed-up data, both onsite and off-site. In addition, we work to ensure that data is securely transferred or transported to and from backup locations. Periodic tests are conducted to test whether data can be safely recovered from backup devices.
Our infrastructure servers reside behind high-availability firewalls and are monitored for the detection and prevention of various network security threats. Firewalls are utilized to help restrict access to systems from external networks and between systems internally. By default, all access is denied and only explicitly allowed ports and protocols are allowed based on business need. Anycloud maintains separate development and production environments. Our firewalls provide network segmentation through the establishment of security zones that control the flow of network traffic. These traffic flows are defined by strict firewall security policies.
Anycloud maintains a continuous commitment to the enhancement of our service offerings, aligning with the latest recommended secure cipher suites and protocols for encrypting data during transit. We monitor developments in the cryptographic domain and upgrade our services to respond to new cryptographic weaknesses as they are identified, implementing best practices as they evolve within the field.
Security assessments are conducted with the primary objectives of pinpointing vulnerabilities and assessing the effectiveness of our patch management program. Each identified vulnerability undergoes an evaluation process to determine if it presents a valid risk and is assigned a priority ranking based on its potential impact. Following this ranking, vulnerabilities are assigned to the relevant team for remediation.
Anycloud is dedicated to the consistent application of the most recent security patches and updates across operating systems, applications, and network infrastructure to address potential vulnerabilities. Patch management processes are in place to implement security patch updates as they are released by vendors. Before deployment in the production environment, patches undergo thorough testing in a separate and controlled environment to validate the effectiveness and minimize potential disruptions.
Secure Network Connections
HTTPS encryption is configured for partner, distributor, and customer access to web applications. This helps ensure that while in transit, user data is safe, secure, and available only to intended recipients. The level of encryption is either SSL or TLS encryption and is dependent on what the web browser can support.
Access to information systems is provisioned using Role-Based Access Controls (RBAC). The permissions in RBAC are based on what level of access specific user categories require to perform their duties. Anycloud employees are granted a limited set of default permissions to access company resources, such as their email and the corporate intranet. Employees are granted access to certain additional resources based on their specific job function. Requests for additional access follow a formal process that involves a request and an approval from a data or system owner, manager, or other executives, as defined by our security guidelines. Approvals are managed by workflow tools that maintain audit records of changes. Processes and procedures are in place to offboard employees who are separate voluntarily or are terminated. Access to sensitive data in our databases, systems, and environments are set on a need-to-know/least privilege necessary basis.
Authentication and Authorization
We require that authorized users be provisioned with unique account IDs. Our password policy covers all applicable information systems, applications, and databases. We enforce password best practices, such as complexity requiring both alpha and numeric characters and Multi-factor Authentication (MFA) to protect against unauthorized use of passwords. Passwords are individually salted and hashed.
Anycloud has a formalized Incident Response Plan (IRP) and associated procedures in case an information security incident is declared. The IRP defines the responsibilities of key personnel and specifies procedures to follow regarding any communication or notifications about the incident. The IRP is tested annually.
The security department has a dedicated Incident Response Team, with trained resources that are responsible for the various stages of our Incident Management strategy, including preparation, detection and analysis, containment, eradication, and recovery.
Business Continuity and Disaster Recovery
To minimize service interruption due to hardware failure, natural disaster, or other catastrophes, we have implemented a disaster recovery program at all our data center locations. This program includes multiple components to minimize the risk of any single point of failure. Application data is replicated to multiple systems within the data center and, in some cases, replicated to secondary or backup data centers that are geographically dispersed to provide adequate redundancy and high availability. High-speed connections between our data centers help to support swift failover.
We apply a common set of personal data management principles to customer data that we may process, transmit, and store. We protect personal data using appropriate physical, technical, and organizational security measures. We give additional attention and care to sensitive personal data and respect local laws and customs, as applicable.
For more information on Anycloud compliance, click here.