infosec

Camio Information Security

Camio is designed for security from the ground up. Our strict information security policies protect our customers, employees, assets, information, integrity and reputation from threats.

Cryptographics controls ensure confidentiality, authenticity, non-repudiation, and authentication of sensitive information. The Camio service itself encrypts all sensitive data both in transit and at rest using Google Cloud Platform (GCP) automatically managed keys. Camio encrypts data for both transmission and storage (at rest).

1
Encryption at rest uses AES256.
2
Encryption in transit uses TLS 1.3 with Perfect Forward Secrecy key rotation.

The keys for application-specific cryptography are accessible only via TLS/HTTPS to the machine that deploys virtual servers (i.e. only the deployment engineer has the keys; they're not accessible to developers, and developers cannot deploy to production servers).

For cloud storage encryption, Google manages the cryptographic keys on our behalf using the same hardened key management systems that they use for their own encrypted data, including strict key access controls and auditing. Each Cloud Storage object's data and metadata is encrypted under the 256-bit Advanced Encryption Standard, and each encryption key is itself encrypted with a regularly rotated set of master keys. (See https://cloud.google.com/security/encryption-at-rest/default-encryption/)

All communications over public networks and over private networks between data centers use TLS/HTTPS encryption.

Google Cloud Services

Camio’s software, data, and compute-infrastructure operate within the Google Cloud Platform (GCP) and G Suite services. Camio has no private network of its own to secure, so use of GCP reduces the attack surface. The security policies of the Google Cloud Platform are described at https://cloud.google.com/security/.

Requirements of Employees

Camio requires that every employee follow these policies:

1
Two Factor Authentication on every account.
2
Full disk encryption is required on all Camio devices.
3
Critical security updates applied within 2 weeks of official release on all Camio-owned devices.
4
Automatic screen-locking enabled on all devices with access to Camio information.
5
Tailgating is prohibited and response to https://camio.com/tailgating alerts is required.
6
Strict adherence to security policies outlined in this document.

Clean Desk

A Clean Desk policy is not only ISO 27001/17799 compliant, but it is also part of Camio’s standard basic privacy controls, requiring that employees comply with the following:

1
All sensitive/confidential information is secure in their work area.
2
Computer workstations are locked when unoccupied.
3
Any restricted or sensitive information must not exist in paper/physical form.
4
Whiteboards containing Restricted and/or Sensitive information should be erased.

Email

Misuse of email can pose critical legal, privacy and security risks.

1
Employees are prohibited from automatically forwarding Camio email to any third party email system.
2
All data contained within email messages or attachments must be secured.
3
Camio email may be used for work only, so that personal email is separate.

General Use and Ownership

1
Camio proprietary information stored on electronic and computing devices remains the sole property of Camio. Employees must ensure that proprietary information is protected.
2
Employees have a responsibility to promptly report the theft, loss or unauthorized disclosure of Camio proprietary information.
3
Employees may access, use or share Camio proprietary information only to the extent it is authorized and necessary to fulfill their assigned job duties.

Security and Proprietary Information

1
Providing access to another individual, either deliberately or through failure to secure its access, is prohibited.
2
All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 10 minutes or less. Screens must be locked or logged off when the device is unattended.
3
Employees must use extreme caution when opening email attachments, which may contain malware. Always use Google Docs to save and open compatible documents.

Unacceptable Use

Under no circumstances is any employee authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Camio owned resources. The following list is not exhaustive but attempts to characterize activities that are prohibited.

1
Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by Camio.
2
Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from copyrighted sources, copyrighted music, and the installation of any copyrighted software for which Camio or the end user does not have an active license is strictly prohibited.
3
Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal. The appropriate management should be consulted prior to export of any material that is in question.
4
Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, email bombs, etc.).
5
Revealing your account password to others or allowing use of your account by others.

Employees may only use Camio removable media in work computers. Camio removable media may not be connected to or used in computers that are not owned or leased by Camio without explicit permission. Sensitive information should never be stored on removable media.

Logging from critical systems, applications and services can provide key information and potential indicators of compromise. Although logging information may not be viewed on a daily basis, it is critical to have from a forensics standpoint.

General Requirements

All systems that handle confidential information, accept network connections, or make access control (authentication and authorization) decisions shall record and retain audit-logging information sufficient to answer the following questions:

1
What activity was performed?
2
Who or what performed the activity, including where or on what system the activity was performed from (subject)?
3
What the activity was performed on (object)?
4
When was the activity performed?
5
What tool(s) was the activity performed with?
6
What was the status (such as success vs. failure), outcome, or result of the activity?

Elements of Logging

Logging must contain or unambiguously infer:

1
Type of action – examples include authorize, create, read, update, delete, and accept network connection.
2
Identifiers for the requester of the action – examples include username, IP address, and MAC address.
3
Identifiers for the object of the action - examples user id, database record key, and query parameters.
4
Before and after values when action involves updating a data element, if feasible.
5
Date and time the action was performed in UTC.
6
Whether the action was allowed or denied by access-control mechanisms.
7
Description and/or reason-codes of why the action was denied by the access-control mechanism, if applicable.
Please contact security@camio.com for more information.