Our security commitment
We have collected all the policies and documentation on management systems and support adopted by Aruba Cloud to provide concrete evidence and an additional guarantee of the care we take when providing our services.
We protect our data and yours according to a risk management system featuring high levels of data security.
We have collected all the policies and documentation on management systems and support adopted by Aruba Cloud to provide concrete evidence and an additional guarantee of the care we take when providing our services.
We are aware how important it is for all organizations to be able to trust in the protection of data and digital resources.
This is why it is a priority for us to provide secure services, delivered in full compliance with regulations and standards governing the security and protection of data, information and IT infrastructure.
For Aruba, information protection is a fundamental aspect that starts with an evaluation of the environments it is treated in, assesses the relationship between assets, threats and vulnerabilities and identifies potential associated cyber risks, with the aim of defining an efficient security program to protect company business.
We implement the measures recommended by the ISO 27001 standard in order to reduce risks and guarantee cover for the entire management of information security and of the proposed technological solutions, as well as the processes of the organization and personnel involved.
Information Security Management System
Policies (ISMS).
Information Security Management System Policies (ISMS) - The Aruba Group has defined the approach adopted by the organization for managing its Information Security objectives in a specific Company Policy. This document has been approved by Management and published on the company intranet. In support of the abovementioned Policy there are additional policies and procedures for specific issues that define Aruba's Information Security Management System.
People, roles, skills and responsibilities relating to processes, according to the principles of segregation of duties, least privilege and dual control.
Roles and Responsibilities
Within the scope of Aruba's responsibilities as a Cloud Service Provider (CSP), as defined in the page dedicated to the shared responsibility model, Aruba has defined the personnel, roles, skills and responsibilities connected with the processes, in accordance with the principles of the segregation of duties, least privilege and dual control.
Segregation of Duties (SoD)
Within the scope of the operational processes of the Services, a sequence of procedures is carried out by several people, never just one, to ensure that control of the entire process is not entrusted to a single individual.
Least Privilege
Permissions to access premises, equipment, data, functions, etc., are granted to the personnel assigned to services, in accordance with the "least privilege” principle, i.e. to the extent necessary for these resources to carry out the tasks assigned to them, but no more.
Dual Control
The most critical procedures from a security perspective involve the participation of at least two people.
Personnel training, Awareness and Non Disclosure Agreement (NDA).
Personnel Training
Service personnel have adequate skills and experience, and are provided with specific training for each important system update.
Awareness
Periodically, staff are made aware of security issues, cybercrime in general and the best practices to be adopted, through specific training courses.
Non-disclosure Agreement (NDA)
Newly hired personnel are required to sign a confidentiality agreement in order to protect the company's know-how and other confidential information.
All procedures regarding the lifecycle of the physical and virtual machines used, from installation to disposal.
Asset Inventory
There is an updated inventory of the assets, which includes a record of the virtual and physical equipment providing the services and its physical location within the Aruba infrastructure.
The asset inventory is updated following each installation of new equipment in the infrastructure. In addition, to check for any deviations, automatic scans of the networks are carried out on a daily basis to detect any new assets.
The inventory contains a description of the assets in which the corresponding characteristics are described: for example, the type of equipment (virtual or physical), the infrastructure to which it belongs, internal ownership, etc.
Handling of Assets
There are internal procedures that define and formalize the activities relating to the preparation of new equipment and its management (e.g. how to make a change, how to update systems, etc.).
Configuration Management
The regular audit of system components makes it possible to identify and manage individual components in a timely manner, with details of each hardware model and each software version.
Maintenance and Support
The most important hardware (HW) for the continuity of the Service is covered by maintenance contracts guaranteeing repair or replacement within a sufficiently rapid timeframe by the supplier, or the availability of identical stored components which can be deployed if required. Regarding commercial software (SW), there are appropriate contracts that guarantee the supplier's technical support in the event of malfunctions.
Disposal
Aruba guarantees that specific procedures are adopted for the disposal and destruction of hardware components that have fallen into disuse both for foreign colocation data centers and for proprietary data centers in order to ensure that for each storage that has reached the end of its life and needs to be replaced and disposed of, the complete, permanent removal of all the data contained therein is carried out.
Management of logical access for personnel and the password policy.
Logical Access Management
Before accessing internal systems, authorized personnel will be asked to identify and authenticate themselves (via username, password and smartcard). Once authenticated, Aruba personnel can access only the resources (e.g. systems, data) for which they have been explicitly authorized, in accordance with the actual needs of the role they perform. Users are managed through Active Directory (AD) domain controllers. To guarantee the "Segregation of Duty" principle, logic accesses to the production environment are managed via AD on a dedicated domain, within which there are users with different privileges and permissions in line with the job-role of the person in question, and in compliance with the principle of least privilege. All users are named persons, so there are no group and/or shared users and they are periodically subject to independent verification by the Security Department.
Password Policy
Consistent with group security policies and in compliance with privacy legislation ("minimum measures", provisions of the Data Protection Authority), a secure password management policy is applied.
Following the creation of a user, the password must be changed at the first login and it must then be changed periodically after a defined period of time.
Methods for protecting the data we use: AES, SSL certificates, "at rest" encryption.
TLS Secure Channel
All data flows from/to the systems, are protected by a TLS secure channel, by means of appropriate configuration on the servers, so as to ensure:
This applies both to flows originating interactively (web browsing) and to those generated automatically (e.g. Web Services query).
Until now AES has mainly been used as a symmetric encryption algorithm.
The enabled version of TLS is as high as possible, taking into account the capabilities of the software clients.
SSL Server certificates installed on servers exposed on the Internet are issued by a CA recognized as reliable by the main browsers and operating systems.
The details of the certificates in use on the cloud panels and the protocols used on the public network are available in the Aruba KB on the page dedicated to the certificates in use on cloud panels. <https://kb.arubacloud.com/en/computing/use-and-technology/certificates-in-use-on-cloud-panels.aspx>
Data at Rest Encryption
The most security-critical data "at rest", such as passwords, OTP token seeds and other data that must remain confidential to ensure the reliability of processes, are stored by means of symmetric encryption, using what is considered to be a sufficiently secure algorithm.
As for the protection of credentials more specifically, passwords are stored within the repository in non-reversible "hashed" mode (fingerprint or digest of the data), using the SHA512 hashing algorithm.
Description of all the data centers in our network and all the security measures in place.
Data Center
The systems for provision of the Cloud Service are located at the IT1 and IT2 Data Centers in Arezzo, located at Via Gobetti 96 and at Via Ramelli 8 respectively, and IT3 DCA and DCB data centers in Ponte San Pietro (BG) located at Via San Clemente 53. In addition to the Italian data centers, Aruba has an international network of infrastructures, both owned and belonging to qualified partners:
Earthquake-resistant buildings
Aruba Data Centers comply with anti-seismic regulations.
Control of physical access
Access to the buildings is possible only for those who actually need it, after signing in at reception, and access to the technical rooms is permitted only for authorized personnel, following identification with a badge and corresponding PIN. The access control system includes the option to allow and disable individual swipe cards for specific areas, times and other criteria, guaranteeing complete security and ease of access.
Anti-intrusion systems
At the Data Centers and Offices, grilles, bulletproof glass, armored doors, motorized gates (passive anti-intrusion systems) are deployed, and CCTV and/or VMD systems (active anti-intrusion systems) are installed. The anti-intrusion alarm system in the various zones is fully automatic.
The Data Centers are divided into several zones, monitored by anti-intrusion systems. In addition, motion sensors are installed in all areas capable of detecting the presence of people; in sensitive areas (data rooms, Power Centers, warehouses) there are also sensors that detect the opening of doors and badges are used for entry and exit.
Fire-fighting system
This system is designed to comply with the law and with the relevant technical standards. Fire detection sensors are present on all floors of the buildings.
Anti-flooding system
Liquid and anti-flood detection systems are installed. The buildings are also located in flat areas and in a surveyed position with respect to ground level.
Power Supply System
This system is present in the Data Centers, being redundant at all levels (substations, power centers, UPS, generator sets, switchboards, etc.) to guarantee continuity of the power supply under any foreseeable circumstances. It also includes the appropriate measures to contain the effect of atmospheric electric discharges, mains spikes, etc.
Ventilation and Air Conditioning System (HVAC)
The system is capable of ensuring optimal climatic conditions for the smooth operation of servers hosted at Data Centers.
Internet connectivity
Redundant connectivity is present in the buildings, with a capacity at least twice the minimum necessary.
Control Room and Facility Operation Center (FOC)
The Data Centers are manned 24/7, 365 days a year, by qualified systems personnel, which ensures constant monitoring of the infrastructure and services and timely intervention if needed.
Insurance
The company has entered into an insurance contract to cover risks not mitigated by other security measures.
Operating procedures and safety techniques for equipment management.
Operating procedures
The procedures that prescribe operational behaviors are documented, made available and known by the personnel concerned.
Server hardening
The servers that host components critical for the security of services undergo systemic interventions aimed at reducing the range of attack, such as: the removal of unnecessary software, disabling unnecessary services/protocols, the installation of security patches recommended by vendors, the application of policies for the complexity of passwords, the enabling of security logs, etc.
Distributed Denial of Service (DDoS) protection
A system is implemented that analyses incoming data, detecting abnormal traffic and, where possible, blocking potentially dangerous packages.
Logging
The logs of the infrastructure servers for privileged access to the systems are collected and stored in compliance with legal requirements. These logs are periodically verified by the Security Team through internal audits. The application logs of the operations carried out during use of the services are made available to customers. Likewise, the work of System Administrators is subject to verification by the data controllers at least once a year, in order to check compliance with the organizational, technical and security measures concerning the processing of personal data, provided for under current regulations.
Monitoring and Alerting
The critical systems of the Service are controlled by a continuously operating monitoring system. The system has the ability to generate "alerts", in the form of email or SMS messages, which allow you to promptly inform the personnel in charge of a potential accident or disruption, so that the necessary remedial actions can be implemented as soon as possible.
Backup (part for which Aruba is responsible)
The functional components for provision of the Aruba service, user management and other architectural components of the service follow the backup procedures defined at the company level that are periodically verified and tested.
Antivirus
All devices in the Aruba network are controlled, monitored and protected by EDR systems. EDR (Endpoint Detection and Response) technology monitors known and unknown threats across all endpoints and company servers in real time and proactively. A dedicated group with 24- hour coverage is responsible for analyzing anomalous events and intervening promptly.
Vulnerability Management Process
The entire Aruba perimeter is regularly scanned by automated tools and by qualified industry professionals in order to identify any possible or potential vulnerabilities. Each identified critical area is immediately reported to the competent group, thereby starting a problem resolution cycle that can end with a new release or with a mitigation (e.g. virtual patching). Finally, to verify its effectiveness, a new scan is performed to ensure recovery from the vulnerability.
Capacity Management and Change Management
In order to ensure proper delivery/provision of the service, the Aruba Group believes that it is essential to monitor available resources, to analyze capacities and to adopt appropriate precautions for their optimal exploitation and to ensure the normal use of services. The levels of connectivity, the levels of resource occupation, disk space and the sizing of the infrastructure are monitored with specific instruments by the group of operators belonging to the Control Room, 24/7/365, whose task also extends to monitoring any anomalous event. The monitoring tools allow the setting of specific controls for each service, detecting anomalies and making it possible to anticipate the need for change. The changes made necessary by the monitoring and capacity management activities are managed in a controlled manner so that the results can be verified and to keep track of the activities carried out.
Updates and Patching
All systems are periodically updated and patched using centralized tools and following internal procedures that require testing first in the development environments. Once this step has been completed, the application is executed in the production environment.
Synchronization - All Cloud systems use the NTP system to synchronize their clocks and maintain event consistency. The authoritative source for clock synchronization is INRiM (https://www.inrim.it/en). The time zone on all systems used is CEST, with the exception of UK time where GMT is used. All provided VMs have a CEST-based time zone and use as the clock synchronization source of the host on which they are resident.
Multitenancy and Secure Data Erasure
Aruba guarantees a multitenancy system that allows you to separate the requests of individual customers from one another and to separate the customers' requests from those of the Cloud Service Provider.
Aruba has expressly developed the public cloud panel in multitenant mode in accordance with the guidelines for secure programming and allows only access and control of its cloud Infrastructure. In addition, for PRO, VPS and Virtual Private Cloud services, and whenever external software is used, multitenancy is guaranteed directly by the virtualization systems used.
When the service is closed, or when the credit runs out, as defined in the contract, Aruba will delete and permanently remove the data from the cloud services as described on the page dedicated to credit running out. Depending on the service, deletion can take place through APIs, technical panels, scripts or specific software.
By means of a defined process, Aruba manages the periodic deletion of temporary files from its cloud systems.
Firewall, IPS and VPN
Firewall and IPS
The web portals provided for the services are protected by the cloud service data center firewall and protected by IPS.
As far as computing services are concerned, all virtual machines provided by Aruba are modelled and made available in the form of images. These images are produced and tested by Aruba technicians and, in particular, after installing the Operating System and carrying out the first configuration, the firewall system is enabled, granting the least possible privileges and opening only the necessary doors.
Virtual Private Network (VPN)
Remote access to the company's network (LAN) is granted only to authorized personnel requiring such access; remote access is possible only through a VPN that ensures: confidentiality of communication, strong server authentication and strong (two-factor) user authentication.
Management of changes to application software
Management of Changes
Changes to the application software are subject to evaluation and approval before they are implemented; they are then tested before proceeding to production, in order to verify the correct implementation of the new features and the absence of regressions. In addition, all the software developed is managed by a versioning system.
Policies for the evaluation, management and security of relations with suppliers.
Management of Suppliers
The company policy governing relations with suppliers provides that, for the proper definition and management of relationships with each new supplier, the following aspects, among others, must always be taken into account, with particular attention to information security:
In addition, external supplies necessary for development, maintenance and provision of the Service are subject to checks aimed at mitigating the risk of security incidents caused by noncompliant material or improper actions by suppliers. All providers of professional services are required to sign a non-disclosure agreement (NDA).
The contractual models used by Aruba for providing the service provide for the possibility of Aruba making use of third parties to carry out its activities. This collaboration is based on Aruba's commitment, envisaged in contracts with any subcontractors, to verify that, based on the type of service provided, they are able to comply with the same requirements and levels of security to which Aruba is committed. Aruba maintains a list of service subcontractors, available to customers on request. Likewise, in the event of the admission of new/additional subcontractors, Aruba undertakes to notify its customers well in advance in order to allow the latter to raise any objections or to withdraw.
Structured, systematic approach to managing information security incidents.
Information Security Incident Management Process
The Aruba Information Security Management System takes a structured, programmed approach to the management of Information Security events and/or incidents that may occur in the context of the operations of companies within the Group, and refers to the ISO 27035 guidelines with regard to the Information Security incident management flow. This process is implemented through a specific plan which determines the operational measures that must be implemented in the event that information security incidents are found. An incident management flow has been defined and the responsibilities related to its application have been identified, both in terms of incident management and resolution and in terms of strategic support for the timely adoption of the decisions necessary for dealing with the most relevant security incidents (for example major incident, unknown incidents, data breach). Timelines and procedures have also been defined for the preparation and distribution of communications relating to information security incidents to authorities, customers and third parties.
Implementation of measures relating to ISO 27001 certification to mitigate risks and guarantee business continuity and security.
Disaster Management Procedure
Aruba has drawn up a Business Continuity Plan, a Policy and specific BC procedures relating to the services that are essential for the operation of the Data Centers such as electricity, air conditioning and connectivity.
The Data Centers are ISO 27001 certified, meaning that all infrastructures are protected by the primary physical security and business continuity measures.
More specifically, Aruba Data Centers IT1, IT3 DCA and DCB all conform to the highest level (Rating 4) of ANSI regulation TIA 942-B-2017. This rating indicates the capability to prevent service disruption due to serious failures (fault-tolerance) and was achieved through a series of design and implementation measures applied to all aspects of the data center construction: site selection, architectonic considerations, physical security, fire prevention systems, electrical systems, mechanical equipment and data network.
A Rating 4 (formerly Tier 4) data center features permanently active redundant components, in addition to multiple power and cooling routes for hardware.
To conclude, the data centers are designed to withstand a fault in any area of the facility, without causing downtime and are protected against physical risks including natural disasters (e.g. fires, floods, earthquakes, etc.). Aruba Data Centers IT3 DCA and DCB are ISO/IEC 22237 certified, the international benchmark standard for the whole lifecycle of the data center, from strategic conception to implementation and operation, in accordance with ANSI/TIA 942 (American standard) and EN 50600 (European standard) regulations.
The cloud environment comprises a multi-data center infrastructure, whose services are interconnected by an IPSEC high bandwidth and protection network.
Thanks to its multi-data center structure design, it is natively prepared for Disaster Recovery by the fact that each data center is independent from the others from a logistics perspective.
The customer’s virtualized servers are not subject to geographical Disaster Recovery, as the customers themselves are provided with all the necessary tools to create their own tailor-made Disaster Recovery systems and procedures.
GDPR compliance: Regulatory compliance and regular audits to guarantee data security.
Protection of Personal Data
All services are provided in full compliance with the regulations in force regarding the protection of personal data, in accordance with Regulation (EU) 2016/679 (“GDPR”), Legislative Decree 196/2003, as referred to in Legislative Decree 101/2018, and the Provisions of the Data Protection Authority.
Auditing
Events recorded with tracking, particularly those that could indicate a security threat, are periodically analyzed.
Internal inspections
The auditing and inspections manager ensures the performance of checks on the compliance of the cloud service with the provisions of this document and the regulations in force, at least once a year.
We provide our customers with useful tools and features for the completion of security-related operations in the cloud, the customer's own responsibility, as set out in the shared responsibility model.
Description and service delivery locations with shared responsibility model.
Roles and responsibilities
The general description of the Aruba service can be found in the Knowledge Base (KB), on the page dedicated to the general description of the service, together with the service delivery locations table and the shared responsibility model table between Aruba as Cloud Service Provider and its customers.
Continual personnel training with educational resources and documentation on services and Aruba APIs.
Personnel training
Aruba provides a Knowledge Base containing information on Aruba services. It contains information on the services, guides, tutorials, documentation on the Application Programming Interfaces (APIs), glossary and Changelog of the services.
Attribution, deletion and classification of assets in accordance with Aruba guidelines.
Asset ownership
Within the logic of shared responsibility, for each service Aruba has identified the respective attributions of ownership, with regard to infrastructure, licenses, IP addresses, software provided by Aruba, software, data and content entered by the customer.
The service asset ownership information is available to customers within the public KB on the dedicated page.
Data erasure
Through the disk wipe technique in the Aruba Cloud environment, for VPS (Smart), PRO and Virtual Private Cloud services, the customer has the option of permanently deleting the data contained on their equipment and making it impossible for it to be recovered. The KB dedicated page sets out the operational steps.
Labelling
Aruba Group services allow customers to name and classify assets under their control. The guides published in the Knowledge Base provide precise instructions on how to perform these operations and what the constraints are.
Independent management of user access and administrative permissions for personalized control.
Logical Access Management
It is possible at all times for the customer to register, modify, suspend, reactivate and delete their user profiles, as well as manage the related commercial aspects (credits, thresholds, associated profiles, etc.).
In terms of permissions, it is possible for each customer to manage their assets from an administrative point of view by setting security levels and managing access privileges. In particular, depending on the service, it is possible for customers to:
Permissions are organized in a hierarchical way
Recommendations on the adoption of risk-based encryption checks and a description of the Cloud Backup advanced data encryption service.
Encryption Checks
We suggest that customers adopt a risk-based approach and implement additional encryption checks in the areas for which they are responsible (see Shared responsibility model) in the event that the data processed within the Aruba service is particularly sensitive.
Aruba Cloud Backup – Encryption
The Aruba Cloud Backup service offers the option to encrypt backed-up data before it is even transferred with a strong password (AES-256 standard).
Backup and logging systems, capacity management, multi-tenancy and synchronization.
Backup
Aruba Cloud services allow customers to create and set up their own automated backups through the Cloud Backup and Bare Metal Backup solutions, choosing their own policies in terms of encryption, periodicity, type (complete or incremental) and other specific needs.
The optional Disaster Recovery as a Service (DRaaS) also allows you to test the failover procedures without any interruptions.
All the procedures for managing the backup and restore services are performed independently by the users and are described in the service's Knowledge Base (KB) on the dedicated page, where the various methods that can be used to back up data are also described.
No other backup copy of the data is made by Aruba other than those independently defined by the users.
Logging
Aruba provides customers with the application logs they produce when using the services.
Capacity Management
With regard to customer capacity management, Aruba allows the customer to constantly monitor the consumption of the financial and technical resources at their disposal, also allowing forecasting.
In addition, when purchasing the service, a description is provided of the cases in which there are limits to the expandability of resources.
Synchronization - When it is believed that clock synchronization may be an area of difficulty for the customer, detailed information is provided in the public Knowledge Base (for example, on the scheduled operations page) or in the management panels.
Multitenancy
Cloud Server
Multitenancy is guaranteed:
Cloud VPS (SMART)
Multitenancy is guaranteed:
Virtual Switch and Hybrid Link:
these are resources dedicated to the individual tenant. Multitenancy is guaranteed by the public cloud panel expressly developed in multitenant mode by Aruba and by authenticated public APIs. These solutions only allow access to and governance of your cloud infrastructure.
Virtual Private Cloud
Multitenancy is guaranteed:
Bare Metal Backup
Multitenancy is guaranteed:
Disaster Recovery
Multitenancy is guaranteed:
Cloud Backup (Evault/Commvault)
Multitenancy is guaranteed:
Cloud Monitoring:
multitenancy is guaranteed by the public cloud panel expressly developed in multitenant mode by Aruba and by authenticated public APIs. These solutions only allow access to and governance of your cloud infrastructure.
Cloud Object Storage
Multitenancy is guaranteed:
IaaS for SAP HANA
Multitenancy and segregation are guaranteed thanks to various measures:
Domain Center
Multitenancy is guaranteed by the public cloud panel expressly developed in multitenant mode by Aruba and by authenticated public APIs. These solutions only allow access to and governance of your cloud infrastructure.
Application Platform
Multi-tenancy is ensured through two modes:
Database as a service (DBaaS):
Multitenancy is guaranteed by the public cloud panel expressly developed in multitenant mode by Aruba and by authenticated public APIs. These solutions only allow access to and governance of your cloud infrastructure.
Firewall, Virtual Switch and geographical data management for security and compliance of communications.
Firewall
Customers are the administrator of their own server and therefore have the ability to change the firewalling settings. The guides and tutorials in the KB provide information on how to segregate and protect network security and set up a firewall on a customer's Aruba Cloud.
Virtual Switch
Customers have the option to purchase the Virtual Switch service which consists of providing a dedicated VLAN that is not shared with other customers, on which customers can interconnect their machines for maximum segregation, with the ability to independently create dedicated private networks, not shared by other customers, for configuring their own architecture (Virtual Private Cloud).
If required, public networks can also be provided as dedicated networks not shared with other customers.
Geographical location of data to guarantee Security and Compliance
Alternatively, Aruba services can be activated on a data center basis or on a regional basis (which coincides with a country).
Customers have the option of specifying the data center or data centers in which their services are to be activated and their data transferred; for services provided on a regional basis, customers have the option of selecting the country within which to activate the service.
Under no circumstances does Aruba move systems or content outside of the geographical locations (DC or regions) configured by its customers.
Changelog for releases, fixes, corrections and updates of customers' services.
Management of Changes
Aruba provides customers with a changelog to inform them of releases, fixes, corrections and updates to the services offered.
The Aruba Cloud DRaaS service: business continuity using rapid replication and recovery of IT infrastructures.
Disaster Recovery as a Service (DRaaS)
Aruba provides the Disaster Recovery service as a service designed to guarantee business continuity for companies, enabling them to quickly replicate and restore access and functionality for their IT infrastructure after an interruption due to a cyber attack, failure or disastrous event.
Using a self-service web panel with a secure connection, customers can create disaster recovery guidelines and policies by selecting a source (the primary site) and a destination (the secondary site) of their choice from their own on-premises VMware virtual infrastructure and/or Aruba Data Centers with the Virtual Private Cloud service enabled.
Security aspects of our cloud computing - ISO 27001:2017 standard