close  video close icon

Security Policy

At ROUBLER, we know that our customers rely on us as an important part of their business processes. We take this responsibility to our customers very seriously, and the security and reliability of the software, systems and data that make up the ROUBLER suite of products are our top priority.

Infrastructure Security

The ROUBLER application is hosted and managed within the Amazon Web Services (AWS) cloud computing infrastructure – the most secure cloud computing environment available today. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. AWS inherently protects from threats by applying security controls at every layer – from physical to application – isolating applications and data, whilst rapidly deploying security updates without service interruption. As a result, the ROUBLER application is afforded all the benefits of being hosted on the AWS infrastructure, including:

  • Regular security assessments and compliance auditing
  • Ongoing penetration testing and vulnerability assessments
  • Real-time antimalware and antivirus protection for file systems, memory, processes and registry database
  • Rolling updates and security patching with zero downtime
  • Environmental safeguards
  • Network security safeguards
  • Data security safeguards
  • System security safeguards
  • Vulnerability management
  • Backups
  • Disaster recovery
  • Privacy
  • Restricted access to customer data
  • Employee screening and policies
  • Dedicated security staff

Additionally, AWS provides certification reports that describe how the AWS Cloud infrastructure meets the requirements of an extensive list of global security standards, allowing ROUBLER to meet specific government, industry, and company security standards and regulations, including:

  • ISO 27001
  • SOC
  • PCI Data Security Standard
  • FedRAMP
  • Australian Signals Directorate (ASD) Information Security Manual
  • Singapore Multi-Tier Cloud Security Standard (MTCS SS 584)

For more information, please see the AWS Security page.

Application Security

The ROUBLER web application adopts the OWASP Top Ten and OWASP Mobile Top Ten as a means of ensuring application code is free from flaws and security vulnerabilities. The OWASP Top Ten is a set of powerful awareness document for web and mobile application security. The OWASP Top Ten represents a broad consensus about what the most critical web and mobile application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce a list of the top ten security vulnerabilities affecting web and mobile applications.

Adopting the OWASP Top Ten ensures ROUBLER is protected against:

  1. Injection
  2. Broken Authentication and Session Management
  3. Cross-Site Scripting (XSS)
  4. Insecure Direct Object References
  5. Security Misconfiguration
  6. Sensitive Data Exposure
  7. Missing Function Level Access Control
  8. Cross-Site Request Forgery (CSRF)
  9. Using Components with Known Vulnerabilities
  10. Unvalidated Redirects and Forwards

Adopting the OWASP Mobile Top Ten ensures ROUBLER is protected against:

  1. Weak Server Side Controls
  2. Insecure Data Storage
  3. Insufficient Transport Layer Protection
  4. Unintended Data Leakage
  5. Poor Authorisation and Authentication
  6. Broken Cryptography
  7. Client Side Injection
  8. Security Decisions Via Untrusted Inputs
  9. Improper Session Handling
  10. Lack of Binary Protections

Additionally, all ROUBLER technical staff receive OWSAP Top 10 training. The training takes staff through a practical approach to the following secure coding principles:

  • Threat Risk Modelling
  • Handling E-Commerce Payments
  • Phishing
  • Web Services
  • Ajax and Other “Rich” Interface Technologies
  • Authentication
  • Authorisation
  • Session Management
  • Data Validation
  • Interpreter Injection
  • Canonicalisation, locale and Unicode
  • Error Handling, Auditing and Logging
  • File System
  • Distributed Computing
  • Buffer Overflows
  • Cryptography
  • Configuration
  • Software Quality Assurance
  • Deployment
  • Maintenance

For more information, please see the OWASP website.

Payments Security

The ROUBLER application uses the Braintree payments service for the secure transaction and storage of all payments. Braintree focuses on providing a secure environment that goes above and beyond industry security standards and guidelines. Braintree is a validated Level 1 PCI DSS Compliant Service Provider, and are on Visa’s Global Compliant Provider List and MasterCard’s SDP List.

Braintree is certified to PCI Service Provider Level 1, the most stringent level of certification, actively works to protect against fraudulent charges and monitors suspicious transactions.

For more information, please see the Braintree website.

Vulnerability Management and Penetration Testing

ROUBLER undergoes monthly vulnerability assessments conducted by Nessus Cloud and biannual penetration testing conducted by HackLabs, with all high and critical vulnerabilities being addressed immediately. Nessus is a PCI DSS Approved Scanning Vendor (ASV) and provides cloud-based scanning and detection of web server vulnerabilities, known and unknown web application vulnerabilities, and configuration auditing of the ROUBLER web application platform. HackLabs is a Security Consulting Company specialising in Penetration Testing.

For more information, please see the Nessus Cloud and HackLabs pages.

Secure Access

All ROUBLER employees are equipped with secure laptop computers with encryption and antivirus software centrally installed, configured and managed. Technical staff undergo training on relevant security matters that pertain to their job.

More Information

If you have any security concerns or questions, feel free to contact us at security@roubler.com.

x