{"id":9718,"date":"2020-05-07T14:08:28","date_gmt":"2020-05-07T14:08:28","guid":{"rendered":"http:\/\/local-preprod.cos.de\/it-security\/"},"modified":"2020-10-15T15:15:42","modified_gmt":"2020-10-15T15:15:42","slug":"it-security","status":"publish","type":"page","link":"https:\/\/cos.de\/en\/it-security\/","title":{"rendered":"IT-Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h1 class=\"title-heading-center\" style=\"margin:0;\"><p style=\"text-align: center;\"><span style=\"color: #f89924; font-weight: bolder;\">IT<\/span> -Security<\/p><\/h1><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator\" style=\"margin-left: auto;margin-right: auto;margin-bottom:40px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Information security<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:0px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"margin-top:20px;margin-right:0px;margin-bottom:10px;margin-left:0px;\"><h3 class=\"title-heading-left\" style=\"margin:0;\">Information security<\/h3><\/div><div class=\"fusion-text fusion-text-1\"><p>Digitalisation of businesses in all industries, scales and areas puts a spotlight on the challenges of IT-security. Given the daily rate of attacks, manipulations and hacks from a broad variety of sources, the survival of a business relies largely on the reliability and availability of its data \u2013 safe and independent of the persons currently responsible.<\/p>\n<p>The data is combined to information and information to content reflecting the knowledge of technology, business environment and other inside know how with different levels of importance, levels of confidentiality ad rates of change.<\/p>\n<p>Therefore, the products of C.O.S address the risks of the digital age with a proactive security architecture, adequate control mechanisms of the IT-organisation (COBIT, ITIL, \u2026) to detect attacks or manipulations fast or avoid their occurrence completely.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Risk and protection<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p>C.O.S follows the literature and implements recommended measures in the software development process and guidelines. Regular conferences keeps the team up to date with the latest challenges and attack patterns.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">User authentication and logical access controls<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-3\"><p>Multi-factor authentication procedures, password policies tuned to the necessary security level and encrypted storage of the data protects the system and data against unauthorised usage.<\/p>\n<p>Logical access controls are embedded on the database layer and therefore far away from the font end or webserver. Potential hackers need access to the database server itself and therefore have to conquer various more firewalls and other security controls before arriving at the desired content.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Privacy<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p>Personal data is stored in the application on a need to know basis. The data processing is subject to the EU-privacy directive.<\/p>\n<p>Our application modules do not require sensitive individual data (health, biometry, genes, \u2026) in case of standard usage. Please consult your data protection officer to find out more details.<\/p>\n<p>However, C.O.S offers a tool to support the erasure process of personal data by a deletion or anonymising routine, once a EU-citizen requests that. Please refer to our support department.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Network<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-5\"><p>The communication \u2013between frontend (Browser-Client) and Webserver as well as webserver and database are encrypted. Only sniffing combined with a huge brute-force attack effort mayhave a very expensive and slight chance of decrypting the communication channel. Very few institutions have the necessary resources and utilities on this planet.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Database<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-6\"><p>One central database stores all information. All data exists only once with no redundancies \u2013 except backup media of course. This approach minimises the contact surface and hence the risk.<\/p>\n<p>Database accounts are divided into roles with privileges for daily usage and maintenance. As the application modules require the credentials during the daily operation it stored encrypted in a place inaccessible for end users. The credentials of the maintenance account are kept on neither the database nor any other system component. Therefore, only a social engineering or malicious behaviour typically with a breach of the segregation of duties can harm the integrity of the system.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Security classes and encryption<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-7\"><p>The protection measures cost effort and pose more workload on users and IT, they should reflect the confidentiality level of the content. Therefore, the content must be classified into various subsets of the same protection level. A smooth and efficient operation requires a fruitful and vital information flow. Hence, security measures should not slow or block the flow inadequately.<\/p>\n<p>The respective security class can be configured by:<\/p>\n<ul>\n<li>Setting the default to no access to anybody unless named,<\/li>\n<li>Decrypted storage,<\/li>\n<li>Confidentiality label (watermark, warning, \u201c hint, \u2026)<\/li>\n<li>Additional authentication on content access,<\/li>\n<li>Multi Factor or TAN-procedure.<\/li>\n<\/ul>\n<p>The keys can be saved on a separate server e.g. a dedicated and accordingly protected certification server. Attacks on the browser are therefore useless.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Internal controls<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-8\"><p>The segregation of duties principle is the rosetta stone of any organisation\u2019s control system facing security risks. Conflicts among roles are avoided systematically by defining them in the application on content or system level: the system will then take care of this and restrict such violations. The four-or six-eyes principle will always be followed.<\/p>\n<p>Beyond this preventative, there are also detective controls. Protocols, history and timelines log the changes and provide an audit trail.<\/p>\n<p>Omissions or overdue transactions are reported and escalated to the responsible supervisor, process owner or team leader autoamtically after passing a tolerance threshold.<\/p>\n<p>Modules for:<\/p>\n<ul>\n<li>Management system and Corporate Governance \u2013 <a href=\"http:\/\/cos.de\/en\/dokumente\/\">co_documents<\/a><\/li>\n<li>Project management \u2013 <a href=\"http:\/\/cos.de\/en\/massnahmen\/\">co_issues<\/a><\/li>\n<li>Audit management \u2013 <a href=\"http:\/\/cos.de\/en\/audits\/\">co_audits<\/a><\/li>\n<li>Reporting \u2013 <a href=\"http:\/\/cos.de\/en\/reporting\/\">co_reporting<\/a><\/li>\n<\/ul>\n<p>are themselves integral parts of the internal control system of the organisation as a whole.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Application<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-9\"><p>The business logic is encapsulated in a specific application pool, that has restricted access. Transports of patches, updates, packages, fixes etc. are performed password protected, if you prefer. Manipulations during delivery can be avoided using a safe channel.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-11 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Development<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-10\"><p>Our quality management performs security assessments sduring the code reviews. Deficiencies are tracked until the best solution is implemented.<\/p>\n<p>Third party software embedded in the products of C.O.S is scanned and analysed for their deficiencies as well. Either a workaround or an alternative component or a self-developed part will then cure the problem. Additionally C.O.S follows the latest discussion in the developer and user community to stay up to date with the current risk situation.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-12 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Logging and auditing acceptability<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-11\"><p>The user can select the data, where all changes should be recorded. C.O.S provides recommendation for a minimum assurance level. However, a potential attacker could manipulate the logs as well to hide and camouflage his manipulations afterwards.<\/p>\n<p>Therefore, C.O.S has developed an algorithm capable to detect such manipulations the log-tables. The system administrator is automatically notified if such fraudulent activities occur indicating criminal energy.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-13 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 50px;margin-top: 50px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:40px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><h2 class=\"title-heading-left\" style=\"margin:0;\">Digitale Signatur<\/h2><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-bottom:50px;width:100%;max-width:100px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"border-color:#f89924;border-top-width:4px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-12\"><p>Die verarbeiteten Inhalte k\u00f6nnen mit den auf dem Markt g\u00e4ngigen Methoden (Public-Private Key-Infrastruktur) signiert, qualifiziert signiert oder gar gesiegelt werden. Die weitere Verwendung in der Datenbank und die Verteilung der \u00f6ffentlichen Schl\u00fcssel an die weiteren Adressaten der Inhalte \u00fcbernimmt die Anwendung. Der private Schl\u00fcssel verbleibt beim jeweiligen Autoren.<\/p>\n<p>Hierdurch wird die eindeutige Herkunft und Unverf\u00e4lschbarkeit der Inhalte abgesichert, ohne dass die Zug\u00e4nglichkeit in der Organisation darunter leidet.<\/p>\n<p>Wenn als Quelle nicht der Autor, sondern die gesamte Organisation dienen und die Authentizit\u00e4t sichergestellt werden soll, so k\u00f6nnen unsere Anwendungsmodule zentral digital signieren. Mit einem eigenen Zertifikat werden auf dem Server alle Dokumente der Organisation verschl\u00fcsselt abgelegt und verteilt. Die Verteilung der \u00f6ffentlichen Schl\u00fcssel an die Nutzer der Inhalte wird dann vom System \u00fcbernommen. Der private Schl\u00fcssel wird unzug\u00e4nglich auf dem Zertifikatsspeicher des Servers selber oder auf einem externen Zertifikatsserver aufbewahrt.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-14 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 37px;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first\" style=\"width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;margin-top:10px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type='text\/css'>.reading-box-container-1 .element-bottomshadow:before,.reading-box-container-1 .element-bottomshadow:after{opacity:0.00;}<\/style><div class=\"fusion-reading-box-container reading-box-container-1\" style=\"margin-top:0px;margin-bottom:84px;\"><div class=\"reading-box\" style=\"background-color:#ffffff;border-width:1px;border-color:#cccccc;border-top-width:3px;border-top-color:var(--primary_color);border-style:solid;\"><h2>Other modules<\/h2><div class=\"reading-box-additional fusion-reading-box-additional\">\n<ul>\n<li><a href=\"http:\/\/cos.de\/en\/dokumente\/\">Documents<\/a><\/li>\n<li><a href=\"http:\/\/cos.de\/en\/massnahmen\/\">Issues<\/a><\/li>\n<li><a href=\"http:\/\/cos.de\/en\/audits\/\">Audits<\/a><\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_3 1_3 fusion-one-third\" style=\"width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;margin-top:10px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type='text\/css'>.reading-box-container-2 .element-bottomshadow:before,.reading-box-container-2 .element-bottomshadow:after{opacity:0.00;}<\/style><div class=\"fusion-reading-box-container reading-box-container-2\" style=\"margin-top:0px;margin-bottom:84px;\"><div class=\"reading-box\" style=\"background-color:#ffffff;border-width:1px;border-color:#cccccc;border-top-width:3px;border-top-color:var(--primary_color);border-style:solid;\"><h2>Industry solutions<\/h2><div class=\"reading-box-additional fusion-reading-box-additional\">\n<ul>\n<li><a href=\"http:\/\/cos.de\/en\/finanzen\/\">Finance<\/a><\/li>\n<li><a href=\"http:\/\/cos.de\/en\/chemie\/\">Chemistry<\/a><\/li>\n<li><a href=\"http:\/\/cos.de\/en\/automobil-industrie\/\">Automotive<\/a><\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-top:10px;margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><style type='text\/css'>.reading-box-container-3 .element-bottomshadow:before,.reading-box-container-3 .element-bottomshadow:after{opacity:0.00;}<\/style><div class=\"fusion-reading-box-container reading-box-container-3\" style=\"margin-top:0px;margin-bottom:84px;\"><div class=\"reading-box\" style=\"background-color:#ffffff;border-width:1px;border-color:#cccccc;border-top-width:3px;border-top-color:var(--primary_color);border-style:solid;\"><h2>Application solutions<\/h2><div class=\"reading-box-additional fusion-reading-box-additional\">\n<ul>\n<li><a href=\"http:\/\/cos.de\/en\/vertraege\/\">Contracts<\/a><\/li>\n<li><a href=\"http:\/\/cos.de\/en\/schulung\/\">Training<\/a><\/li>\n<li><a href=\"http:\/\/cos.de\/en\/design-thinking\/\">Design Thinking<\/a><\/li>\n<\/ul>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/pages\/9718"}],"collection":[{"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/comments?post=9718"}],"version-history":[{"count":11,"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/pages\/9718\/revisions"}],"predecessor-version":[{"id":10374,"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/pages\/9718\/revisions\/10374"}],"wp:attachment":[{"href":"https:\/\/cos.de\/en\/wp-json\/wp\/v2\/media?parent=9718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}