Axelerant has established the following policy to safeguard the security, confidentiality, availability, and integrity of our personnel, partners, and end-clients. All team members and contractors are expected to accept and abide by this policy, which will be reviewed and updated from time to time. If you have questions or comments about this policy, please contact your supervisor. We invite your feedback.

What are the primary goals of our Security Policy?

How is the Security Policy understood?

We can group information into two classes: confidential and nonconfidential. 

Confidential Information:

Nonconfidential Information:

Key Points:

If you are unsure about the confidentiality of a piece of information, you should ask someone who can give a qualified answer (if in doubt who this is, consult with the legal department), in the meantime, work from the assumption that it is confidential.

Acceptable Use Policy

It is each person's responsibility to ensure they understand and follow the data security policy. This is true for Axelerant employees and contractors in both non-technical and technical roles. However, some additional steps need to be taken for those involved in technical work.

Broadly, dealing with confidential information involves the maximum extent feasible - limiting the number of places (physical and logical) where it is stored. Secondly, ensuring that each of those places is as secure as reasonably possible to prevent unauthorized access.

Users are responsible for carefully tracking any confidential information stored on personal devices (including backup/offline storage). Periodically during and after each project, confidential information stored on personal devices should be reviewed. Any longer needed should be deleted (after being archived to an Axelerant service, if needed). Users should ensure files are actually deleted (and not stored in a recycle/trash area), ideally running a secure delete on the files, which is available out of the box on OS X and GNU/Linux-based systems.

There are also several security concerns with non-confidential information. Even though we don't need to protect it from view, any copies in active use must be protected from unauthorized changes.

Our information technology systems, service, and network infrastructure must be used in ways that maintain:

Axelerant IT services provide several general user accounts. This includes:

Usage of Axelerant user accounts should be as follows:

In addition to user accounts, we provide developer and system administrator access to system and service accounts, such as administrator web-access and SSH access to client sites, version control systems such as SVN/Git and MySQL database access. Usage for these accounts is covered in our server security policy below.

Access Policy

The security of our systems is as strong as the weakest link. All devices that connect and are authenticating must be as secure as possible. Specifically:

Before connecting and authenticating to any Axelerant IT system or storing confidential information on your systems, all users must ensure that:

If a system is believed to be compromised, either through theft, loss, remote access, virus/malware infection, Axelerant people operations team should be informed immediately.

Password Policy

Passwords are used to protect many of our systems and services.

All passwords at Axelerant must follow this policy, including passwords used for:

The importance of strong passwords:

Password Managers & Two Factor Authentication

A password manager (such as 1Password) can easily create and maintain hundreds of different 16 character (or more!) passwords. It is a must for all employees to use 1Password as a password manager at Axelerant. Be sure to choose a strong password for your password manager.

Modern password managers - and many other services such as Google Apps, GitHub, Slack, and more) now accept Two Factor Authentication that can greatly increase the security of the protected assets. Axelerant requires TFA for access to the Axelerant Google Apps such as Gmail and Docs and OATH-authenticated apps such as GitLab.

Please see the Security Awareness and Tools document for details on these subjects and more.

Handling Passwords

Some Exceptions

.Private Keys

Server & Site Security

Web administrator access to websites, working on source code, and access to servers (SSH/shell, file system, database), carries a high level of responsibility and trust. You are expected to be familiar with and follow our best practices and processes, maintain your skills, and know your own limits.

Usage of Axelerant developer accounts should be as follows:

Web administrator account holders (Drupal, CiviCRM, etc.) must also:

Developers and themers working on the site codebase (and committing code to Git) must also:

Developers and themers maintaining local sandbox copies of client sites must also:

Developers and themers working on the site vhost (SSH/shell, file system, database) must also:

IT team system administrators working on Axelerant servers must also:

Security Awareness & Tools

We maintain a Security Awareness and Tools document that dives deeper into some additional topics, including:

Anti-virus Policy

Got Questions?

Contact your manager or Axelerant people operations team immediately.