Audit date: 06 October 2021
| Category | Activity | Scope | Status of the internal audit |
| Product Development Environment | Product Team Workstations | Updated Virus Protection Full Disk Encrytion No unauthorized access | Product Team Workstations We have validated the notebooks of all of our 15 product team members. |
| Source Code Management System | | Bitbucket Cloud - META-INF Source code management and Build system to store and build the code of our applications. Permissions Admin : Can create, delete repositories and modify repository settings. Write : Can push and merge source code modifications and trigger manual build pipelines. Read : Can pull source code, read build logs and pull requests. Repository1 - Admin
1 DevOps Engineer 2 Product Owner - Write
6 Software Developer ( 1 Contractor ) 1 Product Owner Repository2 - Admin
1 DevOps Engineer 2 Product Owner - Write
6 Software Developer ( 1 Contractor ) 1 Product Owner Repository3 - Admin
1 DevOps Engineer 2 Product Owner - Write
6 Software Developer ( 1 Contractor ) 1 Product Owner Repository4 - Admin
1 DevOps Engineer 2 Product Owner - Write
6 Software Developer ( 1 Contractor ) 1 Product Owner Repository5 - Admin
1 DevOps Engineer 2 Product Owner - Write
6 Software Developer ( 1 Contractor ) 1 Product Owner Repository6 - Admin
1 DevOps Engineer 2 Product Owner - Write
1 DevOps Engineer 6 Software Developer ( 1 Contractor ) 2 Test Engineer 1 Product Owner 1 Technical Account Repository7 - Admin
1 DevOps Engineer 2 Product Owner - Write
1 DevOps Engineer 6 Software Developer ( 1 Contractor ) 2 Test Engineer 1 Product Owner Repository8 - Admin
1 DevOps Engineer 2 Product Owner - Write
1 DevOps Engineer 6 Software Developer ( 1 Contractor ) 2 Test Engineer 1 Product Owner Repository9 - Admin
1 DevOps Engineer 2 Product Owner - Write
1 DevOps Engineer 6 Software Developer ( 1 Contractor ) 2 Test Engineer 1 Product Owner |
| Artifact Management System | | Jfrog Artifactory Artifact management system to store the build logs and artifacts of your application. Permissions -
Admin : Can create, delete repositories and modify repository settings. -
Write : Can upload, delete, overwrite (in snapshot repositories) artifacts. -
Read : Can list, download artifacts. Repository1 Repository2 |
| Staging Environment | AWS Staging Environment | -
Cloud Console access is restricted only to authorized persons -
SSH access is protected by keys and MFA -
Database access is possible only from the internal network -
Kubernetes access is possible only from the internal network -
Only minimal permissions are granted -
No unauthorized access | AWS Stage Separated AWS Account for the Stage resources. Permissions -
Admin : Can list, create, delete, modify AWS resources. -
Container Image Admin : Can list, create, delete, modify (in snapshot repositories) Docker images. -
Container Image Read : Can list Docker images. -
S3 Backup : Can list, create, delete, modify items in the Backup S3 Bucket. -
Stage Deploy : Can list, create, delete, modify Kubernetes resources and list Docker images. -
Admin 1 DevOps Engineer 3 Infrastructure Engineer ( 3 Contractor ) 1 Software Developer -
Container Image Admin 1 Technical Account -
Container Image Read 1 Technical Account -
S3 Backup 1 Technical Account -
Stage Deploy 2 Software Developer ( 1 Contractor ) AWS Stage Bastion EC2 instance to access the Stage internal network and databases. Permissions -
Root : Can administer Linux OS. -
User : Can log in and access the internal network of the Staging environment. -
Root 1 DevOps Engineer 1 Infrastructure Engineer ( 1 Contractor ) -
User 1 DevOps Engineer 2 Infrastructure Engineer ( 2 Contractor ) 3 Software Developer ( 1 Contractor ) 1 Test Engineer 1 Technical Account |
| Production Environment | AWS Production Environment | -
Cloud Console access is restricted only to authorized persons -
SSH access is protected by keys and MFA -
Database access is possible only from the internal network -
Kubernetes access is possible only from the internal network -
Only minimal permissions are granted -
No unauthorized access | AWS Prod Separated AWS Account for the Prod resources. Permissions -
Admin : Can list, create, delete, modify AWS resources. -
Container Image Admin : Can list, create, delete, modify (in snapshot repositories) Docker images. -
Prod Deploy : Can list, create, delete, modify Kubernetes resources and list Docker images. -
Admin 1 DevOps Engineer 1 Infrastructure Engineer ( 1 Contractor ) 1 Software Developer -
Container Image Admin 1 Technical Account -
Prod Deploy 2 Software Developer ( 1 Contractor ) AWS Prod Bastion EC2 instance to access the Prod internal network and databases. Permissions -
Root : Can administer Linux OS. -
User : Can log in and access the internal network of the Production environment. -
Root 1 DevOps Engineer 1 Infrastructure Engineer ( 1 Contractor ) -
User 3 Software Developer ( 1 Contractor ) 1 Technical Account |
| Log Analysis and Monitoring | Datadog Loggin and Monitoring System | | Datadog Log management and monitoring tool for our staging and production applications. Permissions Admin : Can administer all resources. Can not delete logs. Write : Can read, create, delete, modify monitors, dashboards. Can read logs. -
Read : Can read monitors, dashboards, logs. -
Admin 1 DevOps Engineer 1 Software Developer 1 Technical Account -
Write 1 DevOps Engineer 1 Software Developer ( 1 Contractor ) Read 1 Infrastructure Engineer ( 1 Contractor ) 4 Software Developer 2 Test Engineer 3 Support Agent 3 Product Owner |