| Category | Activity | Scope | Status of the internal audit |
|---|
| Product Development Environment | Product Team Workstations | - Updated Virus Protection
- Full Disk Encrytion
- No unauthorized access
| Product Team WorkstationsWe have validated the notebooks of all of our 25 product team members. |
| Source Code Management System | - Login access is restricted only to authorized persons
- Only minimal permissions are granted
- No unauthorized access
| Bitbucket Cloud - META-INFSource code management and Build system to store and build the code of our applications.Permissions- Admin : Can create, delete repositories and modify repository settings.
- Write : Can push and merge source code modifications and trigger manual build pipelines.
- Read : Can pull source code, read build logs and pull requests.
Repository1 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 1 Support Agent 1 CEO
Repository2 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 1 Support Agent 1 CEO
Repository3 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 1 Support Agent 1 CEO
Repository4 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 1 Support Agent 1 CEO
Repository5 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 1 Support Agent 1 CEO
Repository6 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 1 Support Agent 1 CEO
Repository7 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 1 Support Agent 1 CEO
Repository8 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
9 Software Developer ( 2 Contractor ) 3 Test Engineer 1 Support Agent 2 Atlassian Consultant 1 Technical Account 1 CEO - Read
1 Software Developer ( 1 Contractor )
Repository9 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
9 Software Developer ( 2 Contractor ) 3 Test Engineer 1 Support Agent 1 Technical Account 1 CEO
Repository10 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 3 Test Engineer 1 Support Agent 1 Technical Account 1 CEO
Repository11 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 3 Test Engineer 1 Support Agent 1 Technical Account 1 CEO
Repository12 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 3 Test Engineer 1 Support Agent 1 Technical Account 1 CEO
Repository13 - Admin
1 DevOps Engineer 1 Software Developer 2 Product Owner - Write
7 Software Developer 3 Test Engineer 1 Support Agent 1 CEO
|
| Artifact Management System | - Login access is restricted only to authorized persons
- Only minimal permissions are granted
- No unauthorized access
| Jfrog ArtifactoryArtifact management system to store the build logs and artifacts of your application.Permissions- Admin : Can create, delete repositories and modify repository settings.
- Write : Can upload, delete, overwrite (in snapshot repositories) artifacts.
- Read : Can list, download artifacts.
Repository1 - Admin
1 DevOps Engineer - Write
1 Technical Account - Read
8 Software Developer 2 Test Engineer 1 Product Owner
Repository2 - Admin
1 DevOps Engineer - Write
1 Technical Account - Read
8 Software Developer 2 Test Engineer 1 Product Owner
|
| Staging Environment | AWS Staging Environment | - Cloud Console access is restricted only to authorized persons
- SSH access is protected by keys and MFA
- Database access is possible only from the internal network
- Kubernetes access is possible only from the internal network
- Only minimal permissions are granted
- No unauthorized access
| AWS StageSeparated AWS Account for the Stage resources.Permissions- StageAdmins : Can list, create, delete, modify AWS resources.
- StageContainerImageAdmins : Can list, create, delete, modify (in snapshot repositories) Docker images.
- StageContainerImageReaders : Can list Docker images.
- StageSupport : an list, create, delete, modify Kubernetes resources and list Docker images.
- InfraBackup : Can list, create, delete, modify items in the Backup S3 Bucket.
- StageEticmaTechUsers : Can list, create, delete, modify ETICMA app related resources w/o MFA.
- StageAdmins
1 DevOps Engineer 3 Infrastructure Engineer ( 3 Contractor ) 1 Software Developer - StageContainerImageAdmins
1 Technical Account - StageContainerImageReaders
1 Technical Account - StageSupport
3 Software Developer - InfraBackup
1 Technical Account - StageEticmaTechUsers
1 Technical Account
AWS Stage BastionEC2 instance to access the Stage internal network and databases.Permissions- Root : Can administer Linux OS.
- User : Can log in and access the internal network of the Staging environment.
- Root
1 DevOps Engineer 3 Infrastructure Engineer ( 3 Contractor ) 1 Software Developer - User
3 Software Developer
|