Security

Security

Purpose

Purpose

These Security Sections are a formal statement of the security information by which anyone given access to Coro must be aware of.

Scope

Scope

The scope of this Security Section is illustrating the security precautions in place relatively to Coro product. It applies to all employees, partners, and third-parties with access to Coro information assets

Organizational Security

Organizational Security

Coro was designed with security at the forefront of priorities leveraging the application development services of Follow Analytics, recommended by our partners at Salesforce.

The Coro application is hosted within Heroku, a platform also owned by Salesforce and hosted within AWS

Hosting Provider Certifications

Hosting Provider Certifications

The Coro application is hosted on Heroku’s SOC 2 compliant platform owned by Salesforce. The platform resides within AWS infrastructure. For further information regarding the security practices in place please see the following links:

Encryption

Encryption

Data at rest within the Coro application is encrypted using industry standards and best practices that meet the security requirements of the Client.

TLS encryption is leveraged to provide secure communication by protecting the confidentiality and integrity for all data in transit within the Coro application.

Network Security

Network Security

In the interest of protecting data, Coro logically and physically separates its networks. The corporate network is utilized for all corporate functions. This is separate from the production network, which is used for customer instances. To prevent inadvertent information flow between different networks, access controls are implemented and reviewed periodically.

Access Control

Access Control

Authentication

Authentication to the Coro application is achieved by leveraging Single Sign On through the customers Salesforce instance.

Mobile application: The Coro app establishes a new session every time the application is open. If privileges are revoked within the CRM, the Coro mobile application does not log-in. Face ID can used for faster log-ins, but does not provide access to the application itself.

Provisioning

Access is provisioned within the clients Salesforce instance. Salesforce has strong logical access controls for their production network which include:

  • Manger approved production access, based on the principal of least privilege, to include necessary segregation of duties
  • Timely access removal for terminated employees
  • Multi-factor authentication to internal systems
  • Bastion Host in place as secure perimeter between authentication and core servers
  • Centralized log correlation in place to capture system activity

Clients are responsible for granting the appropriate access permissions to data within the Coro application.

Data Retention and Disposal

Data Retention and Disposal

Clients define the data being stored within the Coro application and can set unique data retention and disposal requirements, as well as purge data at their discretion.

Data stored within the application is housed within an AWS data center, further information regarding their disposal practices can be found at https://aws.amazon.com/security

Disaster Recovery/Business Continuity Planning

Disaster Recovery/Business Continuity Planning

The platform Coro is hosted on maintains redundancy to prevent single points of failure and ensure the availability of data stored within the application. In the event of an outage, the platform is deployed across multiple data centers designed for resiliency. Additionally, data within the application can also be restored from backups that have been configured to meet the requirements of the client.

Incident Management

Incident Management

The platform hosting the Coro application has a defined and implemented incident management policy in place. The response procedure identifies when events should be escalated and who should be notified. This allows for timely response and correct alignment of personnel to resolve potential incidents.

All incidents are logged into an automated workflow and online ticketing system that tracks the incident from initiation to resolution. Personnel tending to security incidents do not have access to data stored within the application unless there is explicit permission from the client.

Application Data Flow

Application Data Flow

See Application Coro Application Data Flow.

Data Storage

Data Storage

Coro Security processes

Coro Security processes

Coro has access to confidential and sensitive client information of numerous Fortune 100 companies as one of the top management consultancies in the world; the business model of Coro and Bain & Company is predicated on being rigorous, transparent and responsible in how it handles and secures confidential information. Data protection is one of the most important priority for Coro. Within the several precautions and processes Coro put in place, there are also:

  • Regular security education sessions
  • Periodic schedule of Security Testing [External and Internal]
  • Automated enforcement of security analysis
  • Explicit security checklists to work against all code changes