RN150 Virtual Appliance Security

Information about RN150 virtual appliance security is described in the following sections:

Advanced Operating System
Encrypted Credentials
Data Handling and Storage

Advanced Operating System

The virtual appliance is based on the Debian/GNU Linux 12 operating system. You cannot access the appliance with any protocol, except during a RISC Networks management session and those connections initiated by the appliance itself. SSH and ICMP are to be used solely for connectivity testing and troubleshooting. Technology built into RISC Networks’ system enables a stateful operating system on the virtual appliance for the duration of the assessment. For this reason it is recommended that the virtual appliance be deleted at the successful completion of an assessment following the customer’s process for data handling and deletion.

Encrypted Credentials

Customer security and the proper handling of network credentials are of the utmost importance to RISC Networks as well our partners and customers. To guarantee this security, RISC Networks has implemented the following features with regards to handling credentials:

Credentials are encrypted via AES-256 immediately upon being entered through the appliance web interface.
Credentials remain encrypted on the appliance for the duration of the assessment and will be deleted at the time the appliance image is deleted from memory.
Credentials are NEVER uploaded to RISC Networks’ SCE.
RISC Networks delivery engineers never know or have access to the credentials used to bootstrap the appliance.

Data Handling and Storage

All data is uploaded from the virtual appliance to the RISC Networks SCE using 256-bit TLSv1.2 encryption (AES-256). Before being uploaded, the raw data is encrypted at rest using AES-256 with a 2048-bit asymmetric public key (RSA-2048). Data uploads will occur on regular intervals in order to limit the upload size and are encrypted at rest in a secure repository that is not directly accessible from the Internet.

The encrypted raw data is accessed by the Business Service Discovery and Migration Planning platform and is decrypted, stored in transient database instances and accessed for report generation. Final reports are placed into storage and accessible only through the RISC Networks secure web portal for download by customers and partners.

Raw customer assessment data is held in RISC Networks’ SCE for a period of up to 35 days past the subscription end date. After the subscription expires, the data is deleted and the storage device that data was stored on returns to the pool of data storage available for other RISC Networks’ engagements. When a storage device has reached the end of its useful life, procedures include a decommissioning process that is designed to ensure customer data are not exposed to unauthorized individuals. RISC Networks storage device are decommissioned using the techniques detailed in DoD 5220.22-M (“National Industrial Security Program Operating Manual “) or NIST 800-88 (“Guidelines for Media Sanitization”) to destroy data as part of the decommissioning process. If a hardware device is unable to be decommissioned using these procedures the device will be degaussed or physically destroyed in accordance with industry-standard practices.