Logo

Security

All applied solutions of the company meet the following criteria for ensuring the safety of operation and protecting data from unauthorized actions:

default image alt
Restricting user access to data

To manage data access permissions and restrictions, Oracle database tools –the user roles – are used. We implemented two-phase management of role-based permissions, in which the database security administrator confirms the actions of the application system administrator configuring roles and granting role-based permissions to users.

default image alt
Role restriction of access to system objects

In this case, the built-in Oracle RLS (Row Level Security) mechanism is used. The system does not use application for setting data access restrictions at the row level, because creating an applied security model greatly affects the system data querying.

default image alt
Data protection during transmission over open communication channels

We use the tools of data encryption during transmission via communication channels at the client-server protocol level, built into Oracle products, as well as encryption with session keys, symmetric and asymmetric algorithms using SSL certificates, when users access the system through a WEB application.

default image alt
User activity audit

All user actions in the system can be logged in secure protocols in the database. The system administrator can independently configure the list of objects and set logging mode – transactional or daily. Logging users' accessing and viewing data is also configured - via reports and, if necessary, ordinary actions to view screen tabular forms with fixing the parameters of received reports and filters used.

default image alt
Using EDS to sign documents

We enabled applying electronic signature for documents and files, including those in WEB-applications, using almost all specialized software libraries certified by the state regulatory authorities of Ukraine, including the modern x509 standard.

For the security of data storage and recovery, we use all Oracle industrial tools – designed for backup, failover and data recovery:

  • Hot standby of database server: StandBy
  • Automated backups: BackUp
  • Creating Flashback Database state rollback points for software testing and user training
  • Using mobile pluggable databases to quickly create clones and test copies of the database

The SrCoreSystem operating platform and the SrWebExpress platform have all the above functions built in as well as tools for monitoring and managing them.

Our software allows you to perform key management using both certificate authorities deployed within the customer's corporate infrastructure, and public authorized centers that implement the Qualified Electronic Signature option, which has legal weight in court and in national electronic document management.