About ClearID information security - ClearID

Genetec ClearID™ User Guide

Applies to
ClearID
Last updated
2024-04-09
Content type
Guides > User guides
Language
English
Product
ClearID

All data and files imported in Genetec ClearID™ are encrypted, and all communication with the platform is secure. These encryption and security measures ensure that sensitive data, files, and communications are only seen by users with the appropriate access.

Cryptography standards

Data encryption
All personal information managed by ClearID is automatically encrypted using Advanced Encryption Standard 256 bits (AES-256) with symmetric keys that are dynamically generated. This automatic encryption ensures that each blob of data like an identity is given a unique AES key.

For extra protection, the AES key is also encrypted with a public key unique to the account’s private key. All the cryptographic keys used by ClearID are securely managed using the Azure Key Vault, which supports FIPS 140-2 Level 2 validated HSMs.

Data integrity
A digital signature (SHA 512 with RSA) is generated to detect any attempts to modify data and ensure the integrity of the data and actions in the system. Analyzing and uniquely identifying all data using a complex algorithm prevents attackers from deleting, modifying, or adding content to data stored in ClearID.
Communication encryption
Communication in the platform is secured using Hypertext Transfer Protocol Secure (HTTPS) protocol and Transport Layer Security (TLS) certificates to ensure that only trusted parties have access to data managed by ClearID. This communication encryption ensures the confidentiality of the information and reduces the possibility of malicious attempts to intercept or alter communication in transit.

Network and information security

As a trusted provider of security solutions for government agencies and high-profile public and private organizations worldwide, we take compliance with local laws very seriously. This compliance includes the laws related to data security and protection of privacy in the territories where we sell our products and services.

To ensure that all customer data is stored and used appropriately and securely, ClearID is an ISO/IEC 27001 certified Information Security Management System.
Secure development and operations
Our development and operations teams have been certified ISO 27001:2013. Our dedicated security team administrates and reviews architecture and design requirements, ensuring that we meet the highest industry standards and regulations, including General Data Protection Regulation (GDPR). Every change in ClearID undergoes a strict series of automated security tests and regular penetration tests performed by industry leaders in Information Security.
Zero-trust architecture
Customer data is segmented over a series of microservices. Each microservice has one specific role in the system and the service has access only to the minimum data required to perform that task. There is no central repository of data that can be attacked. The information is distributed across siloed, independent repositories. The data center network is considered unsafe in our zero-trust architecture. All data transmitted and received between microservices is encrypted and digitally signed.
Service monitoring
We subscribe to various security threat feeds and services, including Check Point, Microsoft, Mandiant, and Hyphen. Based on the nature of evolving threats, we adapt our controls as often as necessary.
Production environments are constantly monitored using the following monitoring services:
  • Perform a series of synthetic transactions every 5 minutes to emulate users from different locations in the world.
  • Constantly measure a series of metrics from the servers to detect any anomalies, such as a high number of web request failures.
  • Automatically raise the alarm to our development and operations team, who take immediate action to correct the issue and mitigate any impact in the production environment.
The goal is to detect transient errors, data center issues, performance degradation, and ISP outages, before users notice any impact to their system.

User authentication

By default, ClearID uses Azure Active Directory B2C and Azure AD B2B for user authentication. Organizations can also federate their existing Active Directory (AD) user identities through Microsoft Azure Active Directory, or any system that supports the OpenID Connect standard, to provide a single sign-on (SSO) experience and ensure that the system meets the corporate policies requirements for user authentication.

The authentication system is based on a passive authentication model with OAuth 2.0 and OpenID Connect, which allows the identity server (AD or others) to present the connection page immediately. Identity administrators can define how users are authenticated. For example, passwords, tokens, biometrics, or a combination of these techniques.

By using Active Directory, organizations can enforce a large variety of user and password validation rules and expiration requirements. A few examples of requirements include multi-factor authentication, deactivating a user credential after several failed logon attempts, and many other configuration options.