gdsn security guidelines - gs1 · the exchange of supply chain information carries the greatest...

26
GDSN Security Guidelines Issue #1, November 2011

Upload: vantu

Post on 05-Jul-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Issue #1, November 2011

Page 2: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 2 of 26

Document Summary

Document Item Current Value

Document Title GDSN Security Guidelines

Date Last Modified November 2011

Current Document Issue Issue # 1

Status Approved

Document Description GDSN Security Document

Contributors

Name Organisation

Date Last Modified November 2011

Log of Changes

Release Date of Change Changed By Summary of Change

1 November 2011 Sean Lockhead Creation of Version 2.0 Document

1 September 2015 Sean Lockhead Updated Version 2.0 Document

Disclaimer

GS1®, under its IP Policy, seeks to avoid uncertainty regarding intellectual property claims by requiring the participants in the

Work Group that developed this GS1 Document Name GS1 Document Type to agree to grant to GS1 members a royalty-free licence or a RAND licence to Necessary Claims, as that term is defined in the GS1 IP Policy. Furthermore, attention is

drawn to the possibility that an implementation of one or more features of this Specification may be the subject of a patent or other intellectual property right that does not involve a Necessary Claim. Any such patent or other intellectual property right is not subject to the licencing obligations of GS1. Moreover, the agreement to grant licences provided under the GS1 IP Policy does not include IP rights and any claims of third parties who were not participants in the Work Group.

Accordingly, GS1 recommends that any organization developing an implementation designed to be in conformance with this Specification should determine whether there are any patents that may encompass a specific implementation that the organisation is developing in compliance with the Specification and whether a licence under a patent or other intellectual property right is needed. Such a determination of a need for licencing should be made in view of the details of the specific system designed by the organisation in consultation with their own patent counsel.

THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGMENT, FITNESS FOR PARTICULAR PURPOSE, OR ANY WARRANTY OTHER WISE ARISING OUT OF THIS SPECIFICATION. GS1 disclaims all liability for any damages arising from use or misuse of this Standard, whether special, indirect, consequential, or compensatory damages, and including liability for infringement of any intellectual property rights, relating to use of information in or reliance upon this document.

GS1 retains the right to make changes to this document at any time, without notice. GS1 makes no warranty for the use of this document and assumes no responsibility for any errors which may appear in the document, nor does it make a commitment to update the information contained herein.

GS1 and the GS1 logo are registered trademarks of GS1 AISBL.

Page 3: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 3 of 26

Table of Contents

1 Executive Summary ......................................................................................... 5

1.1 Introduction ....................................................................................................................5

1.2 Choreography .................................................................................................................6

1.3 GDSN Actors ...................................................................................................................7

2 Information Technology Platform Ownership .................................................. 8

2.1 Traditional EDI Security ....................................................................................................8

3 Common Elements ......................................................................................... 10

3.1 GDSN Data ................................................................................................................... 10

3.2 Transport Protocols ........................................................................................................ 10

3.2.1 Encryption ............................................................................................................ 10

3.2.2 Digital Certificates ................................................................................................. 10

3.3 GDSN Data Ownership ................................................................................................... 11

3.4 GDSN Security Certification Considerations ....................................................................... 11

4 GS1 Global Registry® .................................................................................... 12

4.1 Summary – GS1 Global Registry® ................................................................................... 12

4.2 Physical ........................................................................................................................ 12

4.2.1 Database .............................................................................................................. 12

4.3 Compliance ................................................................................................................... 12

4.4 Legal ............................................................................................................................ 13

4.4.1 Service Level Agreements (SLA) ............................................................................. 13

4.5 Communication within the GDSN ..................................................................................... 13

4.5.1 Data Communication ............................................................................................. 13

4.6 Trading Partner Security Concerns ................................................................................... 13

4.7 GS1 Global Registry® Security Certification Considerations................................................. 13

5 Data Source to Source Data Pool ................................................................... 14

5.1 Summary ..................................................................................................................... 14

5.2 Synchronisation Process Flow .......................................................................................... 14

5.3 Communication of Synchronisation Data ........................................................................... 14

5.3.1 Data Communication ............................................................................................. 14

5.3.2 Transport Protocols ................................................................................................ 15

5.3.3 Data Pool Value-Added Services .............................................................................. 15

6 Security at Source Data Pool ......................................................................... 16

6.1 Summary ..................................................................................................................... 16

6.2 Mutual Legal Agreements ................................................................................................ 16

6.3 Data Stored vs. Data Passed ........................................................................................... 16

6.4 Data Access .................................................................................................................. 16

6.5 SDP Security Concerns ................................................................................................... 16

6.5.1 Principles Restated (Pricing) ................................................................................... 16

6.6 Conclusion .................................................................................................................... 17

7 Security from SDP to RDP .............................................................................. 18

7.1 Summary ..................................................................................................................... 18

7.2 Legal Agreements .......................................................................................................... 18

7.3 7.3. Compliance to Standards ......................................................................................... 18

Page 4: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 4 of 26

7.4 Valid XML Message Creation ............................................................................................ 18

7.5 7.5. GDSN Certification .................................................................................................. 18

7.6 SDP to RDP Security Concerns......................................................................................... 18

7.6.1 Priority / Applicability of Multiple Agreements ............................................................ 18

8 Security at Recipient Data Pool ..................................................................... 19

8.1 Recipient Data Pool Role ................................................................................................. 19

8.2 8.2. Recipient Data Pool Role Options ............................................................................... 19

8.2.1 Pass Through Implementation of RDP Services ......................................................... 19

8.2.2 Repository Services ............................................................................................... 19

8.3 Redundant GDSN Validations .......................................................................................... 20

8.4 8.4. General Security ..................................................................................................... 20

8.4.1 Data Pool Messaging .............................................................................................. 20

9 Security from Recipient Data Pool to Data Recipient ..................................... 21

9.1 9.1. Summary ............................................................................................................... 21

9.2 Message Process Flow .................................................................................................... 21

9.3 Message Validation ........................................................................................................ 21

9.4 Synchronisation List ....................................................................................................... 21

9.5 Communication of GDSN Data ......................................................................................... 21

9.6 Communication of Synchronisation Data ........................................................................... 21

9.6.1 Data Communication ............................................................................................. 22

9.6.2 Transport Protocols ................................................................................................ 22

9.6.3 Data Pool Value-Added Services .............................................................................. 22

9.6.4 Data Pool Value Added Services .............................................................................. 23

9.7 Authorisation................................................................................................................. 23

9.8 Access Control ............................................................................................................... 23

10 Third Party Audits .................................................................................... 24

10.1 General Implementation Considerations ........................................................................... 24

Page 5: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 5 of 26

1 Executive Summary

1.1 Introduction

In order to achieve the vision and principles of Global Data Synchronisation (GDS), standard, compliant product information must be able to flow uninterrupted between trading partners in a secure fashion. The exchange of supply chain information carries the greatest risk when not handled securely, but carries the greatest rewards when handled securely.

One of the key considerations for ensuring the usability and wide adoption of the Global Data Synchronisation Network (GDSN) is the security needs and concerns involved in implementing and interacting with such a network. Responding to concerns expressed both from the community and the industry at large, GS1 Data Excellence, Inc. has collaborated on this strategy for developing a set of security protocols and guidelines that address many different aspects of security (physical, logical, business processes and contractual).

This security document is intended to fully define the breadth and depth of the aspects and various components of security for the GDSN. It describes the GDSN strategy for addressing security of data within the GDSN network, as well as beyond the network, to include recommendations for the relationship between Source / Recipient Data Pools (SDP and RDP) and Data Sources (DS) and Data Recipients (DR). Data Sources and Data Recipients are also known as Trading Partners (TP).

The goal of Security for GDSN is to ensure confidence that the storage and handling of data is secure at all times, in and out of the GDSN network. As such, security must be addressed at several levels within and throughout the Network. This includes participants beyond the GS1 Global Registry®, beginning with the Data Source, to the Source Data Pool, to the Recipient Data Pool, and finally to the Data Recipient. The insurance of GDSN security depends on: the point in the process, the solution, measures, and / or the controls.

Key Principles regarding the GDSN and the security of data within and beyond the network are:

■ GS1 Data Excellence, Inc. is an enabler and can provide guidance / insight to Data Pools and Trading Partners to ensure a comfort level with Trading Partner relationships. Ultimately, it is the Trading Partner to Trading Partner agreements that should reflect / guide security expectations around how data is handled and this guides Data Pool (TP/DP and DP/DP) agreements.

■ It is recognized that some security requirements are not required for all types of data.

■ GS1 Data Excellence, Inc. Certification requires certain levels of security (technically implemented through the use of the EDIINT AS2 transfer protocol)

The sections in this document correspond to the GDSN Choreography (defined below), showing the end-to-end flow of data, the GDSN network, and where the lines of authority are regarding mandatory and recommended security requirements.

The information contained in this document represents the current view of GS1 Data Excellence, Inc.

and may change over time with the evolution of technology, security best practices, and supply chain

automation.

Page 6: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 6 of 26

1.2 Choreography

Security Considerations

The cloud in the GDSN Choreography chart represents the “in-network” portion of the GDSN. Inside the cloud, message exchange is strictly defined by GS1 standards. All Data Pools must use the same messages in the same exact way. Out of the network (outside the cloud) represents how Data Pools communicate with their trading partners (Data Sources and Data Recipients). This can occur in

numerous ways. This flexibility allows for the Data Pools to create value-add offerings for their customers. For example, item information can be communicated to the Data Pools in additional formats such as excel files, text files, existing Electronic Data Interchange (EDI) messages. Data Pools can translate these formats into GS1 standards-based XML messages for use in the network and can translate when messages are received through the network.

Page 7: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 7 of 26

1.3 GDSN Actors

Below are the functions of the actors in the GDSN – GS1 Global Registry®, Data Source, Source Data

Pool, Recipient Data Pool, and Data Recipient:

GS1 Global Registry®

Enables the registration and distribution of Party information, identifying the actors and roles

Enables the registration all the Item Information through a small set of core information o GTIN, GLN of the information Provider, Target Market, and the GPC

Provides Validation Services to ensure uniqueness

Enables the registration all the Item Subscriptions with a small set of criteria

o GTIN, GLN of the information Provider, Target Market, and the GPC

Performs the Item / Subscription matching process at the core of the GDSN choreography

Data Source

Typically a Manufacturer/Distributor Maintains trade item information that it wants entered into the GDSN

Registers trade item information in a Source Data Pool to be registered with the Global Registry and sent a Recipient Data Pool

Sends trade item information in any format agreed by the Data Source and the Source Data Pool

Data Recipient

Typically a Retailer, Hospital, Group Purchasing Organization, Distributor or any other User of Data

Subscribes to trade item information by the any of the following combinations of criteria:

o Item (GTIN)

o Party (GLN)

o Target Market

o GPC Brick

Receives trade item information in any agreed-to format with Recipient D a t a Pool

Source Data Pool

Validates Item Information against the GDSN Validation Rules (Mandatory)

Receives trade item information from Data Sources to be registered

Uses GS1 Standard XML Messages to register the item information in the Global Registry

Uses GS1standard XML Messages to exchange trade item information with the Recipient Data Pool (& Data Recipient)

Recipient Data Pool

May validate Item Information against the GDSN Validation Rules (Optional)

Receives subscriptions from i t s Data Recipients using criteria

Uses GS1 Standard XML Messages to register subscriptions in the Global Registry

Receives item information from the Source Data Pool, including new and updated

Provides the trade item information from the Source Data Pool to the Data Recipient

Page 8: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 8 of 26

2 Information Technology Platform Ownership

Companies have an almost limitless variety of options of how to manage their information technology (IT) infrastructure. In the simplest scenario a Company owns all IT assets, runs them in a facility they own, manages the infrastructure themselves and they manage and administer the applications.

While this is not a comprehensive list, many companies use IT infrastructure management options as

follows:

■ Leased IT assets (processors, hard drives, network equipment, communication lines, etc.) from a financing company

■ Leased IT assets with operations run by a shared data centre

■ Own IT assets with operations run by a third party data centre Leased network services between

facilities owned by the company

■ Outsource to a third party the operation of data centre and all IT assets

■ Outsource the operations of a business application to a third party

■ Outsource all IT infrastructure operations

■ Use a hosted application run by a third party

■ Use part of a shared service run by a third party

Additionally, with the advent of telecommuting, Wi-Fi hotspots, Virtual Private Networks (VPN), personally owned computers, etc.; many of the above scenarios get even more complex.

Frequently, the ownership of IT assets is difficult to discern, even to members of the IT department. Due to the constant reallocation of scarce resources, many large companies have a combination of all of the above models, plus more variations.

In addition to complex It infrastructures, there is much electronic commerce (peer to peer, hard copy, phone / fax, manual transfer of data via disk or CD, etc) sharing, of which EDI is the one most commonly accepted.

In order to understand how existing systems influence GDSN requirements, it is important to understand technology practices used today and how these influence trading partner security implementations and issues.

2.1 Traditional EDI Security

■ Enormous amounts of business transactions are communicated using EDI today. Common examples of these are

□ Prices

□ Item Catalogues

□ Orders

□ Invoices

□ Payment Advices

■ EDI transactions are frequently transferred through multiple EDI Value Added Networks (VAN’s). The relationship between VAN’s is covered under EDI interconnect agreements. Typically, there is no mention of security requirements for the context of the underlying data in these interconnect

agreements. Currently contracts (referred to as interconnect agreements) between VAN’s do not specify security aspects or data ownership stipulations. A common VAN interconnect agreement states; “The relationship between the parties shall be that of independent contractors.” There is rarely a contract between the trading partners using one VAN and the interconnected VAN who is receiving the information.

Page 9: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 9 of 26

■ Transfer of data between VAN's is typically through frame relay or leased line connections. Protocols typically utilized are FTP, Bisynchronous and X.435.

■ EDI VAN’s traditionally run highly secure data centres and operations. Access to data contained in

EDI transactions are controlled by security policies and procedures implemented by each EDI VAN. The policies and procedures are proprietary to each company and are not published for reasons of competitiveness and to not expose security operations. These processes typically include:

□ Limiting the physical access to the machines containing data

□ Limiting access to these systems through firewalls, password protection, and personal user accounts to manage access control.

□ Allowing individuals to access only the data that is required for them to perform their jobs.

■ Other third party solutions exist within the supply chain for data exchange, for example Service Bureaus. These third parties have many different contexts and play a key role in the supply chain. They enable additional l information to be introduced and shared electronically across the supply chain. In use of the third parties increase the complexity of data security with the potential of

multiple points of reference for the same data. These services have existed and will continue to exist to support an existing business need.

□ Service Bureau Definitions: An organization that provides data processing and online services. It may offer a variety of software packages, batch processing services (data entry, COLD, etc.)

as well as custom programming. Customers using Service Bureaus normally pay for storage of data on the system and processing time used. Connection to a service bureau is made through various methods; dial-up connections, private lines, the Internet, frame relay or other WAN services.

■ Many Trading Partners have Web based portals. Security may be inconsistent across different portals. The relationship of the trading partner dictates the expectations of security.

Page 10: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 10 of 26

3 Common Elements

3.1 GDSN Data

GDSN Data can be viewed as Party, Trade Item, Catalogue Item, Price, or any other information that

is communicated in the Global Data Synchronisation Network. The processes for the dissemination of this information are related and are based on similar messaging. An effort is made to try and address both the similarities as well as the differences.

3.2 Transport Protocols

In the GDSN, the only transport protocol to communicate electronic data over the public Internet

is Applicability Statement 2 (EDIINT AS2). This is a mandatory requirement for Data Pools and the GS1 Global Registry®. For additional information, please refer to the EDIINT AS2

implementation document and the latest version of the GDSN Operations Manual.

The AS2 protocol uses Hyper Text Transmission Protocol (HTTP). The AS2 specification solely describes the secure transmittal of data over the Internet using HTTP. It is a specification on securing and transporting data, not on validating or processing the data. The transported data is dispatched to

the appropriate processor based upon its content-type.

3.2.1 Encryption

Encryption is a critical part of secure data handling. Data messages communicated between all parties in the GDSN network, including Data Pools and the GS1 Global Registry®, are encrypted by the use of EDIINT AS2 protocol. Beyond GDSN there can be other types of encryption such as:

□ Transport Protocol Message encryption (EDIINT AS2)

□ Data (Payload) Encryption

□ Full – Encryption of entire payload – Requires additional content.

□ Partial – Encryption of certain individual attributes value(s) within the payload. Note: Attribute values encryption is above and beyond the current scope of the GDSN and would only be recommended if the function is needed.

There are no standards governing the storage of data in the Data Pools nor the communication processes between the data pools and their trading partners. Internal storage and encryption of the data is based on the business relationship between the Data Pool and its trading partners. For

example, price synchronisation security obligations may be managed by the mutual agreement of the data pool and its members.

3.2.2 Digital Certificates

Certified Data Pools must use a self-signed digital certificate or a signed digital certificate from a recognized third party organization that is responsible for the issuance of these types of digital

certificates. All Data Pools and the GS1 Global Registry® must implement the use of digital certificates and maintain an up-to-date listing of all Data Pools and GS1 Global Registry® digital certificates.

Use of a digital certificate between a data pool and its trading partners would be handled within their relationship agreement. Refer to the operations manual in regards to any additional digital certificate information or EDIINT AS2 information.

Page 11: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 11 of 26

3.3 GDSN Data Ownership

The major Data Pool security issues and concerns are the establishment of the chain of custody and the ownership of the data as it moves through the supply chain. The “ownership” of the data dictates what operations may be performed’ and by whom’ at each point in the chain. Based on the previous statement it may be assumed that the retailer owns the rights to distribute the data they received from the supplier. This aspect of the relationship should be governed by the terms of a trading partner agreement. Provisions for trading partners to store data, in any form they prefer, provided it is satisfactory with the trading partners would also be in the trading partner agreement.

The following considerations should be taken in account with data ownership:

■ The contractual agreements between the trading partners and their data pools that govern data ownership, confidentiality, as well as the responsibilities of the maintenance and distribution of GDSN Data. There may also be trading partner to trading partner agreements without Data

Pools that impact trading partner data rights.

■ When the Data Source initiates publication of their data to a trading partner, the data to be communicated must be sent to the correct Data Recipient.

■ At the time the data is published to the trading partner, the data is exposed to the Data Recipient.

■ The Data Source and the Data Recipient are responsible for controlling what actions may be taken with this data and protecting the confidentiality of the data.

■ There are third party agreements that may be in place to protect confidentiality.

It is highly recommended that there are trading partner to trading partner agreements in place to handle all general concerns and issues.

Today trading partner agreements governing data confidentiality and usage may not exist, may not be legally binding, or may be too vague to be of value. The establishment of this level of detail is left

up to individual Trading Partners.

GS1 Data Excellence, Inc. strongly recommends and encourages Trading Partners to have confidentiality agreements in place (from business and technical perspective) with all business partners and to include detailed requirements in the agreements.

3.4 GDSN Security Certification Considerations

The GDSN certification process ensures that data pools and the GS1 Global Registry®, at a minimum,

demonstrate the following:

■ Successful completion of a third party administered security audit (when defined)

■ EDIINT AS2 compliant transport and compliance with applicable EDIINT AS2 operational requirements

■ Compliance with the GDSN synchronisation BUSINESS MESSAGE STANDARD (BMS), data attribute, messaging and processing requirements

■ Adequate access controls are in place to ensure data is exposed only to the appropriate data recipients

Page 12: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 12 of 26

4 GS1 Global Registry®

4.1 Summary – GS1 Global Registry®

The GS1 Global Registry® is responsible for ensuring that registered trading partner information

(members of GDSN) passes GDSN-mandated validations. Through the use of the basic party synchronisation process, the GS1 Global Registry® communicates all validated Trading Partners (GLN’s) to all Data Pools for use in the GDSN Business Message Standard use cases, i.e. all the GDSN-specific processes.

The GS1 Global Registry® is responsible for ensuring that registry catalogue items (“Items”) registered at the Global Registry have passed GDSN mandated validations and are registered by Parties (GLN’s) already present in the GS1 Global Registry®. Through the use of the Catalogue Item

Synchronisation process, the GS1 Global Registry® enables Data Pools to communicate standards- based business messages for all GDSN use cases.

The GS1 Global Registry® is responsible for ensuring that catalogue items subscriptions (“Subscriptions”) registered at the GS1 Global Registry® have passed the GDSN mandated validations and have registered / validated Parties (GLN). The GS1 Global Registry® Item / Subscription matching functionally provides Data Pools and Trading Partners the information necessary to perform the GDSN use cases. The GS1 Global Registry® distributes

subscriptions to one or more Data Pools having registered items that can fulfil the subscription criteria. Through the use of the Catalogue Item Synchronisation process, the GS1 Global Registry® enables Data Pools to communicate standards-based business messages for all use cases.

4.2 Physical

4.2.1 Database

Access to the GS1 Global Registry® is restricted to authorized personnel of the GS1 Data Excellence, Inc. Development, Customer Support, and Infrastructure Team (reference on-going as GDSN Customer Support). This role is performed by a technology service provider of the GS1 Global Registry® for GS1 Data Excellence, Inc.

GDSN Customer Support has access to the information contained in the GS1 Global Registry®, as well

as messaging to and from the GS1 Global Registry®.

Data access types for GS1 Global Registry® personnel are as follows:

■ Add – who / what can add, how is managed / restricted

■ Change – who / what can add, how is managed / restricted

■ Delete – who / what can add, how is managed / restricted

GDSN Customer Support is the communication point for handling all requests for data audits and

message delivery verifications. GDSN Customer Support tracks and details the requester, the resolution, and the specifics of the resolution/response. Each inquiry is assigned a unique tracking (ticket) number.

4.3 Compliance

The GS1 Global Registry® must successfully complete all certification events and remain compliant with the GDSN Certification Criteria Document for participation in the GDSN.

Page 13: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 13 of 26

4.4 Legal

The GS1 Global Registry® is required to meet or exceed the Service Levels set forth in the GS1

Data Excellence, Inc. Service Level Agreements. (For any additional information refer to Service Level

Agreements).

4.4.1 Service Level Agreements (SLA)

■ In terms of Security, it is the responsibility of the GS1 Global Registry® to maintain a reference list of Certified Data Pools that can effectively communicate with the GS1 Global Registry®. Each Data Pool has a set of information associated with it that is stored in the GS1 Global Registry®.

■ The function of setting up the Data Pools in the GS1 Global Registry® is the responsibility of the

GDSN Support Staff, operating under the direction of GS1 Data Excellence, Inc.

representatives, in unison with the GS1 Global Registry® Service Provider. ■ The GS1 Global Registry® is required to process valid messages sent to it. It is agreed that

scheduled outages, which will be communicated by the GS1 Global Registry® to all affected Data Pools in the manner specified in this document, can affect the timeliness of processing (e.g. processing can take place after the scheduled outage period).

4.5 Communication within the GDSN

The trading relationship between the GS1 Global Registry® and the Data Pools covers how the data is communicated between the network entities.

For additional information, refer to GRALA (Global Registry Access and License Agreement).

4.5.1 Data Communication

All GDSN data is communicated using GS1 standards-based XML message(s).

4.6 Trading Partner Security Concerns

GDSN Security has been designed to address concerns that were raised by the Trading Partners regarding information registered in the GS1 Global Registry®. Following is a recap of some of the

issues raised by the community which are addressed with the GDSN Security policies.

■ Trading Partners are satisfied that any information registered in the GS1 Global Registry® (parties, items, subscriptions) is only accessible by the authorized entities.

■ Data pools and Trading Partners have insurance that information communicated to and from the GS1 Global Registry® to each entity is secured from an access-control, as well as an

authorization perspective.

■ As new functionality is added to the GR, additional requirements may surface and GDSN Security policies will be modified as necessary to address these new situations.

4.7 GS1 Global Registry® Security Certification Considerations

The GDSN certification process ensures that the GS1 Global Registry®, at a minimum, demonstrates the following:

■ Successful completion of a third party administered security audit.

Page 14: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 14 of 26

5 Data Source to Source Data Pool

5.1 Summary

Source Data Pools (SDP) have the ultimate responsibility for the communication of GDSN Data into

the Global Data Synchronisation Network (GDSN). They are responsible for gathering the GDSN Data from their supply side trading partners, performing validations upon the data, registering the items in the GS1 Global Registry®, managing that the data is sent to the correct trading partner or their GDSN-certified Recipient Data Pool (RDP) and ensuring the data is compliant when distributed into the network. In the data synchronisation process, the role of the Source Data Pool is to perform the required standards-based actions on the data.

5.2 Synchronisation Process Flow

The following steps represent the Source Data Pool responsibility as it relates to the GDSN Data

synchronisation processing:

■ The Source Data Pool receives GDSN Data from the Data Source.

■ The Source Data Pool prepares the GDSN data for registration in the GS1 Global Registry®.

■ The Source Data Pool performs the required GDSN data validations, and, informs the Data Source of any errors encountered.

■ The Source Data Pool interrogates a Synchronisation List that maintains the status of specified GDSN Data information sent to each Data Recipient, and uses this list to manage the distribution of ongoing GDSN Data.

■ The Source Data Pool sends the Synchronisation document directly to the Data Recipient or their Recipient Data Pool.

■ The Source Data Pool receives the Synchronisation Confirmation from the Data Recipient’s Data Pool.

■ The Source Data Pool updates appropriate information on the Synchronisation List with information received from the Data Recipient’s Data Pool.

■ The Source Data Pool forwards the Synchronisation Confirmation to the Data Source.

5.3 Communication of Synchronisation Data

The trading relationship between the Source Data Pools and their trading partners governs the requirements Source Data Pools have for how they receive data from their members, as well as additional value-added services they perform for those members. The relationship contracts/agreements detail how the data is received from the trading partner and what transport protocol is utilized. These services can include additional data validations, transformation of the data in different formats, use of the data within other applications offered by the Source Data Pool.

5.3.1 Data Communication

Some examples of data communications used are:

■ GDSN standards-based XML message

■ Proprietary XML message

■ User Interface

■ Flat File

■ EDI

■ Spreadsheet Applications

■ Adobe®

PDF

Page 15: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 15 of 26

■ Other

5.3.2 Transport Protocols

This communication path is not defined by GS1 and GDSN standards and therefore, out-of-GDSN communication. Some examples of transport protocols used are:

■ EDIINT AS2

■ Virtual Private Network (VPN)

■ File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP)

■ Electronic Data Interchange (EDI)

■ E-mail

■ Other

5.3.3 Data Pool Value-Added Services

GDSN security requirements do not place restrictions on Source Data Pools that limit how they handle GDSN Data information sent from trading partners. This is to ensure Source Data Pools have the necessary flexibility to provide services to meet the needs of their members. It also warrants that no

limits are imposed on the Source Data Pool’s that could impact their ability to comply with GDSN Data synchronisation process requirements relating to validations, synchronisation list processing and maintenance.

Following is a listing of some Data Pool Value Added Services in existence today that are used support trading partner’s business processes.

■ GDSN Data applications

■ Robust user interface allowing the Data Source to enter information directly into the Source Data Pool

■ Workflow processing

■ Supplier and/or Retailer specific validations

■ Message and file level track and trace for audit or problem resolution

■ Reporting

■ Retransmission capabilities

Page 16: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 16 of 26

6 Security at Source Data Pool

6.1 Summary

This section describes the strategy for addressing security of GDSN Data at the Source Data Pool

within the GDSN. A data source is normally synonymous with a manufacturer, however; may include other roles, e.g. distributor, broker, wholesaler, etc. There are different concerns of security that need to be addressed. Some of these concerns are real and some are perceived and not based in facts. Both will be addressed in this section.

6.2 Mutual Legal Agreements

Data Sources (suppliers, manufacturers, distributors, etc.) typically have a legal agreement with their solution provider (e.g. Data Pool) who hosts their GDSN Data. The solution used by the Data Source could be in the form of product catalogue, an exchange, hosted web portal, EDI solution provider, etc. This security document will only cover the GDSN environment, therefore only the “Source Data Pool” requirements will be described.

Source Data Pools should thoroughly understand the GDSN requirements for processing / handling of GDSN Data and additional constraints. They need to ensure these requirements are compatible with

other processes used by the SDP to deliver value-added services to their customers. The Source Data Pool must support all security requirements of their community and the GDSN.

6.3 Data Stored vs. Data Passed

There may be trading partner requirements that cannot reside on the data pool but must be passed to recipient for their own use. GDSN data that is not intended to be available to the community of

the data pool (for viewing or download) and only “passed to the intended recipient” must be stored for the very short time, until it is “successfully passed”. If a trading partner has specific requirements for storage as per their agreement with their data pool, it is up to that specific trading partner to identify with their data pool the best method to meet those requirements.

6.4 Data Access

The community enables GDSN data to be visible in many ways. Some examples of GDSN data

accesses methods are as follows:

■ sent via message

■ downloaded

■ sent via EDI

■ Viewed online

6.5 SDP Security Concerns

6.5.1 Principles Restated (Pricing)

These are basic principles of GDSN Data synchronisation that need to be clearly restated for price synchronisation:

■ In the GDSN context, the Data Source may not have a legal agreement with the RDP (unless they are on the same data pool). The Data Source should have an agreement with any Data Recipients, which may have implications on how data is handled and confidentiality maintained.

■ A Data Source has a legal agreement with SDP, controlling the handling of data and confidentiality requirements.

Page 17: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 17 of 26

■ The SDP provides access to GDSN data only to the intended Data Recipient (even if member of the same data pool)

■ The SDP sends a secure encrypted message to the RDP of the Data Recipient

6.6 Conclusion

To establish a high confidence level for the exchange of GDSN Data, security rules must be followed by all participants. Some data (such as price-based data) has additional security requirements.

It is possible to add a security segment into the legal GDSN data pool agreement stating that the Source Data Pool agrees to make the data available only to the designated end party. A SDP can only guarantee that the data has been delivered to the proper RDP, not the intended Data Recipient.

Page 18: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 18 of 26

7 Security from SDP to RDP

7.1 Summary

As part of the GDSN, one of the most important stages of the synchronisation choreography is when information (item, party, price, etc.) is sent from the source side through the Network to the

recipient side. At this point in the data synchronisation process, information exchanged is governed by GS1 standard messages and processes. All of the certified data pools must be working in a standards- based, validated environment.

7.2 Legal Agreements

Communication of data via the GDSN by a Data Pool is governed by binding agreements that

are facilitated by GS1 Data Excellence, Inc. Although it is possible to have individual legal agreements between data pools that define certain functionalities and / or capabilities, these agreements are specific to only that relationship. The GS1 Data Excellence, Inc. agreement governs all data exchanged in the Network. A major contractual point in the agreement is that the methods and functions of data exchange is consistently governed for all certified GDSN Data Pools.

7.3 7.3. Compliance to Standards

The use of GS1 Standards as outlined earlier in this section is mandatory for all in-network traffic. These standards allow for efficient adoption of the GDSN synchronisation processes.

7.4 Valid XML Message Creation

The Communication between the SDP and RDP occurs through standard, valid XML messages. The use of XML instance documents based on standardised XML schemas, as defined by GS1 Standards, is fundamental in the GDSN. Data Pools are free to engage in other value-add activities, but it is beyond the GDSN governance and cannot be enforced by the GDSN.

7.5 7.5. GDSN Certification

All Data Pools operating in the Production GDSN environment, where all the live synchronisation processes occur, must pass the GDSN certification process as defined by GS1 Data Excellence, Inc.

There are limited certification criteria that impacts the overall security of the GDSN. The certification process primary concentrates on GDSN functionality.

7.6 SDP to RDP Security Concerns

7.6.1 Priority / Applicability of Multiple Agreements

The flexibility of the GDSN can result in multiple contracts/agreements among trading partners and

data pools. For example:

1. Data Pool – Data Pool in GDSN

2. Data Pool – Data Pool non-GDSN

3. Trading Partner – Data Pool

4. Trading Partner – Trading Partner

Page 19: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 19 of 26

If multiple agreements are utilized, it must be determined if conflicts exist. If such a situation exists, it must be established by the participants which contract/agreement takes precedence over the other(s).

8 Security at Recipient Data Pool

8.1 Recipient Data Pool Role

The role of the Recipient Data Pool (RDP) in the Global Data Synchronisation Network (GDSN) is to provide an interface between the GDSN and the data recipient. A data recipient is normally

synonymous with a retailer, however; may include other roles, e.g. distributor, broker, wholesaler, etc. To perform the recipient role, the RDP receives GDSN standard messages from Source Data Pools and the GS1 Global Registry®, and routes the messages only to the recipient designated in the messages, possibly including third parties outside the GDSN.

8.2 8.2. Recipient Data Pool Role Options

The relationship between a RDP and the Data Recipient is not governed by the GDSN but by the company providing the RDP services. There are numerous implementation structures, options and details in use today. The following section describes some of those variations as

background information to further understand the security topics surrounding RDPs.

8.2.1 Pass Through Implementation of RDP Services

The RDP may implement as a pass through service. In this implementation, the RDP is used as a routing mechanism for messages that it receives through the GDSN. The RDP receives the GDSN messages and, based on parameters in the GDSN message, the RDP message is routed and delivered to the correct Data Recipient. In this case, the RDP may or may not store the data in the message or portions of the message, needed to perform other processes.

Regardless, the RDP must examine the contents of the message to determine where the message should be going or where it originated. Many pass through applications must store a copy of the message. The possible uses for a copy of the message are; audit, recovery of the message, or the retransmission of the message if there is a problem downstream from the pass through/routing

application.

8.2.2 Repository Services

The RDP may act as a data repository on behalf of the Data Recipient. In this scenario, the RDP (and SDP) will hold the data for the recipient. With this structure, the Data Recipient is responsible for security of the supplier data based on its relationship with the Recipient Data Pool. This type of solution is very common among data pools and solution providers. It allows for a staging arena for the recipient’s data and for reloads of the data should a failure happen in the recipient’s internal data repository. This process is based on a mutually-agreeable timeframe which should not exceed the agreements between the Data Source, the Data Recipient and the

Data Pools. In this scenario, GDSN Data security is covered by several relationships:

■ The first relationship is a trading partner relationship. This is an agreement between two trading partners that governs the use and confidentiality of the data in the relationship. A trading partner agreement describes the use of data, by whom, for what and the penalties for breaches in the contracted use of data.

Page 20: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 20 of 26

■ The second relationship is between the recipient Trading Partner and its Data Service Providers.

In this relationship, the Recipient holds its Data Providers to an equal or higher level of security than is mandated by the Trading Partner agreement. There can be multiple service providers between the Data Source and Data Recipient, which are all responsible for upholding / maintaining integrity and security of the data. Such service included but are not limited to security measures are; GDSN Recipient Data Pools’ applications and application architecture, data bases and database architecture, service oriented architecture, data centres, long and short haul disaster recovery, on and off-site backup and recovery, third party solution partners, data transport mechanisms and protocols. There are limited specific requirements in terms of technology platform considerations.

8.3 Redundant GDSN Validations

Most implementations of Recipient Data Pools subject received messages through a validation check to ensure that the Source Data Pool sending the message ensured any data or formatting errors were corrected before sending the message. This is not a mandatory process. It is a choice of the RDP to ensure that their customer (the data recipient) is receiving valid data.

8.4 8.4. General Security

8.4.1 Data Pool Messaging

The Recipient Data Pool can use any transmission protocol or method to communicate to the Data

Recipient.

The security for a messaging system relates to a chain of custody of the message and its GDSN Data. Each entity that holds or passes GDSN Data must provide a record of the data while it was

in their possession for two reasons. First, it is necessary to have as an audit control if there was a problem while the data moves from the Data Source to the Data Recipient. Second, if an error happens while attempting to transmit the GDSN data, the message must persists for a short period of time to allow for retransmission of the message. Since the method of transport between data pool and trading partner is not governed by the GDSN, there is no way to mandate a specific security measure.

Page 21: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 21 of 26

9 Security from Recipient Data Pool to Data Recipient

9.1 9.1. Summary

Message Information at the Recipient Data Pool is a unique situation since the GDSN data at this stage of the choreography represents information received from elsewhere in the network.

9.2 Message Process Flow

The following steps represent the Recipient Data Pool responsibility as it relates to the GDSN Data synchronisation processing:

■ The GDSN Data is received from the SDP.

■ The RDP may perform GDSN data validations, and any additional validations. (note: there is no requirement that an RDP repeat the SDP validations)

■ The RDP may implement a Recipient Synchronisation List that maintains the status of specified GDSN Data information sent to each Data Recipient, and is used to manage the distribution of ongoing GDSN Data.

■ The RDP sends the GDSN Data directly to the Data Recipient.

■ The Data Recipient receives the GDSN Data and makes a decision on whether or not to synchronise the GDSN Data.

■ The RDP receives the Synchronisation Confirmation from the Data Recipient

■ The RDP may update the appropriate information in the Synchronisation List.

■ The RDP forwards the Synchronisation Confirmation to the SDP.

9.3 Message Validation

Any Validations that are defined by GDSN to be in-network validations, in which the RDP is the actor, must be run at the RDP. In addition, extra value-added validations may be run by the RDP. The RDP can communicate that information to the Data Recipient. However, it is imperative that the RDP cannot fail a message if all of the GDSN validations are passed.

9.4 Synchronisation List

An RDP may choose to maintain an optional Functional Synchronisation List for use within the RDP. The synchronisation list of record is held at the Source Data Pool.

9.5 Communication of GDSN Data

The dissemination of GDSN Data by a Recipient Data Pool to Data Recipients requires that onl y the Data Recipients intended to receive the information (as determined by the message) are the entities that actually receive the messages, in whatever form, from the RDP.

9.6 Communication of Synchronisation Data

The trading relationship between the Recipient Data Pools and their Trading Partners governs the requirements Recipient Data Pools must follow for data receipt and transmission as well as additional value-added services they perform for members. GS1 Standards and implementation guides govern how data is received from Data Sources and what transport protocol is utilized. RPDs may also perform services such as; additional data validations, transformation of the data from different formats, and use of the data within other applications offered by the Recipient Data Pool. These services are normally included in the Trading Partners agreement with the RDP.

Page 22: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 22 of 26

9.6.1 Data Communication

Some examples of data communications used between a RSP and a Data Recipient are:

■ GDSN standards-based XML message

■ Proprietary XML message

■ User Interface

■ Flat File

■ EDI

■ Spreadsheet Applications

■ Adobe® PDF

■ Other

9.6.2 Transport Protocols

Message transport between and RSP and Data Recipient is an out-of-network communication. Following are some examples of transport protocols used in these relationships:

■ EDIINT AS2

■ Virtual Private Network (VPN)

■ File Transport Protocol (FTP), Secure File Transport Protocol

■ Electronic Data Interchange

■ E-mail

■ Other

9.6.3 Data Pool Value-Added Services

GDSN security requirements do not place restrictions on Recipient Data Pools that could limit

how they can handle GDSN Data information sent to and from trading partners. This ensures Recipient Data Pools have the necessary flexibility to provide services to meet the needs of their members. It also warrants that no limits are imposed on the Recipient Data Pool that could

impact their ability to comply with GDSN Data synchronisation process requirements relating to validations, synchronisation list processing and maintenance. Following is a listing of some Data Pool Value Added Services in existence today that are used support trading partner’s business processes by Recipient Data Pools.

■ GDSN Data applications

■ Robust user interface allowing the Data Recipient to enter information directly into the Data Pool

■ Workflow processing

■ Supplier and/or Retailer specific validations

■ Message and file level track and trace for audit or problem resolution

■ Reporting

■ Retransmission capabilities

Page 23: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 23 of 26

It is important to consider the aspect of Trading Partner Agreements. Today Trading Partner agreements governing data confidentiality and usage may not exist, may not be legally binding, or may be too vague to be of value. Agreements or lack of agreements are normally determined by

individual Trading Partners.

The community recommendation is to strongly encourage Trading Partners to have confidentiality agreements established (business and technical perspective) with all business partners, and to include specific user requirements in these agreement(s).

9.6.4 Data Pool Value Added Services

Any Data Pool value-added services must not expose any part of the GDSN Data to entities or

Trading Partners that are neither authorized nor authenticated to receive and / or view the

messages or the data contained in the messages.

9.7 Authorisation

Authorization is the ability to ensure that the entity that is attempting to perform a task is really the entity it says it is. The existence of the ability “to authorize an entity or a trading

partner” is instrumental in establishing confidence in a Data Pool as well as the GDSN itself.

9.8 Access Control

This is the method by which only the entities that have rights and privileges to access and receive the data are the only ones to have access to it. This ability “to properly ensure that an entity or a trading partner” is allowed to receive or view the messages is also instrumental in establishing confidence in the data pool as well as the GDSN itself.

Page 24: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 24 of 26

10 Third Party Audits

The use of Third Party Audits to ensure compliance with GS1 Standard and GDSN Security requirements is strongly encouraged. This section describes best practices, implementation considerations and other key areas to assess during an audit.

10.1 General Implementation Considerations

Security

□ How is physical access to facility controlled? Badges, Guards, CCTV cameras, Perimeter access controls, Internal area controls, Badge logs, Visitor escort policy, Sign-in logs

□ How is access to related systems, applications, and networks controlled? Network login, User/ID password, Strong authentication

□ Can system, application, and network actions be traced to an individual account and action time? Network logs, system logs, application logs, audited actions, non-audited actions, success audits, failure audits

□ How information is (electronic & paper) protected from unauthorized disclosure and modification? What is the Document Retention Policy?

- Electronic: account authorization, account privileges, encryption.

- Paper: locked offices, locked filing cabinets, locked desk drawers, document classification markings, shredding policies.

□ Protection of the software code to prevent things like “backdoors” left in the code, etc.

□ Do organizations have background checking policies and procedures for personnel who

access GS1 Global Registry®? And the following functions: Add, Change, Delete actions, download capabilities, printing, disclosure of information, confidentiality, etc.

Trading Partner Security Concerns

Concerns have been raised by the different parties involved in the communication of GDSN

Data information through the GDSN. These areas should be validated during the security audit against the Data Pools agreements with Trading Partners.

□ Trading partners may not want Price Synchronisation data in locations outside the trading partner relationship.

□ Trading partners want assurance that the data pools provide access controls that restrict access to the GDSN Data to only the trading partner for whom the data is intended.

□ There are current proprietary data pool implementations of additional value-added services that the data pool community will not want GDSN Data synchronisation security to constrain.

□ Some trading partners believe some level of encryption may be required. Encryption could

include the entire message down to individual tags contained within the message payload. While providing an additional level of security, encryption can also create barriers to how GDSN Data is communicated within the network as well as impediments to the processing

that may be required of the data pools.

Page 25: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 25 of 26

Anti-Virus

□ Does the organization have anti-virus software installed on all related systems?

Servers, user desktops, user laptops, user PDA's, email system

□ How frequently are the anti-virus software and signature files updated? daily, monthly, quarterly, immediately or "n" days/week after release from vendor

□ How frequently is the anti-virus software used to scan for viruses? Hourly, daily, weekly, or on email receipt?

□ What level of control for work stations? Can individual users disable any of these key features?

□ Disable or bypass the anti-virus software? Download software, install software? Perform admin level functions?

□ What are personnel to do if they detect a virus? Stop using system, contact admin, and remove virus, document date/time and virus type, remove system from network?

Password & PIN Security

□ Is there a password policy? password sharing, protection, password length, complexity and age requirements

□ What p a s s w o r d length and complexity technical controls are in place? password length enforcement, special numeric enforcement, password age enforcement, password reuse enforcement, invalid attempt thresholds

□ Do users use shared accounts? multiple people using one account

□ Are default passwords required to be changed?

□ What is the process for resetting a password when user cannot remember it? Call helpdesk, visit admin, submit form signed by supervisor etc.

Network & Computing Resources

□ How is access to related systems controlled? Username password, 2-factor authentication, one time password, etc.

□ Are any related systems configured for remote access? Remote admin, remote users, modem, VPN, secure ID or PKI

□ Are related systems connected to any other networks? dual homes systems, internet connectivity, shared networks

□ Are employees allowed to use their non-business personal computers to access related systems, or connect to related networks?

Backups & Disaster Recovery

Questions:

□ Are there formal documented backup procedures and schedules that exist in creating copies of: operating system software, system data and security files/tables, production

libraries/directories and databases (including program source), development tables, libraries/directories and databases

□ What is the backup rotation schedule?

□ Is the internal control environment over process clearly defined?

□ Is documentation reviewed and updated annually?

Page 26: GDSN Security Guidelines - GS1 · The exchange of supply chain information carries the greatest risk when ... The cloud in the GDSN Choreography chart represents the “in-network

GDSN Security Guidelines

Release 1.0, Draft, Apr 2015 © 2015 GS1 AISBL Page 26 of 26

□ Have internal controls been systematically tested?

□ Is testing of the internal controls retained in accordance with record retention?

□ Is system and security configuration stored in a secure location on-site?

□ Are backup files stored in a secure location onsite?

□ Where is the onsite backup storage facility located?

□ How long are backup tapes/disks kept onsite?

□ Does company have an off-site storage facility?

□ Does company have a written contract with off-site storage facility?

□ How long does it take to retrieve a backup from an off-site storage facility?

□ Backups and disaster recovery

□ How often are backups moved to the off-site location?

□ Are file and library backups kept at the off-site storage facility? Security files? Operating system?

□ Documentation? Policies and procedures?

□ Is a copy of the disaster recovery procedures at the off-site facility?

□ Are the backups stored in secured containers while transport to and from the off-site facility?

□ Does the company have a current disaster recovery plan?

□ Does the plan include a sequence for restoring the systems that takes into

consideration the criticality of the system?

□ Has the disaster recovery ever been tested? And when?

□ Have the test results been documented and followed up for problems?

□ Have Information Management (System Support) and user responsibilities related to implementing and testing been defined?

□ Have critical business and information assets been defined?

□ Has a risk assessment been conducted to identify risks and evaluate the impact to business?