A Risk Assessment of Piql Services by FFI

Services, or the Piql computer system. 12 The client data is depicted in red in figure 5.3. Piql AS’ Front-End service or interface allows the client to transfer their data into the Piql computer system in one of two ways: the client can either upload the data to the Piql system using a secure connection through a public web server or manually deliver a portable hard-drive containing the files to the Piql partner. These options are depicted as two solid black lines going from the client computer interface to the Piql computer interface. The reader will notice that the black line denotes the logical transfer of data throughout the entire system. Should the client choose to upload the data via the internet, the Front-End code provides secure connections through the use of HTTPS or S-FTP protocols to ensure secure communications between the client interface and the Piql interface. All communication happens within this encrypted connection. The HTTPS/S-FTP connection is the standard solution offered by Piql AS as the Front-End service. However, should the client require it, additional security can be added through an OpenVPN. The Piql partner then sends the setup for the OpenVPN to the client, which contains certificates and necessary keys. When the client installs this setup, a cryptographically secure tunnel is opened between the client and the Piql partner which exists in addition to the HTTPS/S-FTP connection already in place. The Front-End code also includes a Squid reverse web proxy, a feature which allows an unlimited number of clients to reach a designated web server, in this case in the Piql computer system. Only requests made to this web server are forwarded, while requests that are not according to HTTPS are at the same time detected and terminated. The entire Front-End service runs behind a firewall, which by default rejects all traffic to the Piql computer system unless it comes through designated ports. Once the data is allowed to enter into the external interface of the Piql computer system, there is additional security in place which monitors and analyses real-time all the traffic which passes through. Such a Snort intrusion prevention and detection system is there to make sure that all of the other security measures just described have done their jobs [35, 33]. Upon receiving the client data, the Piql computer system performs additional security checks on the digital data, which includes a virus check and an internal integrity check. The latter is to make sure that none of the client data was altered during the transfer into the Piql system. Simultaneously, the Piql computer system begins processing the client data: collecting and storing metadata from the files to enable future access (depicted in green in figure 5.3); encoding the files into Piql format based on the preferred method of preservation (digital, visual or hybrid); and creating a checksum of the original file for later reference. The checksum and the original file are kept separate throughout the remainder of the process.

12 For those interested: Piql AS’ operational IT system is based on open source industry best practice components. The Piql computer, which manages all the tasks in the workflow, uses an open source LAMP stack (Linux, Apache Web Server, MySql and PHP). For more, see [33, 34]

40

FFI-RAPPORT 16/00707

Made with FlippingBook - Online magazine maker