Sign up

Secure Development

I. Purpose #

This policy ensures that development environments are secure and encourages the use of secure coding and development practices. Security needs to be considered at all stages of the development lifecycle from specification and design through to implementation.

II. Scope #

These standards apply to all persons involved in the acquisition, development and maintenance of Nested Knowledge’s IT environment and are applicable to all Nested Knowledge systems, most notably applications/systems developed for the Nested Knowledge web application.

III. Secure Development Policy #

Open-Source Software

The use of open-source software is allowed and encouraged where complex or general purpose needs arise. Modification to open-source software is allowed but must comply with any licenses, and generally contribution to the upstream codebase is preferred. Open-source packages are monitored, just as any vendor packages, for vulnerabilities.

Secure Development Environment

Development environments need to be protected against malicious or accidental development and update of code that may create vulnerabilities or compromise confidentiality. Code checkouts ad development may only be performed on company-issued devices, which are MDM managed and protected. Production data is only used in development when a data-dependent bug arises; in these cases, only the relevant data is made available to the development environment, and it is short-lived, being made inaccessible once the issue is resolved.

Development environments are independent from production, lacking configuration, credentials, and network access to Production services and data.

Outsourced Development

Nested Knowledge source code is only accessible to and developed by internal employees.

Supplier Adherence to SDLC

Nested Knowledge employees develop all application code. External platforms (e.g. AWS) may provide architecture, orchestrate deployment of, and execute application code. External libraries (e.g. OSS) are consumed by application code as modules. External providers offer data, most typically in the form of an API or file share. External platforms, providers, and libraries are verified with the following:

  • A review of technical documentation
    • Does the solution maintain a release history?
    • Does the solution provide documentation as to usage, performance, etc.?
    • Does the solution advertise itself as production ready?
  • A review of update / release history
    • Is the solution regularly updated for security patches?
      • Automate scanning for existing vulnerabilites using NPM vulnerability scanning, the pypi Safety DB, and GitHub vulnerability monitoring.
    • Is the solution actively maintained?
    • Does the supplier follow a standardized release versioning system? (e.g. SemVer)
      • Are there reports of major version changes that weren’t reported as such?
  • Does the solution include a public issue tracker?
    • Are issues (bugs & security vulnerabilities) addressed in a timely manner?
  • Does the solution have a policy and/or history of disclosing vulnerabilities and breaches?
  • When available, code & version history review.
    • Do all commits to the repository leave it in deployable condition?
      • Are all commits reviewed & verified by a maintainer / peer?
    • Is code well structured & organized? Does it compile? Does it have/pass a linter?
    • Are new features / patches developed on branches or external to the main deployment branch?
    • Does the solution minimize & verify its dependencies?

Per these criteria, the supplier is assessed for risk in inclusion as a dependency to application code.

Testing Procedures #

Our software is tested & verified in two environments, development & production.

In development, code is tested via the following methods:

  • Automated unit tests, integration tests, functional tests, and linters
    • Unit tests cover shared modules and core functions (e.g. authorization logic)
    • Functional tests cover our most critical features with complex input/output behaviors (e.g. literature search import)
    • Client and frontend servers are covered by linters to identify common errors and improve code quality
    • All code changes must pass tests and linters prior to acceptance.
  • Code review & testing
    • The reviewing developer reads code, identifying corner cases, assessing security compliance, and verifying correctness
    • A reviewing developer and product manager must verify functionality before any code change is accepted.

In production, new changes in the release are verified by a developer upon release. If a feature does not function as intended, the release rolled back or a patch is reviewed and accepted.

System Design and Architecture #

The Nested Knowledge client application is served by an application server and content and interactions provided by an API server; both of these servers run behind a load balancer. The API server communicates with the Search and ML backend services as well as the database. Certain functions of backend services communicate with external (public) APIs through an internet gateway. The frontend servers, services, and database all run in a Virtual Private Cloud (VPC) for network isolation. The frontend load balancers are exposed to receive requests from the public internet and are protected with a WAF using AWS’s Core Ruleset. The client and server applications communicate with an external service, Auth0, for authentication; all communications with Auth0 are encrypted.

Security Requirements #

General #

All application data are stored and processed inside the VPC. Data leaving the VPC are either encrypted to the authenticated & authorized client, or, in the case of external providers contain minimal & nonsensitive information (e.g. DOIs for unpaywall, search strings for PubMed) but still must be encrypted in transit. HTTP traffic is served over HTTPS (redirect required); email traffic (through AWS SES) is encrypted from application to sender (TSL), and sender to receiver (TSL). Within the VPC, communications between the database and all services are encrypted.

Authentication #

Nested Knowledge does not manage user passwords or authentication (handled by Auth0 and Auth0 Lock). All communications with Auth0 from the client are encrypted (TSL), ensuring passwords are not communicated in plain text. Passwords stored by Auth0 are similarly salted & encrypted, with numerous additional best practices applied.

Vulnerability and Patch Management #

Nested Knowledge uses automated scanning to identify potential vulnerabilities in our operating environment and software dependencies. The risk of a vulnerability is assessed using the CVSS framework.

Our cloud services provider (AWS) provides automated vulnerability reports on operating systems & databases running the application. Application vulnerability scanning is performed by SecurityScorecard on an ongoing basis. Alerts derived from these reports are addressed by release engineers:

  • The applicability & risk of the vulnerability is verified and added to our issue tracker. If a vulnerability is deemed non-applicable or low severity, it is prioritized amongst other development initiatives. If medium or high severity, the vulnerability is given highest priority, to be addressed by an developer with next availability.
  • The viability of the recommended patch is assessed.
  • The patch is applied during the next scheduled release window. If a vulnerability is deemed high severity, it triggers an immediate release upon review completion.

Our dependency management tools (NPM, pip, apt-get) provide automated vulnerability reporting & patch alerts. Every build in our development environment produces a vulnerability report among dependencies. Alerts derived from these reports are addressed by developers.

  • The applicability & risk of the vulnerability is verified. If a vulnerability is deemed non-applicable or low severity, it is added to our issue tracker. If applicable or medium or high severity, the vulnerability is assigned to a developer immediately.
  • The viability of the recommended patch is assessed. Developers will modify the application code as needed to accommodate the patch (e.g. updating to a new API or changing a configuration). All changes are tested and passed through code review.
    • If the vulnerability lacks a patch, the team may:
      • Contribute an upstream patch, for open source dependencies.
      • Mitigate code paths triggering the vulnerability and begin researching alternative dependencies.
      • Replace or remove the dependency, with application code changes
  • The dependency and/or code change is deployed during the next scheduled release window. If a vulnerability is deemed high severity, it triggers an immediate release upon review completion.

Revision History

This policy will be updated at least on an annual basis or when a significant change occurs.

Updated on December 9, 2024
Did this article help?

Have a question?

Send us an email and we’ll get back to you as quickly as we can!