Security Policy

At REFFIND, we know that our customers rely on us as an important part of their business processes. We take this responsibility to our customers very seriously, and the security and reliability of the software, systems and data that make up the REFFIND suite of products are our top priority.

Infrastructure Security

The REFFIND application is hosted and managed within the Amazon Web Services (AWS) cloud computing infrastructure – the most secure cloud computing environment available today. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. AWS inherently protects from threats by applying security controls at every layer – from physical to application – isolating applications and data, whilst rapidly deploying security updates without service interruption. As a result, the REFFIND application is afforded all the benefits of being hosted on the AWS infrastructure, including:

  • Regular security assessments and compliance auditing
  • Ongoing penetration testing and vulnerability assessments
  • Real-time antimalware and antivirus protection for file systems, memory, processes and registry database
  • Rolling updates and security patching with zero downtime
  • Environmental safeguards
  • Network security safeguards
  • Data security safeguards
  • System security safeguards
  • Vulnerability management
  • Backups
  • Disaster recovery
  • Privacy
  • Restricted access to customer data
  • Employee screening and policies
  • Dedicated security staff

Additionally, AWS provides certification reports that describe how the AWS Cloud infrastructure meets the requirements of an extensive list of global security standards, allowing REFFIND to meet specific government, industry, and company security standards and regulations, including:

  • ISO 27001
  • SOC
  • PCI Data Security Standard
  • FedRAMP
  • Australian Signals Directorate (ASD) Information Security Manual
  • Singapore Multi-Tier Cloud Security Standard (MTCS SS 584)

For more information, please see the AWS Security page.

Application Security

The REFFIND web application adopts the OWASP Top Ten and OWASP Mobile Top Ten as a means of ensuring application code is free from flaws and security vulnerabilities. The OWASP Top Ten is a set of powerful awareness document for web and mobile application security. The OWASP Top Ten represents a broad consensus about what the most critical web and mobile application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce a list of the top ten security vulnerabilities affecting web and mobile applications.

Adopting the OWASP Top Ten ensures REFFIND is protected against:

  1. Injection
  2. Broken Authentication and Session Management
  3. Cross-Site Scripting (XSS)
  4. Insecure Direct Object References
  5. Security Misconfiguration
  6. Sensitive Data Exposure
  7. Missing Function Level Access Control
  8. Cross-Site Request Forgery (CSRF)
  9. Using Components with Known Vulnerabilities
  10. Unvalidated Redirects and Forwards

Adopting the OWASP Mobile Top Ten ensures REFFIND is protected against:

  1. Weak Server Side Controls
  2. Insecure Data Storage
  3. Insufficient Transport Layer Protection
  4. Unintended Data Leakage
  5. Poor Authorisation and Authentication
  6. Broken Cryptography
  7. Client Side Injection
  8. Security Decisions Via Untrusted Inputs
  9. Improper Session Handling
  10. Lack of Binary Protections

Additionally, all REFFIND technical staff receive OWSAP Top 10 training. The training takes staff through a practical approach to the following secure coding principles:

  • Threat Risk Modelling
  • Handling E-Commerce Payments
  • Phishing
  • Web Services
  • Ajax and Other "Rich" Interface Technologies
  • Authentication
  • Authorisation
  • Session Management
  • Data Validation
  • Interpreter Injection
  • Canonicalisation, locale and Unicode
  • Error Handling, Auditing and Logging
  • File System
  • Distributed Computing
  • Buffer Overflows
  • Cryptography
  • Configuration
  • Software Quality Assurance
  • Deployment
  • Maintenance

For more information, please seethe OWASP website.

Payments Security

The REFFIND application uses the Braintree payments service for the secure transaction and storage of all payments. Braintree focuses on providing a secure environment that goes above and beyond industry security standards and guidelines. Braintree is a validated Level 1 PCI DSS Compliant Service Provider, and are on Visa’s Global Compliant Provider List and MasterCard’s SDP List.

Braintree is certified to PCI Service Provider Level 1, the most stringent level of certification, actively works to protect against fraudulent charges and monitors suspicious transactions.

For more information, please see the Braintree Security page.

Vulnerability Management and Penetration Testing

REFFIND undergoes monthly vulnerability assessments conducted by Nessus Cloud and biannual penetration testing conducted by HackLabs, with all high and critical vulnerabilities being addressed immediately. Nessus is a PCI DSS Approved Scanning Vendor (ASV) and provides cloud-based scanning and detection of web server vulnerabilities, known and unknown web application vulnerabilities, and configuration auditing of the REFFIND web application platform. HackLabs is a Security Consulting Company specialising in Penetration Testing.

For more information, please see the Nessus Cloud and HackLabs pages.

Secure Access

All REFFIND employees are equipped with secure laptop computers with encryption and antivirus software centrally installed, configured and managed. Technical staff undergo training on relevant security matters that pertain to their job.

More Information

If you have any security concerns or questions, feel free to contact us at security@reffind.com.

Request a Demo

We think you'll love our platform! Enter your details below and one of our team will be in touch shortly to set up a time to show you how it works.

* indicates required