DATE-01 | Date | 12/15/2023 |
GNRL-01 | Vendor Name | Biometric Signature ID |
GNRL-02 | Product Name | BioSig-ID™ BioProof-ID™ BioSight-ID™ |
GNRL-03 | Product Description | Student
ID authentication using patented gesture biometrics to create a unique 4
character password (length, speed, direction angle..) , exam monitoring
using a web cam, ID verification comparing |
GNRL-04 | Web Link to Product Privacy Notice | |
GNRL-05 | Vendor Contact Name | Jeff Maynard |
GNRL-06 | Vendor Contact Title | President & CEO |
GNRL-07 | Vendor Contact Email | jeff.maynard@BioSig-ID.com |
GNRL-08 | Vendor Contact Phone Number | 214-244-7679 |
GNRL-09 | Vendor Data Zone | United States |
GNRL-10 | Institution Data Zone | United States |
GNRL-11 | Campus Security Analyst/Engineer |
GNRL-12 | Assessment Contact |
Vendor Answers | Additional Information | Guidance | ||
DOCU-01 | Have you undergone a SSAE 18 audit? | Yes | Microsoft
audits at least annually against the SOC reporting framework for SOC 1,
2, and 3 by independent third-party auditors. The audit for Microsoft
cloud services covers controls for data security, availability,
processing integrity, and confidentiality as applicable to in-scope
trust principles for each service. | Provide
the date of assessment and include a SOC 2 Type 2 (preferred) or SOC 3
report. If you have a SOC3 report, include a URL for the published
report. Indicate if your hosting provider was the subject of the audit. |
DOCU-02 | Have you completed the Cloud Security Alliance (CSA) self assessment or CAIQ? | No | No need for with Microsoft Azure | Describe any plans to complete the CSA self assessment or CAIQ. |
DOCU-03 | Have you received the Cloud Security Alliance STAR certification? | No | Describe any plans to obtain CSA STAR certification. | |
DOCU-04 | Do you conform with a specific industry standard security framework? (e.g. NIST Cybersecurity Framework, ISO 27001, etc.) | Yes | Azure
systems run in environments where Microsoft has achieved certifications
for SOC 1/2/3, ISO 9001, and ISO 27001/27017/27018, as per the best
practice for FERPA compliance | Provide
documentation on how your organization conforms to each framework and
indicate current certification levels, where appropriate. |
DOCU-05 | Are you compliant with FISMA standards? | Yes | Microsoft
Azure has earned a P-ATO at the High Impact Level from the Joint
Authorization Board, the highest bar for FedRAMP accreditation, which
authorizes the use of Azure to process highly sensitive data. | Indicate level, agency issuing ATO, and necessary details on ATO. If using FEDRamp, please indicate the supporting details. |
DOCU-06 | Does your organization have a data privacy policy? | Yes | Provide your data privacy document (or a valid link to it) upon submission. |
Additional Information | Guidance | ||
COMP-01 | Describe your organization’s business background and ownership structure, including all parent and subsidiary relationships. | JCLADS
Corp dba Biometric Signature ID is a Delaware based corporation. It is
privately owned and has a number of shareholders including the State of
Texas and the Moheghan Biometrics. Majority ownership is held by Jeff
Maynard. We have no subsidiaries. | Include circumstances that may involve off-shoring or multi-national agreements. |
COMP-02 | Describe how long your organization has conducted business in this product area. | 11 years | Include the number of years and in what capacity. |
Vendor Answers | Additional Information | Guidance | ||
COMP-03 | Do you have existing higher education customers? | Yes | Biometric
Signature ID has worked with many higher education, commercial and
continuing education customers in the US and internationally. A
reference list is available upon request. Biometric Signature currently
works with Central Texas College, Alamo Colleges District, National
Multi-state Licensing System & Registry (NMLS), Arkansas State
University, Colorado State University Global Campus. | Provide a list of Higher Ed references, with contact information. |
COMP-04 | Have you had a significant breach in the last 5 years? | No | Biometric Signature ID has not ever had a significant breach. | |
COMP-05 | Do you have a dedicated Information Security staff or office? | Yes | Biometric
Signature ID has a dedicated team to ensure all of our products meet or
exceed industry security standards. We have a 4,000 square foot office
building. | Decribe your Information Security Office, including size, talents, resources, etc. |
COMP-06 | Do
you have a dedicated Software and System Development team(s)? (e.g.
Customer Support, Implementation, Product Management, etc.) | Yes | Biometric
Signature ID employees a team of developers dedicated to supporting the
client/user facing UI, server maintenance, current and new development
efforts along with LMS production support. Our dedicated customer
support, implementation team and product managers work closely with each
client to ensure a seamless experience. | Describe
the structure and size of your Software and System Development teams.
(e.g. Customer Support, Implementation, Product Management, etc.) |
Additional Information | Guidance | ||
COMP-07 | Use
this area to share information about your environment that will assist
those who are assessing your company data security program. | For
the past 13-years our flagship product, BioSig-ID™ has had over a
million users from hundreds of institutions. BioSig-ID has been used
over 40M times to authenticate identity before users can access
assessments, devices, or content. Additionally, we have award winning
data analytics that has discovered 1,000’s of cheating students using
proven adaptive algorithms and real time event notifications. Two issued
patents confirm our “novel technology” . BSI is also involved in other
market sectors. BSI provides identity authentication services to a
financial federal agency last four years for pre-licensure and CE
certifications. In this association, we have adjudicated identity
“authentication before access” millions of times in thousands of courses
offered by 35 course providers for nearly 200,000 members. BSI has
provided services to healthcare entities, defense contractors, VR
companies for payment processing and real estate agents for
pre-licensure. | Share any details that would help information security analysts assess your product. |
Vendor Answers | Additional Information | Guidance | ||
HLAP-01 | Do you support role-based access control (RBAC) for end-users? | Yes | Biometric
Signature ID utilizes the user's role in the learning management system
to determine appropriate access level. The Reporting Dashboard provides
configurable access to provide records that are appropriate for each
role. | Describe any infrastructure dependencies. |
HLAP-02 | Do you support role-based access control (RBAC) for system administrators? | Yes | The Reporting Dashboard provides configurable access to provide records that are appropriate for each role. | Describe the utilized technology. |
HLAP-03 | Can employees access customer data remotely? | Yes | We maintain a telecommute environment with secure access to data. | If available, submit documentation and/or web resources. |
HLAP-04 | Can
you provide overall system and/or application architecture diagrams
including a full description of the data communications architecture for
all components of the system? | Yes | Biometric Signature ID can provide high level architecture documentation. | Provide a reference to the requested documents or provide them when submitting this fully-populated HECVAT. |
HLAP-05 | Does the system provide data input validation and error messages? | Yes | We
receive and log messaging internally. Text error messages are displayed
to the user when they input an incorrect BioSig-ID password or if there
is a technical issue. Depending on the issue, users may have an
automatic support ticket created on their behalf. | Provide a reference to documentation of your data input validation and error messaging capabilities. |
HLAP-06 | Do you employ a single-tenant environment? | Yes | Depending
on the product or features selected we can offer a single tenant system
for an additional cost. By default we offer multi-tenant environments. | Describe your single-tenant strategy. |
Vendor Answers | Additional Information | Guidance | ||
HLAA-01 | Can you enforce password/passphrase aging requirements? | Yes | Our
products eliminates the need to reset a password at specific intervals.
However, should an institution require that a password reset be
performed at a specific interval we can configure these settings per
institution requirements. | Describe how aging requirements are implemented in the product. |
HLAA-02 | Does your web-based interface support authentication, including standards-based single-sign-on? (e.g. InCommon) | Yes | When
the user enters the LMS and accesses our product the user information
such as first name, last name, student ID and or email is sent to our
system. | Describe or provide a reference to the supported types of authentication. |
HLAA-03 | Does
your application support integration with other authentication and
authorization systems? List which ones (such as Active Directory,
Kerberos and what version) in Additional Info? | Yes | Different
solutions can be integrated in many ways, some with a more native
integration and others with a secure protocol for communication. Some of
these include, but not limited to: Active Directory (LDAP), Azure
Active Directory, SSO via SAML2/SSOIO/Kerneros/OpenID/OAuth | Provide a brief description of supported authentication and authorization systems. |
HLAA-04 | Does
the system (servers/infrastructure) support external authentication
services (e.g. Active Directory, LDAP) in place of local authentication? | No | BioSig-ID™
replaces or supplements regular forms of authentication to add a
biometric gesture level of identifying the person trying to gain access.
It does not require any external service for this. | Describe any plans to support external authentication services in place of local authentication. |
HLAA-05 | Are audit logs available that include AT LEAST all of the following; login, logout, actions performed, and source IP address? | Yes | Login
and session details are maintained in the audit log along with actions
performed and IP address, browser and device information. | Ensure that all elements of D32Bio are evaluated for your response. Provide a description of logging |
Vendor Answers | Additional Information | Guidance | ||
HLBC-01 | Do you have a documented Business Continuity Plan (BCP)? | Yes | Biometric Signature ID has a business continuity plan that can be shared upon request. | Provide a copy of your BCP along with this document (link o attached) |
HLBC-02 | Is there a documented communication plan in your BCP for impacted clients? | Yes | Our
business continuity plan allows for multiple server and database
redundancies via Microsoft Azure. Should one region fail we have the
capability to the product service will remain available for clients. | Summarize your documented communication plan contained in your BCP |
HLBC-03 | Are all components of the BCP reviewed at least annually and updated as needed to reflect | Yes | The BCP is reviewed annually. | Describe your BCP component review strategy. |
HLBC-04 | Does your organization conduct an annual test of relocating to an alternate site for business recovery purposes? | Yes | Office
relocation has no impact on the Microsoft Azure PaaS/SaaS
infrastructure. Product can be moved to another provider, but there is
no need for this, and Microsoft handles recovery for us. | State the date of your last alternate site relocation test. |
Vendor Answers | Additional Information | Guidance | ||
HLCH-01 | Do you have a documented and currently followed change management process (CMP)? | No | Describe current plans to implement a change | |
HLCH-02 | Will the institution be notified of major changes to your environment that could impact the institution's security posture? | Yes | Technical
point of contanct's or designated admins will receive emails and/or SMS
messages about important changes to hardware, software or cloud
environments. | State how and when the institution will be notified of major changes to your environment. |
HLCH-03 | Do you have policy and procedure, currently implemented, guiding how security risks are mitigated until patches can be applied? | Yes | Microsoft Azure automatically
applies security patches, or we manually push them forward if
validation is required which we Q&A on staging environments. Due to
the Azure infrastructure this process is done in real-time and requires
no scheduling, but for manual pushes we time this to happen during low
activity if severity is low on the security risk. | Summarize the policy and procedure(s) guiding risk mitigation practices before critical patches can be applied |
HLCH-04 | Do procedures exist to provide that emergency changes are documented and authorized (including after the fact approval)? | Yes | Each
change is documented within private DevOps branches and approved
accordingly by others, and goes through proper Q&A phases, or is
pushed at emergency level if a security risk has been detected, but then
Azure allows for balanced multiple slot deployments. There are also
Teams/Outlook trails to correlate, and summaries are documented for
management and clients. | Summarize implemented procedures ensuring that emergency changes are documented and authorized. |
Vendor Answers | Additional Information | Guidance | ||
HLDA-01 | Do you physically and logically separate institution's data from that of other customers? | No | Logically,
all data is separated between clients but on the same hardware/systems.
Enterprise clients are physically separated if they host their own
infrastructure. | Describe your plan to physically and logically separate institution's data from other customers. |
HLDA-02 | Is sensitive data encrypted in transport? (e.g. system-to-client) | Yes | All data in transit is secured with 512AES encryption. | Summarize your transport encryption strategy. |
HLDA-03 | Is sensitive data encrypted in storage (e.g. disk encryption, at-rest)? | Yes | All data is stored in the Azure cloud, with all the world class security that comes along with it, in a SQL database with 512AES | Summarize your data encryption strategy. |
HLDA-04 | Do backups containing institution data ever leave the institutions Data Zone, either physically? | No | ||
HLDA-05 | Do
you have a media handling process, that is documented and currently
implemented, including end-of-life, repurposing, and data sanitization
procedures? | Yes | Destruction upon end of agreement or upon customer request | Provide details of these procedures (link or attached). |
HLDA-06 | Is any institution data visible in system administration modules/tools? | Yes | Institution
name, account number, point of contact(s), email and physical addresses
to the organization are visible to some employees in our dashboards. | Summarize why the institution's data is visible in system adminitration modules/tools. |
Vendor Answers | Additional Information | Guidance | ||
HLDB-01 | Does the database support encryption of specified data elements in storage? | Yes | All
data is stored in the Azure cloud, with all the world class security
that comes along with it, in a SQL database with 512AES encryption. | Describe the type of encryption that is supported. |
HLDB-02 | Do you currently use encryption in your database(s)? | Yes | All
data is stored in the Azure cloud, with all the world class security
that comes along with it, in a SQL database with 512AES encryption. | Describe how encryption is leveraged in your database(s) |
Vendor Answers | Additional Information | Guidance | ||
HLDC-01 | Will any institution data leave the institution's Data Zone? | No | ||
HLDC-02 | Does your company own the physical data center where the institution's data will reside? | No | Azure is owned and operated by Microsoft | Provide a detailed description of where the institutions data resides. |
HLDC-03 | Does the hosting provider have a SOC 2 Type 2 report available? | Yes | Obtain the report if possible and add it. | |
HLDC-04 | Does the physical barrier fully enclose the physical space preventing unauthorized physical access? | Yes | Azure's physical security procedure is documented | Describe your physical barrier strategy. |
Vendor Answers | Additional Information | Guidance | ||
HLDR-01 | Do you have a Disaster Recovery Plan (DRP)? | Yes | Describe or provide a reference to your Disaster Recovery Plan (DRP). | |
HLDR-02 | Are any disaster recovery locations outside the institution's Data Zone? | No | ||
HLDR-03 | Are all components of the DRP reviewed at least annually and updated as needed to reflect? | Yes | Summarize your DRP review and update processes. |
Vendor Answers | Additional Information | Guidance | ||
HLFI-01 | Are you utilizing a web application firewall (WAF) and/or a stateful packet inspection (SPI) firewall? | Yes | Azure
provides firewall services that integrate indirectly within the
applications and from end-user point avoid DDoS and other attacks. They
are open by default to any user in the world as we supply services as
such. The back-ends are secured via encryption, but have additional
IP-restrictions for additional security. Applications themselves are
self-healing and are locked down. | Describe the currently implemented WAF. |
HLFI-02 | Do you have a documented policy for firewall change requests? | Yes | We
handle this internally for internal changes, and provide personalized
e-mails to clients if they need to make firewall changes on their end to
allow *.verifyexpress.com services to route through their networks.
These are also whitelisted by the United States | Describe your documented firewall change request policy |
HLFI-03 | Are you employing any next-generation persistent threat (NGPT) monitoring? | Yes | Microsoft
Azure does the majority of this automatic, but this is supplemented by
us with Microsoft's best-practices on usage of DevOps monitoring
combined with Application Insight monitoring as well as internally
created monitoring methods. | Describe your NGPT monitoring strategy. |
HLFI-04 | Do you monitor for intrusions on a 24x7x365 basis? | Yes | The
majority is handled by Microsoft and dealt with immediately by them,
but appropriate Biometric Signature ID staff is also notified to take
action. | Provide a brief summary of this activity. |
Vendor Answers | Additional Information | Guidance | ||
HLPH-01 | Does your organization have physical security controls and policies in place? | Yes | Provide a copy of your physical security controls and policies along with this document (link or attached). | |
HLPH-02 | Are employees allowed to take home customer data in any form? | No |
Vendor Answers | Additional Information | Guidance | ||
HLPP-01 | Can you share the organization chart, mission statement, and policies for your information security unit? | Yes | Provide a links to these documents in Additional Information or attach them with your submission. | |
HLPP-02 | Are information security principles designed into the product lifecycle? | Yes | Being
a security company the product development puts security principles at
the core, and incorporates that with privacy awareness as well. | Summarize the information security principles designed into the product lifecycle. |
HLPP-03 | Do you have a formal incident response plan? | No | There
has never been a need for a formal plan as incidents are immediately
addressed by those with appropriate access and we thereby avoid any
slowdown in responsiveness that a formal plan would introduce. Strict
methods are applied in how to response | State plans to formalize an incident response plan. |
HLPP-04 | Do you have a documented information security policy? | Yes | Management
has outlined what is expected to ensure security and which staff has
the appropriated primary duties and when secondary or tertiary
replacements jump in. | Provide a reference to your information security policy or submit documentation with this fully-populated |
Vendor Answers | Additional Information | Guidance | ||
HLSY-01 | Are systems that support this service managed via a separate management network? | Yes | BSI services themselves have a
dashboard layer to assist admins in managing the front-end, but it all
runs within the same Azure network on a different App-plan. Any
third-party service provider that we are integrated with, such as an
LMS-provider would. | Provide a brief description of how this is implemented. |
HLSY-02 | Do
you have a systems management and configuration strategy that
encompasses servers, appliances, and mobile devices (company and
employee owned)? | Yes | Policies with hierarchy based
roles are in place to govern the use and changes made to systems in the
network along with audit trails. Changes to the system can only be made
by specific roles and undergo approval depending on their associated
level. | Summarize your systems management and configuration strategy. |
Vendor Answers | Additional Information | Guidance | ||
HLVU-01 | Have your systems and applications had a third party security assessment completed in the last year? | Yes | As
per DOCU-01 this is done annually, but we also have existing and
prospectus clients run many third-party security assessments with the
IBM Security Guardium Vulnerability Assessment being the most popular. | Provide
the results with this document (link or attached), if possible. State
the date of the last completed third party security assessment. |
HLVU-02 | Are your systems and applications scanned for vulnerabilities [that are remediated] prior to new releases? | Yes | We
have multiple Azure slots available for this purpose to do basic
testing, but also to replicate production environment testing to
minimize impact on end-users before final deployment. | Provide a brief description. |