For the current version, please visit the website.
When an organization runs its own on-premise data centers, control over security is straightforward: it falls solely on the shoulders of that organization. They are solely responsible for maintaining the CIA Triad of Confidentiality, Integrity and Availability of their systems, as well as the data stored within them.
In a hybrid or cloud environment, the responsibility for maintaining the CIA Triad is shared with a cloud service provider (CSP), such as Files.com under a Shared Responsibility Model.
In simplest terms, a Shared Responsibility Model denotes that CSPs are responsible for the operation of security controls of the cloud, and customers are responsible for securing the data they put in the cloud utilizing the provided tools.
The CIA Triad protection only works when the security controls are tailored to fit the individual needs of an organization.
Files.com is responsible for protecting the underlying infrastructure (hardware, software, networking and facilities) upon which the platform operates.
Files.com is also responsible for the availability and functionality of the world class security controls customers may choose to utilize.
Customers are responsible for utilizing the provided security controls to configure their Files.com account to meet the unique requirements of their organization.
Customer responsibilities include:
File contents stored on the Files.com platform
Initiating file transfers in/out of Files.com using the appropriate encryption options
User account provisioning
User account deprovisioning
File storage locations
File expiration/deletion settings
IP Whitelisting/country restrictions
User awareness and training
The following are a select list of the security controls that Files.com provides for customers to meet their unique security needs:
File hash value via API
Deleted file retention
Storage region selections
Multiple storage regions on certain plans
Custom SSL Certificates
Session IP Pinning
Brute force protection options
Multiple 2FA methods
Globally unique usernames
Password Controls, including Length, Complexity, History, Expiration
Prevent use of breachable passwords
Permissions: User, Group, Folder
Multiple SSO/LDAP Integration options
Per folder options: Folder level admins, Folder storage region, GPG encryption on certain plans
Account Provisioning, including password setting options, 2FA options, and SSO/LDAP integration options
Account Deprovisioning, including automatic user lockout options, and automatic inactive user deletion options