Frequently Asked Questions

Find answers to frequently asked questions here

Has the application development followed a structured, secure and approved methodology?

The VIPR Connect application development follows the OWASP Top 10 guidelines and security is at the forefront of coding practices. Security is considered at all parts of the development and deployment cycles.  Further information about the structure and development of the hosted environment can be found via https://www.microsoft.com/en-us/trustcenter.

Microsoft Azure configures their environment in accordance with best practices and all relevant and reasonable steps are taken to harden the systems configuration and as well as networks managed by Impel used to access the infrastructure.

All security patches are managed by Microsoft Azure. Application and SQL database instances are regularly kept up to date with patching / versions. Appropriate firewall, spam and virus protection is also managed and kept up to date by Microsoft Azure and includes a web-application firewall (WAF) to detect and block web-based attacks such as XSS, SQL Injection, and CSRF.

Microsoft Azure has an incident management process to handle all security incidents and a process for notification to its customers of any incidents that may have an impact on their services.

Where are the data centres located?

All data hosting environments are in Australia.

What level of security does the system provide?

There are multiple levels of security attached to the RIEMS system. Firstly, the information being transferred between the user device and the cloud environment is encrypted using SSL technology. Most people are familiar with this level of security when they see the little lock when either performing internet banking or paying for an online item with a credit card. Secondly, the RIEMS system utilises the Microsoft Azure Hosting environment based in Australia. Microsoft’s Azure cloud platform was the first public cloud service in Australia to pass an Australian Signals Directorate (ASD) Industry Security Registered Assessors Program (IRAP) compliance assessment. The IRAP program was designed to evaluate whether the applicant was actively managing security risks associated with electronic data transmission, aggregation and storage. The areas evaluated included intrusion detection, cryptography, cross domain security and access control. Finally, each database within the RIEMS system utilises various data triggers as well as software based access protection to ensure that each client’s data remains secure.

Who owns the data I enter?

The data that is entered/supplied by the institution remains with the original data owner which in the case of data entered into VIPR Connect would be the client institution (unless they are entering data owned by some else).  System data provided by VIP Research with the VIPR Connect modules is owned by VIP Research.

How is data securely accessed and transferred?

All data within the application is transferred over encrypted network protocols.
All encryption keys are securely managed and access is only available to a small number of authorised personnel within VIP-Research.

Data which is specific to each client is segregated from other client’s data through comprehensive use of identifiers and associated integrated application level security.

Access to the service requires authentication by username and password (LDAP integration pending). Two factor authentication is not supported for the service application log in at this time. Provisions have been made to ease implementation of this if required. Two factor authentication is optionally supported for administrative access to the application and hosting infrastructure (Microsoft Azure via associated Microsoft Account login).

A user may have unlimited attempts to login to the system without being locked out. A simple configuration change can enable this within desired parameters if required e.g. 5 attempts, lock user out for 1 hour.

Web server logging is in place which provides audit capabilities. Currently there is no client / user facing access to the audit log. The log files can be accessed via the Azure management portal (access only provided to VIP-Research). The logs capture the username of the person that made the request, date, time, IP address etc, and the full request URL so as to detail what operation / interaction with the data the user has made. This is functionality provided as standard by Azure / Microsoft IIS web server. If required, the interface would need to be designed by VIP-Research to access the audit log and present it in a user-friendly manner to the client.

Once a client ceases to subscribe to the service, all services are deleted through the Azure management portal and any trace data is disposed of as part of Microsoft Azure’s normal data scrubbing processes.

Can my organisation download the system data provided with the Industry Profiling product?

Yes although there are some licensing requirements in terms of not on-selling the data, internal use only etc but the downloading of this data is available as an separate option. The price is available on request and can be a one off data extraction or three extractions over three years which is a more economical option.

Can my organisation download the data that is entered by our users?

Yes, all data that has been either uploaded from your other repositories (such as publications, grants, IP, income) or has been entered directly (such as impact, engagement, research ideas) can be exported in either csv or Json format.

;
We use cookies to enhance your experience. By continuing to use our website, you consent to our use of cookies.
Privacy Policy