Skip to main content

Cloud Environment & Security

Brief Overview of GovWorx Security Posture

Alex Montgomery avatar
Written by Alex Montgomery
Updated over 4 months ago

Executive Summary

This article is not meant to be an exhaustive list of GovWorx security controls, policies and mechanisms. For a more complete view into our security practices we encourage you to review our trust center.

Compliance Frameworks

GovWorx adheres to the following security frameworks including performing annual audits and pentests.

  • SOC2 Type 2

  • CJIS

  • HIPAA

AI Usage

We acknowledge LLMs & AI is a new tool agencies are being intentional about adopting. You can read more about what AI models we use in What AI does GovWorx use?

Security Brief

Network Diagram

GovWorx hosts all data in the US West AWS GovCloud. You can see a network diagram below.

Data Handling

Data Boundary

All data is transmitted in and out of our AWS VPC (Virtual Private Cloud) over a FIPS 140-2 compliant cipher.

Persistence

All representations of customer data are stored in S3 buckets or Amazon RDS. Data is encrypted at rest. Encryption keys are managed by GovWorx and rotated periodically.

Backups

Backups are taken on a nightly basis and replicated across region to us-gov-east-1.

Retention

Customers can choose from a set of retention policies for all uploaded media to be purged. Customers have the option for media with an evaluation on it to be retained indefinitely.

Infrastructure Security & Monitoring

AWS tools are deployed to ensure the infrastructure is safe and secure

AWS Web Application Firewall

System has a WAF installed on it to detect malicious web attacks against the Application Load Balancer (ALB). All traffic flows through the ALB or to the temporary S3 upload bucket

Cloudtrail and Guardduty

All events within the infrastructure are captured in AWS Cloudtrail as a default setting in AWS GovCloud. Guardduty serves as a monitor for these events to detect unusual activity.

Datadog and Datadog SIEM (Security Information & Event Management)

Datadog is used to aggregate logs, metrics and alert us on any possible security events detected in our logs or Guardduty

Application Level Security

User Authentication

User passwords and logins are managed by AWS Cognito. Optionally, customers can choose to use their own Identify Provider and enable SSO. This is available upon request.

Password length is CJIS compliant and managed at the system level for proper length and complexity rules.

We encourage users to bring their own identity provider and use our SAML Integration

MFA

If users are using application as Identity Provider - MFA can be enabled. The only currently supported MFA method is TOTP (Time-Based One Time Password)

Data Retention Policy

Administrators can choose a retention period for all media (BWC videos, Audio Recordings, etc) that come in through an integration.

System Audit Log

Administrators have access to a system wide audit log

Roles and Permissions

The system is role and permission based. Administrators can define roles and assign users to those roles.

Did this answer your question?