Security by Design

Security embedded into the product

OS GIR is created with an emphasis on security and quality. Security should always be a central part when acquiring IT-products. There are several security related vulnerabilities that we focus on in OS GIR: Software, hardware, network systems, social engineering and legislation.

Software - Developed with security

OS GIR is designed to be available whenever you need it. Our development is safeguarded by a series of steps inherent in the development and release management processes – such as automatic pipelines and tests and code reviews. Everything is open source, significantly reducing any insecurities of what happens “behind-the-scenes”.

Security by Design - Software
Security by Design - Hardware

Hardware - hosting

With the introduction of cloud computing, we now have the possibilities to change and restore applications, and are able to scale faster and target your needs.

Network systems - limits

When applying cloud computing, it is crucial to have control over accesses. Therefore, OS GIR is developed with constraints, and via Site-to-Site VPN technology accesses are granted only to your connected employees and identities.

Security by Design - Network Systems
Security by Design - Social Engineering

Social engineering - multiple elements

Onboarding

If you use OS GIR to create new employees, we can automatically and safely create them in the connected IT-systems. Additionally, there is the possibility of creating a built-in approval flow when creating employees, securing transparency of who approves what and when. 

Organization changes

With OS GIR, you get a planning tool where changes can be created in advance, where you can inspect, edit and quality check all the details before the change launches. This caters for a smooth and flawless result with regards to organizational changes.

Offboarding

Whenever collaborations expire or are terminated, OS GIR helps with terminating accesses automatically and, if needed, immediately  across the IT-landscape.

Legislation

The European Data Protection Regulation (GDPR emphasizes that IT systems only fetch necessary data. Therefore, in OS GIR’s integrations to and from other systems, we make sure to stay compliant with this regulation. OS GIR only fetches relevant data, securing a strong data flow across the IT landscape. Furthermore, it is possible to limit the users’ actions in OS GIR. There is a necessary confidentiality barrier within the system, and any changes in this confidentiality are automatically saved and updated, securing the integrity. Everything is also regenerative, making it impossible for information to disappear or to be changed unintentionally.
Security by Design - Legislation
Security by Design - Management supervision

Management supervision

A higher number of IT-systems present higher demands of control of rights and accesses for your employees. These demands can be hard and time consuming to deal with. The Network and Information Security Directory (NIS2) has presented a new directory that increases the demand of enforcement of the rules and regulations concerning cybersecurity and unifies the concerning sanctions. This directory also demands increased control and supervision internally in the organization, and with OS GIR you get a tool that brings this insight into each user’s accesses in different IT systems.
Security by Design - Software

Software - Developed with security

OS GIR is designed to be available whenever you need it. Our development include several safety elements – such as automatic pipelines and tests and code reviews. Everything is open source, significantly reducing any insecurities of what happens “behind-the-scenes”.
Security by Design - Hardware

Hardware - Hosting

With the introduction of cloud computing, we now have the possibilities to change and restore applications, as well as being able to scale faster and more targeted to your needs.
Security by Design - Social Engineering

Social engineering - Multiple elements

Onboarding

If you use OS GIR to create new employees, we can safely create them in the relevant and connected IT-systems. Additionally, there is the possibility of creating a built-in approval flow, securing transparency of who approves what and when.

 

Organization changes

It is crucial that all elements are in order during an organizational change, without any problems and interruptions causing damage and delays to your organization. With OS GIR, you get a planning tool where changes can be created in advance, where you can inspect, edit and quality check all the details before the change launces.

 

Offboarding

Whenever collaborations expire or are terminated, OS GIR helps with terminating accesses at the right time across the IT-landscape.

Security by Design - Network Systems

Network systems - Limits

When applying cloud computing, it is crucial to have control of accesses. Therefore, OS GIR is developed with constraints, and via Site-to-Site VPN technology accesses are granted only to your connected employees and identities.

Security by Design - Legislation

Legislation

The European data protection regulation (GDPR) emphasizes that IT systems only fetch necessary data. Therefore, in OS GIR’s integrations to and from other source systems, we make sure to stay compliant with this regulation. OS GIR only fetches relevant data, securing a strong data flow across the IT landscape. Furthermore, it is possible to limit the users’ actions and insights in OS GIR. There is a necessary confidentiality barrier within the system, and any changes in this confidentiality are automatically saved and updated, securing the integrity. Everything is also regenerative, making it impossible for information to disappear or to be changed unintentionally.
Security by Design - Management supervision

Management supervision

A higher number of IT-systems present higher demands for control of rights and accesses for your employees. These demands can be hard and time consuming to deal with. The Network and Information Security Directory (NIS2) present a new directory that increases the demand for enforcement of the rules and regulations concerning cybersecurity and unifies the concerning sanctions. This directory also demands increased control and supervision in ones own organization, and with OS GIR you get a tool that brings this insight into each user’s accesses in different IT systems.