Capitalised terms not otherwise defined herein have the meanings assigned to them in the DPA.
This Annex A addresses the technical and organisational measures, including practical safeguards and technical security measures, that Marzipan maintains to (a) secure the Customer Data against accidental or unlawful loss, access or disclosure; (b) identify reasonably foreseeable and internal risks to security and unauthorised access to the Services, including the Customer’s Marzipan account; and (c) minimise security risks, including through risk assessment and regular testing. Marzipan will designate one or more employees to be accountable for and respond to any questions on the information security practises and measures described below.
-
UpCloud and Hetzner Online Servers
UpCloud
According to Article 28(3)(c) UK GDPR, Marzipan is required to choose a cloud computing processor that provides sufficient guarantees of its ability to meet the data security measures outlined in Article 32 UK GDPR.1
We have selected UpCloud to be our principal hosting provider, infrastructure partner and cloud computing processor for the production versions of the Marzipan and Labls applications based on a careful selection process, considering legal, organisation and technical measures. We chose UpCloud because their IT architecture and infrastructure has been certified as being designed and managed in accordance with industry-leading best practises and security standards including:
- ISO 9001 Quality management
- ISO 14001 Environmental management
- ISO 22301 Security and resilience
- ISO 27001 Information security management
- ISO 50001 Energy management
- SOC 2 Type II Data security and privacy
- PCI-DSS Information security
To ensure compliance with the 'Schrems II' ruling by the Court of Justice of the EU (CJEU) in July 2020, all Customer Data hosted with UpCloud is hosted at UpCloud's DE-FRA1 data centre in Frankfurt, Germany.
UpCloud
Marzipan has chosen Hetzner Online as a reliable partner to provide it with additional dedicated server space. Hetzner Online is certified in accordance with DIN ISO/IEC 27001 standards. Furthermore, the internationally recognised standard for information security certifies that Hetzner Online has established and implemented an appropriate Information Security Management System ("ISMS").
Hetzner Online utilises the ISMS in its infrastructure and operations at both German data centre locations in which Marzipan leases dedicated server space, namely the Nuremberg and Falkenstein data centre parks. FOX certification, a third-party certification authority, has audited and certified Hetzner Online’s data centre parks’ ISMS processes.
-
Encryption
An essential core element of Marzipan’s security measures is encryption of data both in rest and in transit. All external network communication between customers and the Marzipan application over public networks using Transport Layer Security ("TLS") 1.2 or higher. Customer Data stored on Marzipan’s UpCloud and Hetzner Online servers are encrypted using AES 256 or higher.
Marzipan uses the UpCloud’s and Hetzner Online’s respective encryption service to encrypt Customer Data.
The UpCloud encryption system is designed so that no one, including Marzipan or UpCloud staff, can access the plaintext encryption keys. UpCloud uses hardware security modules ("HMS") that have been or are currently validated in accordance with FIPS 140-2 to protect the conflict of the plaintext keys used to encrypt the Customer Data. All cryptographic keys are automatically rotated once a year.
Hetzner Online’s full-disk encryption uses AES 256 encryption algorithms and mandatory authentication processes to encrypt all software and hardware-based drives that are stored on its dedicated servers. This minimises the risk of data loss and unauthorised access to Customer Data.
Marzipan’s systems use transport encryption whenever data needs to be transferred over an insecure or public network. The web-interface and all APIs connected to the Marzipan application are only accessible via HTTPs connections, and client systems must use at least TLS 1.2 to access the Marzipan system.
-
Restriction of server locations to the EEA/EU
Marzipan stores data exclusively in the EEA, namely at UpCloud’ data centres in Frankfurt, Germany and Hetzner Online’s data centres in Nuremberg and Falkenstein, Germany.
This is to best ensure that customer data cannot be used or disclosed without authorisation, particularly in light of the European Court of Justice’s Schrems II judgement of 16 July 2020, and data protection experts’ concerns regarding the advent of data surrender laws in the United States and other non-EEA justifications.
-
Logging/Audit Trail
Marzipan uses logging in its UpCloud environments for several areas. These include:
- System events;
- Error logging;
- User activity;
- Logins and requests to database systems;
- Other security-related events/audit logging.
-
Monitoring
Marzipan uses various monitoring tools to ensure maximum availability and performance of the Marzipan systems and application. These monitor at least the following parameters:
Availability
- Accessibility of the application
- Accessibility of backend systems and services
Resources
- CPU utilisation
- Utilisation of network interfaces
- Utilisation of persistent and volatile interfaces
Performance
- Application response times
- Response times of back-end systems
- Query times for MySQL database content
Security
- DS performance
- Update status of systems
Monitoring
- Error logs
- Access logs
In addition to this automated monitoring, Marzipan employees monitor relevant online media and blogs (including the OWASP updated referenced above) to be able to react to them promptly.
-
Access Control
Marzipan assigns its employees and contractors with different levels of access control for its systems and services on UpCloud and Hetzner Online’s servers. These are managed through UpCloud’ and Hetzner Online’s respective Identity and Access Management (IAM) systems, which enable a fine granulation of access to different services.
The overriding principle for Marzipan when assigning rights to its personnel is "need-to-know." In practice, this means that Marzipan staff are only given access to those functions they need to perform their jobs. Access to bank-end systems is only possible via secure and authenticated connections. Public release of back-end systems is prohibited. Only a strictly limited number of Marzipan personnel have access to the system that stores customer data. This direct access is exclusively for error analysis and is monitored.
- Article 32 of the UK GDPR requires controllers and processors to adopt a risk-based approach to data security. It requires controllers and processors to "ensure a level of security appropriate to the risk". The purpose of a risk-based approach is to assess the potential risks inherent in a particular activity and identify and implement mitigation techniques to control and minimise any potential impacts. ↩