General information about the tool and IT security

Below, you will find an overview of the Ducky Challenge and IT security information.

General information

 

Processing of data: europe-west1 (Belgium)
Cloud Service Provider name: Google Cloud Platform
Country of origin of cloud Service Provider: United States
Service deployment UK, Norway, Canada
Nationality of personnel British, French, Canadian, Norwegian

Support of potential features

 

Supports authentication with centralized catalogue service N/A
Supports MFA authentication No
Supports role based authorization No
Supports labelling and tagging of information classification level No
Supports cryptography (network transmission, storage, disk) No
Traceability audit of user and administrative actions is logged N/A

Support of different systems

 

Supports latest operating systems available We actively test our tool on Windows, macOS, Linux, Android and iOS
Supports running on the most common client device types and platforms The tool can be used on smartphones, desktop, mac, etc.
Supports the most common web browsers You can find the full list of the latest operating systems covered by our tool here

Documentation

 

Product and support documentation is available in English As stated, product and support documentation is available in English

 

Can provide documentation of capacity and experience for relevant system and domain knowledge  
Has a structured and documented way of continuously working with and improving information security (ISMS) We run a yearly penetration test of the product ; as a result, security documentation is being provided and worked upon
Personally identifiable information managed according to GDPR (Data Processing Agreements, Databehandleravtaler) Privacy policy can be found here
Ducky is available for audit If the need arises, yes.
Are the systems/services developed and deployed according to a Secure Development Life Cycle process (SDLC)? We use an iterative, agile process, following CI/CD principles. As well as this, we use error handling software, and track the test coverage of our code

 

Delivered with an installation guide The organization will be onboarded by Ducky via materials and human support
Delivered with an administrators guide This is not relevant since no administrators are required to use the tool
Delivered with a users guide Help articles are available to the users of the tool
Delivered with a troubleshooting guide The users have access access to a support form if they are facing technical issues
Delivered with an integrations guide This is not relevant since integration is not part of our offering
All business, product and support documentation are available in English English versions are available

Other types of support

 

Supports user authentication through MS Active Directory and Azure AD  
Supports role-based user authorization through MS Active Directory and Azure AD  
Supports single sign-on through MS Active Directory and Azure AD  
Supports two-factor authentication  
Supports enforcement of password length, complexity, age and use of temporary passwords Passwords have to be at least 8 characters long
Supports labelling and tagging of information classification level  
System does not monitor or disclose software usage to external parties The app is not linked to any external parties
Supports role-based authorization (Applications that does not support authorization through AD or Azure AD) There is no role-based functionality in the solution
Audit trail of who did what when There is not such function in the app, so there is no need for such functionality
Supports log shipping to centralized SIEM No, the app doesn't support it
Supports minimum FIPS 140-2 level 1 validated encryption (network transmission, storage, disk) There is no company data transmitted or stored on the solution
Centralized management for de-centralized systems Not a de-centralized system

 

Supports Windows 10 It supports it
Supports Apple products (iOS, Mac) It supports it
Supports Linux versions. (Redhat, Ubuntu etc.) It supports it
Supports Android and IOS mobile devices It supports it
Supports mainstream browsers (Firefox, MS Edge, Chrome) It supports it
Fully functional without using Active X Active X not necessary
Fully functional without using Java Java not necessary
Supports Microsoft Systems Center for client distribution (CMS system)  
Fully functional without the need for 3rd party software to be downloaded and installed No 3rd party software needs to be installed
Fully functional without using system administrator rights No system administrators rights need to be used
Fully functional without special local firewall configurations It might depend on the organization's security system
Fully functional without using public cloud services such as Dropbox, Google Drive and OneDrive Such services are not needed to use the tool
Can operate through a VPN connection VNP connection should not impact the use of the tool
Optimized for a world wide user base through potentially high latency, low bandwidth networks As long as the internet connection is good, the users should not experience high latency
Support English as the user interface language, even on a foreign language OS install The tool is available in English
Supports running in a Citrix environment This is not part of the offering
Uses an encrypted communication protocol between client and server (Minimum FIPS-140-2-1) Communication is encrypted using private keys between client and servers
Client logs to trace irregular system behaviour is available This is not available.
No required exeptions for antivirus systems Antivirus systems should not impact the use of the tool

 

Supports latest virtualized Windows It supports it
Supports latest Linux / Unix It supports it
Supports latest MS SQL Runs in the cloud, no server needed
Supports latest IIS Runs in the cloud, no server needed
Does not use or rely on local built-in user accounts All access through cloud IAM
Does not require service accounts with administrative rights It doesn't require srvice accounts with administrative rights
Supports Windows managed service accounts Runs in the cloud, no server needed
Supports load balancing Runs in the cloud, no server needed
Supports zero downtime upgrades Runs in the cloud, no server needed
Supports zero downtime backup Runs in the cloud, no server needed
Has built-in mechanisms for disaster recovery Runs in the cloud, no server needed
Configurable built-in admin account name, if any Configuration is available in the tool
Configurable built-in admin account password Configuration is available in the tool
No locally stored passwords in configurations Passwords are encrypted
Supports redundancy and fault tolerant configurations Thia is not relevant
Documented required exeptions for antivirus systems This is not relevant
Logs to trace system behaviour is available When using the app, the users compete by loggin activities which leads to some behaviour tracking in the platform
Functionality to discover and trace irregular system behaviour is available