Skip to main content

Security Self Assessment

Versão: Março de 2023

Histórico do documento

DataDescriçãoAutorRevisores
Março de 2023Atulizar data ultimo PentestJHSRAT
Fevereiro de 2023Inclusão novas questõesJHSRAT
Março de 2021Inclusão novas questõesJHSSIBS, RAT

Self Assessment - Security Questionnaire

Name of Company: Woovi / Woovi LLC

Applications: In scope for this Security Questionnaire

Woovi is a instant payment provider

Primary Contact for Security

Name: Infosec Team

Email: security (at) woovi.com

Secondary Contact for Security

Name: Sibelius Seraphini

Job Title: CTO

Email: sibelius (at) woovi.com

Tertiary Contact for Security

Name: Rafael Turk

Job Title: CoFounder

Email: rafael (at) woovi.com

Company Information

QuestionComments
Geographic Country location of employees, including contractors with access to production infrastructure and applicationsBrazil
Company Certifications and Accreditations e.g. ISO, SAS-70, PCI DSS, HIPAA or otherCertification is in progress expected for 4Q
Regulatory compliance requirements and industry standardsBrazil LGDP
Data Center InformationAWS
Data Center Country LocationGRU - AWS GRU - São Paulo Region
Who is responsible for the data center facility?Cloud based, AWS
Who is responsible for system administration? Also, note any Third party companies for Data Center Hosting and OperationsWoovi
Any Third party companies have access to Data Center Hosting and Operations?No. Restricted to Woovi
Give details of the facility’s data center security and business continuity resources e.g. closed room, physical access controls, card reader, video surveillance, power, cooling, etc.AWS managed
Security Practices In your solution do you test for OWASP and other vulnerabilities?Yes.

Product information

QuestionComments
Does your solution involve PII/Sensitive data originating from Cloud Software as a Service (SaaS)?Yes.
The platform may use Customer data originating from Cloud Services (Saas) to authorize payments transactions?Yes. This is a core feature of the platform
Does your solution store retrieve PII/Sensitive data in Cloud Services (SaaS, PaaS)?Yes.
Ecommerce plugins may pass Customer Name and TaxID to enrich payment information
Gateway may use Customer data originating from Cloud Services (Saas) to authorize payments transactions.Yes.
Does your solution retrieve PII/Sensitive data from on-premise applications?N/A
Our platform don't have any onpremisse solutions.
Gateway may use Customer data originating from Cloud Services (Saas) to authorize payments transactions.Yes.
Do you have a mobile application that persists PII/Sensitive data on the device?N/A.
Our platform don't use any kind of Mobile Apps.

Web App information

QuestionComments
Does your solution implement CORS Support?Yes.
Across all apps, and all domain properties.
Do you use a digital certificate to encrypt data communication?Yes.
Across all domain properties.
Do you use Application firewall (WAF) to detect and block intrusion attempts?Yes.
Multiple layers across all domain properties.
Do you use load balancers?Yes.
We use load balancers, plus multiple datacenter locations (Datacenter Zones) to support High availability.
Do you have a process to discover and track security vulnerabilities and corrective measures in Open Source or 3rd party software your deliverables have a dependency on?Yes.
We have an internal Blue Team and Red Teams. Additional external third party security review, via independent partner every quarter
Do you have a channel for external researchers to report security vulnerabilities to your directly?Yes.
via email at [email protected] or [email protected]
Do you support Security.txt?Yes.
https://woovi.com/.well-known/security.txt

Customer Security

QuestionComments
Do you have a process to notify your customers about security vulnerabilities and distribute security patches in your deliverables?Yes.
Do you have a process to notify your customers about security vulnerabilities in Open Source that your deliverables include?Yes.

Vendor security

QuestionComments
Do you have a process to validade your vendors?Yes.
Vendor Policy

Pentest

QuestionComments
Do you perform regular pentests?Yes.
We perform several automated pentests with software based external audit tools and multiple internal pentests with our on internal infosec team.
Do you perform regular independet (third party)?Yes.
We perform several external via third party infosec companies.
When was the last external (via independent partner) pentest?Last pentest was performed in January 2023.

Training and awareness

QuestionComments
Your business has regular information security awareness training for all staff, including temporary, locum or contracted employees, to ensure they are all aware of and fulfil their responsibilities.Partially implemented.