Our vulnerability management process is designed to remediate risks without customer interaction or impact. PlanHappy is notified of vulnerabilities through internal and external assessments, system patch monitoring, and third-party mailing lists and services. Each vulnerability is reviewed to determine if it is applicable to the environment, ranked based on risk, and assigned to the appropriate team for resolution.
New systems are deployed with the latest updates, security fixes, and configurations and existing systems are decommissioned as customers are migrated to the new instances. This process allows the environment to be kept up to date. Since customer tenants run in isolated environments, they are unaffected by these core system updates.
To further mitigate risk, each component type is assigned to a unique network security group. These security groups are designed to only allow access to the ports and protocols required for the specific component type. For example, user applications running within an isolated dyno are denied access to the management infrastructure as each is within its own network security group and access is not allowed between the two.