Sandbox Guidelines B39bcce23e
Sandbox Guidelines B39bcce23e
Sandbox
Enabling Framework
V1.0
18 August 2020
National Digital
Health Mission
GLOSSARY
Sandbox Because there are boundary conditions – the risk is minimized and the
emphasis is on feedback, learning and compliance to defined standards
required to become a part of NDHM. This will provide an opportunity to
“identify, understand, adapt, and respond to these disruptive new products
and services” in a timely and appropriate fashion.
The environment will allow for both alpha as well as beta testing of the
products, and accesses to NDHM ecosystem shall be primarily through the
sandbox.
8. Certification Process
8.1.1. With new global demands for Security and Quality, the need for software
product assurance is becoming more important. There are essentially two
approaches that can be followed to ensure product quality, one being assurance
of the process by which the product is developed, and the other being the
evaluation of the quality of the end-product. Both approaches are important, and
both require the presence of a system for managing quality.
8.1.2. NDHM has engaged with Ministry of Electronics and Information Technology,
Government of India to verify, validate and certify products/solutions who have
onboarded with the NDHM Sandbox and shall be going live with the products,
with mandatory integration of NDHM building blocks through APIs.
8.1.3. Standardization Testing and Quality Certification Directorate (STQC) shall be the
organization responsible for ensuring the certification of the software/product
with NDHM before it is rolled out in the open market. The certification/audit of
the product shall be mandatory and shall be undertaken by STQC/empanelled
vendors under STQC.
8.1.4. STQC offers testing for IT products and a variety of Software verification and
Validation services. They are provided with well-trained manpower, state- of-
the-art testing laboratories including software testing tools and office
infrastructure. They act as a single point focus to provide third party validation
services.
8.1.5. The following process shall be followed:
a) The organizations receiving clearance certificate from the HTC at NDHM
shall reach out to STQC/empanelled vendor for certification/audit of the
solution/product.
b) The STQC/empanelled vendor shall complete the audit within reasonable
period from the date of receipt of access/credentials.
c) Once the audit report is shared by STQC/empanelled vendor, any changes
asked for shall be done by the concerned organization and re-submit the
solution/product for second level of audit.
d) If any functional/policy level issues are highlighted, or issues are highlighted
which may have an impact on the components/building blocks of NDHM,
STQC shall inform NDHM and it will be taken up by the HTC/product teams
at NDHM.
e) The process as mentioned in point b and c as mentioned above shall be
followed for each iteration of audit, till 5 iterations.
f) If a product does not clear the audit in 5 iterations, it will be deemed
rejected, and a new application needs to be filed in each such case by the
organization.
g) The cost of audit shall be borne by the organization. The maximum cost
/ceiling shall be pre-defined, jointly finalized by MeitY and NDHM.
h) A certification/audit checklist shall be issued by STQC with the exact steps
defined for the certifications/audits. The following is a non-exhaustive list of
items that shall be checked during the audit:
1. The application/software/product has been placed in protected zones
with implementation of firewalls and IDS (Intrusion Detection System)
and high availability solutions.
2. Before launch of the application/software/product, simulated
penetration tests have been conducted. Penetration testing has also
been conducted <x times> after the launch of the
application/software/product.
3. The application/software/product has been audited for known
application level vulnerabilities before the launch and all the known
vulnerability has been addressed.
4. Hardening (as and where needed) of servers has been done before the
launch of the application/software/product.
5. Access to web servers hosting the application/software/product is
restricted both physically and through the network as far as possible,
the servers reside in India, and no data is shared out of India.
6. Logs at <x number> different locations are maintained for authorized
physical access of application/software/product servers.
7. Web servers hosting the application/software/product are configured
behind IDS, IPS (Intrusion Prevention System) and with system firewalls
on them.
8. Encryption is enabled wherever required
9. Secure storage devices are utilized
10. Enablement of automatic wiping of lost or stolen devices
11. Secure Sockets Layer (SSL) in place when using the Internet to ensure
secure data transfers
12. Secure email gateways ensuring data is emailed securely
13. All the development work is done on separate development
environment and is well tested on staging server before updating it on
the production server.
14. After testing properly on the staging server, the applications are
uploaded to the production server using SSH and VPN through a single
point.
15. The content contributed by/from remote locations is duly authenticated
& is not published on the production server directly. Any content
contributed to go through the moderation process before final
publishing to the production server.
16. All contents/data of the pages are checked for intentional or
unintentional malicious content before final upload to web server
pages.
17. Audit and Log of all activities involving the operating system, access to
the system, and access to applications are maintained and archived. All
rejected accesses and services are logged and listed in exception reports
for further scrutiny.
18. Help Desk staff at the HTC monitor the application/software/ product at
intervals of <frequency> to check the system to confirm that the
application is up and running, that no unauthorized changes have been
made, and that no unauthorized links have been established.
19. All newly released system software patches; bug fixes and upgrades are
expeditiously and regularly reviewed and installed on the
web/application server.
20. On Production servers, Internet browsing, mail and any other desktop
applications are disabled. Only server administration related task is
performed.
21. Server passwords are changed at the interval of <x number> months and
are shared by <y number> persons <a name> and <b name>.
22. <a name> and <b name> have been designated as Administrator for the
application/software/product and shall be responsible for
implementing certification requirements for each of the servers. The
administrator shall also coordinate with the Audit Team for required
auditing of the server(s).
23. The application/software/ product has been re-audited for the
application level vulnerability after major modification in application
development [Not applicable at first launch].
24. CIA Model:
i. Confidentiality: Ensures that information is not accessible to
unauthorized people—usually by enabling encryption—which is
available in many forms.
ii. Integrity: Protects data and systems from being modified by
unauthorized people; making sure that data has integrity and was
not changed between the time you created it and the time it arrives
at its intended party.
iii. Availability: Ensures that authorized people can access the
information when needed and that all hardware and software is
maintained and updated when necessary.
25. Preventive security controls, designed to prevent cyber security
incidents
26. Detective security controls, aimed at detecting a cyber security breach
attempt (“event”) or successful breach (“incident”) while it is in
progress, and alerting cyber security personnel
27. Corrective security controls, used after a cyber security incident to help
minimize data loss and damage to the system or network, and restore
critical business systems and processes as quickly as possible
(“resilience”)
28. Technical controls such as multi-factor user authentication at login
(login) and logical access controls, antivirus software, firewalls
29. Compliance controls such as privacy laws and cyber security frameworks
and standards.
8.1.6. The Audit for the organizations participating in the sandbox shall be done as per
the checklist finalized by NDHM.