Security

Secure Server Environments

LISPAT is installed exclusively on proven, industry-standard server operating systems: Microsoft Windows Server and Debian Linux. Both platforms are maintained by large organizations with long-term support and vibrant user communities.

All server installations follow best practices in security – covering physical, system, and network protection. Stored data is handled with integrity and confidentiality in mind.

Security illustration

Data and Communication Encryption

LISPAT uses PostgreSQL with a secure communication layer. All data transmitted between system components is protected against interception.

All user connections to LISPAT are established over encrypted channels (e.g., HTTPS/TLS), ensuring confidentiality of transmitted information.

VPN Security

For even stronger protection, we offer dedicated VPN tunnels connecting workstations with the LISPAT server. This ensures that all communication takes place within a private, secure tunnel isolated from the public internet.

Security in the WEB Module

The LISPAT WEB module is designed with modern web application security in mind. It includes protections against:

  • XSS (Cross-site scripting),
  • SQL Injection,
  • CSRF (Cross-site request forgery),
  • Session fixation,
  • Directory traversal,
  • and other OWASP Top 10 vulnerabilities.

Password Strength and Enforcement

LISPAT enforces strong user passwords that meet minimum length and complexity requirements – including special characters, numbers, and capital letters – improving resistance to brute-force and dictionary attacks.

Login Attempt Protection

The system monitors login attempts and automatically blocks IP addresses after too many failed authentication attempts – effectively countering brute-force attacks.

Geographic Access Control

LISPAT allows geoblocking – access can be restricted from countries or regions with high levels of hacking activity, significantly increasing data protection.

IP Whitelists and Blacklists

System administrators can define:

  • IP whitelists – specifying who is allowed to connect,
  • IP blacklists – blocking access from specific addresses or networks.
This gives administrators full control over system access.

Automated Backups

LISPAT includes a dedicated backup module that can be integrated into the server’s task scheduler. The module performs:

  • a full database backup once per day,
  • an incremental backup of electronic documents (e.g., scans, PDFs).

Both backups are automatically compressed and password-encrypted, ensuring data confidentiality even if physically intercepted. This makes recovery after failure fast and compliant with business continuity requirements.

Recommended Local Security Practices

Beyond system-level protection, we recommend implementing good practices on user devices:

  • Keep operating systems and software up to date,
  • Restrict work computers to professional use only,
  • Use strong login passwords and screen locks,
  • Install antivirus software and firewalls,
  • For larger institutions – deploy enterprise-class solutions such as:
    • EDR (Endpoint Detection and Response),
    • SIEM (Security Information and Event Management),
    • DPI (Deep Packet Inspection),
    • centralized password and access policy management (Active Directory, LDAP),
    • automated updates and endpoint monitoring.

Ta strona używa plików cookie w celach analitycznych. Korzystając ze strony, zgadzasz się na ich użycie. Czytaj więcej