{"id":4274,"date":"2017-12-19T03:09:53","date_gmt":"2017-12-19T03:09:53","guid":{"rendered":"http:\/\/fusionsol.wp.knows.live\/?page_id=4274"},"modified":"2025-10-02T09:58:40","modified_gmt":"2025-10-02T02:58:40","slug":"security-frame-work","status":"publish","type":"page","link":"http:\/\/www.fusionsol.com\/en\/security-frame-work\/","title":{"rendered":"Security Frame Work"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4274\" class=\"elementor elementor-4274\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f582025 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"6f582025\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74aa4376 elementor-widget elementor-widget-shortcode\" data-id=\"74aa4376\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"vc_row wpb_row vc_row-fluid dt-default\" style=\"margin-top: 0px;margin-bottom: 0px\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3><span style=\"color: #ff9900\">Security Frame Work<\/span><\/h3>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>1. User identification &amp; Authentication<\/p>\n<p style=\"padding-left: 30px\">1.1 Support unique user-ID assignment<\/p>\n<p style=\"padding-left: 30px\">1.2 Prevent sharing of user-ID, e.g. prohibit multiple log-on from different locations<\/p>\n<p style=\"padding-left: 30px\">1.3 Perform user-ID authentication before granting access to resources<\/p>\n<p style=\"padding-left: 30px\">1.4 Perform user-ID authentication before re-enabling the expired session<\/p>\n<p style=\"padding-left: 30px\">1.5 No display of sensitive information until user get authenticated<\/p>\n<p style=\"padding-left: 30px\">1.6 Support a local user-ID management [add, modify, delete, access right granting]<\/p>\n<p style=\"padding-left: 30px\">1.7 Automate log-off inactive user session (&lt;=15 minute inactive session)<\/p>\n<p style=\"padding-left: 30px\">1.8 Support single sign-on (e.g. ADFS)<\/p>\n<p style=\"padding-left: 30px\">1.9 Support Secure LDAP or other equivalent method<\/p>\n<p style=\"padding-left: 30px\">1.10 Support Two factors authentication for user log-on<\/p>\n<p style=\"padding-left: 30px\">1.11 Support IAM product<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>2. Password Configuration<\/p>\n<p style=\"padding-left: 30px\">2.1 Enforce alpha-numeric password with case sensitive<\/p>\n<p style=\"padding-left: 30px\">2.2 Enforce special character on top of alpha-numeric password with case sensitive<\/p>\n<p style=\"padding-left: 30px\">2.3 Render Application password unreadable on display, e.g. password masking<\/p>\n<p style=\"padding-left: 30px\">2.4 Render Application, DB, OS password unreadable in any source-code, relevant files or database by using a strong hash. If hashing is not technically possible then encryption can be used with at least AES256 encryption at minimum.<\/p>\n<p style=\"padding-left: 30px\">2.5 For Application that uses encryption method for password<\/p>\n<p style=\"padding-left: 30px\">2.6 Enforce password minimum length to 8<\/p>\n<p style=\"padding-left: 30px\">2.7 Enforce password history to 4<\/p>\n<p style=\"padding-left: 30px\">2.8 Enforce password age to 30 days<\/p>\n<p style=\"padding-left: 30px\">2.9 Lock User-ID after 6 failed password attempts<\/p>\n<p style=\"padding-left: 30px\">2.10 Enforce password change for the first-time log-on (if password is set by admin)<\/p>\n<p style=\"padding-left: 30px\">2.11 Prevent blank password<\/p>\n<p style=\"padding-left: 30px\">2.12 Do not use any default password during development and implementation. The password must be changed to be complex enough to prevent a brute force attack.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>3. User Authorization<\/p>\n<p style=\"padding-left: 30px\">3.1 Support role-base access (need-to-do basis)<\/p>\n<p style=\"padding-left: 30px\">3.2 Restrict direct query to the database, e.g. restricting by using GUI menu restriction<\/p>\n<p style=\"padding-left: 30px\">3.3 Provide the segregation of duties reviewing function.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>4. Audit trail requirement: The log must record the following items:<\/p>\n<p style=\"padding-left: 30px\"><strong>Application security log must record the following items:<\/strong><\/p>\n<p style=\"padding-left: 30px\">4.1 \" - Date and time of event<\/p>\n<p style=\"padding-left: 30px\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0- Type of event<\/p>\n<p style=\"padding-left: 30px\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0- Identity of user who caused the event \/ event source (IP Address, user ID)<\/p>\n<p style=\"padding-left: 30px\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0- the outcome (success or fail)\"<\/p>\n<p style=\"padding-left: 30px\">4.2 User management activities (add, delete, modify, authorization assignment)<\/p>\n<p style=\"padding-left: 30px\">4.3 Password management activities ( add, delete, modify, reset)<\/p>\n<p style=\"padding-left: 30px\">4.4 Log-on fail\/ Log-on success<\/p>\n<p style=\"padding-left: 30px\">4.5 Log-off activity<\/p>\n<p style=\"padding-left: 30px\">4.6 Attempt to perform privilege activity that is denied by application (failed activities)<\/p>\n<p style=\"padding-left: 30px\">4.7 Changing of security log parameter (add, delete, modify, reset log)<\/p>\n<p style=\"padding-left: 30px\"><strong>Centralized log management<\/strong><\/p>\n<p style=\"padding-left: 30px\">4.8 Deliver security log to the Customer centralize log management for a proper retention and monitoring. For example deliver log through syslog protocol.<\/p>\n<p style=\"padding-left: 30px\">4.9 Application path and files must be listed and submitted to IT security with indication of purpose and how critical it is.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>5. Information Transfer<\/p>\n<p style=\"padding-left: 30px\">5.1 Enforce encryption for sensitive data in transit by applying AES256 or RSA2048 key encryption at minimum. Example of sensitive data are user\/password, customer information and credit card number.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>6. Time synchronization<\/p>\n<p style=\"padding-left: 30px\">6.1 Support NTP time-synchronization with the authorized server [ or sync though OS system time]<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>7. Application Vulnerability protection<\/p>\n<p style=\"padding-left: 30px\">7.1 Submit the report done by independent party showing clean result for penetration testing or secure source code review.<\/p>\n<p style=\"padding-left: 30px\">7.2 SProvide white paper or written explanation showing all available security feature<\/p>\n<p style=\"padding-left: 30px\">7.3 Provide white paper or written explanation to show how the solution correspond to the OWASP top 10<\/p>\n<p style=\"padding-left: 30px\">7.4 Provide security vulnerability fixing without any additional cost as long as the maintenance agreement is valid.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>8. Data Masking<\/p>\n<p style=\"padding-left: 30px\">8.1 If it's not for any business purpose, Bank account number must be masked during display. At minimum, it must prohibit showing the first 5 digits.<\/p>\n<p style=\"padding-left: 30px\">8.2 If it's not for any business purpose, Customer citizen-ID must be masked during display. At minimum, it must prohibit showing the first 9 digits.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>9. Application supporting Financial information<\/p>\n<p style=\"padding-left: 30px\">9.1 Virtual keypad is used in OTP insert transaction<\/p>\n<p style=\"padding-left: 30px\">9.2 Support random virtual keypad<\/p>\n<p style=\"padding-left: 30px\">9.3 2 factor is used when committing important functions, e.g. customer information change, password change, transaction commit.<\/p>\n<p style=\"padding-left: 30px\">9.4 OTP life time is 5 minutes and must be specific to each transaction<\/p>\n<p style=\"padding-left: 30px\">9.5 OTP must be hard to guess.<\/p>\n<p style=\"padding-left: 30px\">9.6 Support out-of-band notification (Email and\/or SMS notification) for reporting committed transaction.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div>\n\t<div class=\"wpb_text_column wpb_content_element \" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>10. Before Deployment [subject to be reviewed by IT security team]<\/p>\n<p style=\"padding-left: 30px\">10.1 All internet-facing web application must be placed behind Web Application Firewall.<\/p>\n<p style=\"padding-left: 30px\">10.2 Application deployment script and deployment task is handed to IT security before deployment<\/p>\n<p style=\"padding-left: 30px\">10.3 Application user matrix and user management task will be prepared and handed to IT security before deployment.<\/p>\n<p style=\"padding-left: 30px\">10.4 Application solution must be developed and implemented according to the design approval from the IT solution committee.<\/p>\n<p style=\"padding-left: 30px\">10.5 Default password using by this solution must be changed<\/p>\n<p style=\"padding-left: 30px\">10.6 Application must pass Security Acceptance Test (SAT). All identified gaps are to be closed before deployment. SAT is normally composed of secure source code review, application scanning &amp; penetration testing, security requirement review [this sheet], review of regulator requirement (PCI-DSS, MAS, SO), infrastructure hardening and vulnerability assessment) - as considered by IT security<\/p>\n<p style=\"padding-left: 30px\">10.7 Application log is sent to the centralized management log.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47ca373 e-con-full e-flex e-con e-parent\" data-id=\"47ca373\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c9606bf e-con-full e-flex e-con e-child\" data-id=\"c9606bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e8f312 elementor-widget elementor-widget-heading\" data-id=\"1e8f312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Frame Work<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c036b02 e-con-full e-flex e-con e-child\" data-id=\"c036b02\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dcc4b2 elementor-widget elementor-widget-text-editor\" data-id=\"4dcc4b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Security Frame Work<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-055be91 elementor-widget elementor-widget-text-editor\" data-id=\"055be91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>1. User identification &amp; Authentication<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-997695a elementor-widget elementor-widget-text-editor\" data-id=\"997695a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>1.1 Support unique user-ID assignment<\/p><p>1.2 Prevent sharing of user-ID, e.g. prohibit multiple log-on from different locations<\/p><p>1.3 Perform user-ID authentication before granting access to resources<\/p><p>1.4 Perform user-ID authentication before re-enabling the expired session<\/p><p>1.5 No display of sensitive information until user get authenticated<\/p><p>1.6 Support a local user-ID management [add, modify, delete, access right granting]<\/p><p>1.7 Automate log-off inactive user session (&lt;=15 minute inactive session)<\/p><p>1.8 Support single sign-on (e.g. ADFS)<\/p><p>1.9 Support Secure LDAP or other equivalent method<\/p><p>1.10 Support Two factors authentication for user log-on<\/p><p>1.11 Support IAM product<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bdac78 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5bdac78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdc0167 elementor-widget elementor-widget-text-editor\" data-id=\"fdc0167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2. Password Configuration<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf7460d elementor-widget elementor-widget-text-editor\" data-id=\"cf7460d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2.1 Enforce alpha-numeric password with case sensitive<\/p><p>2.2 Enforce special character on top of alpha-numeric password with case sensitive<\/p><p>2.3 Render Application password unreadable on display, e.g. password masking<\/p><p>2.4 Render Application, DB, OS password unreadable in any source-code, relevant files or database by using a strong hash. If hashing is not technically possible then encryption can be used with at least AES256 encryption at minimum.<\/p><p>2.5 For Application that uses encryption method for password<\/p><p>2.6 Enforce password minimum length to 8<\/p><p>2.7 Enforce password history to 4<\/p><p>2.8 Enforce password age to 30 days<\/p><p>2.9 Lock User-ID after 6 failed password attempts<\/p><p>2.10 Enforce password change for the first-time log-on (if password is set by admin)<\/p><p>2.11 Prevent blank password<\/p><p>2.12 Do not use any default password during development and implementation. The password must be changed to be complex enough to prevent a brute force attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e16055a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e16055a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f958e49 elementor-widget elementor-widget-text-editor\" data-id=\"f958e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>3. User Authorization<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41bc58e elementor-widget elementor-widget-text-editor\" data-id=\"41bc58e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>3.1 Support role-base access (need-to-do basis)<\/p><p>3.2 Restrict direct query to the database, e.g. restricting by using GUI menu restriction<\/p><p>3.3 Provide the segregation of duties reviewing function.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76a4f19 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"76a4f19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a896933 elementor-widget elementor-widget-text-editor\" data-id=\"a896933\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>4. Audit trail requirement: The log must record the following items:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a25cb8 elementor-widget elementor-widget-text-editor\" data-id=\"1a25cb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \" style=\"margin: 0\"><div class=\"wpb_wrapper\"><p><strong>Application security log must record the following items:<\/strong><\/p><p>4.1 \u201d \u2013 Date and time of event<\/p><p>\u2013 Type of event<\/p><p>\u2013 Identity of user who caused the event \/ event source (IP Address, user ID)<\/p><p>\u2013 the outcome (success or fail)\u201d<\/p><p>4.2 User management activities (add, delete, modify, authorization assignment)<\/p><p>4.3 Password management activities ( add, delete, modify, reset)<\/p><p>4.4 Log-on fail\/ Log-on success<\/p><p>4.5 Log-off activity<\/p><p>4.6 Attempt to perform privilege activity that is denied by application (failed activities)<\/p><p>4.7 Changing of security log parameter (add, delete, modify, reset log)<\/p><p><strong>Centralized log management<\/strong><\/p><p>4.8 Deliver security log to the Customer centralize log management for a proper retention and monitoring. For example deliver log through syslog protocol.<\/p><p>4.9 Application path and files must be listed and submitted to IT security with indication of purpose and how critical it is.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-196c255 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"196c255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c88963 elementor-widget elementor-widget-text-editor\" data-id=\"1c88963\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>5. Information Transfer<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fee859f elementor-widget elementor-widget-text-editor\" data-id=\"fee859f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \" style=\"margin: 0\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>5.1 Enforce encryption for sensitive data in transit by applying AES256 or RSA2048 key encryption at minimum. Example of sensitive data are user\/password, customer information and credit card number.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4504d54 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4504d54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e1b1fe elementor-widget elementor-widget-text-editor\" data-id=\"4e1b1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>6. Time synchronization<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df90c7a elementor-widget elementor-widget-text-editor\" data-id=\"df90c7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \" style=\"margin: 0px\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>6.1 Support NTP time-synchronization with the authorized server [ or sync though OS system time]<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baefa25 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"baefa25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-149342e elementor-widget elementor-widget-text-editor\" data-id=\"149342e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>7. Application Vulnerability protection<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f185b2 elementor-widget elementor-widget-text-editor\" data-id=\"3f185b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \" style=\"margin: 0\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>7.1 Submit the report done by independent party showing clean result for penetration testing or secure source code review.<\/p><p>7.2 SProvide white paper or written explanation showing all available security feature<\/p><p>7.3 Provide white paper or written explanation to show how the solution correspond to the OWASP top 10<\/p><p>7.4 Provide security vulnerability fixing without any additional cost as long as the maintenance agreement is valid.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66ef3c9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"66ef3c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6030e67 elementor-widget elementor-widget-text-editor\" data-id=\"6030e67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>8. Data Masking<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a649ff4 elementor-widget elementor-widget-text-editor\" data-id=\"a649ff4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \" style=\"margin: 0\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>8.1 If it\u2019s not for any business purpose, Bank account number must be masked during display. At minimum, it must prohibit showing the first 5 digits.<\/p><p>8.2 If it\u2019s not for any business purpose, Customer citizen-ID must be masked during display. At minimum, it must prohibit showing the first 9 digits.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b2f47d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2b2f47d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-361d457 elementor-widget elementor-widget-text-editor\" data-id=\"361d457\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>9. Application supporting Financial information<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1989ac0 elementor-widget elementor-widget-text-editor\" data-id=\"1989ac0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \" style=\"margin: 0\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>9.1 Virtual keypad is used in OTP insert transaction<\/p><p>9.2 Support random virtual keypad<\/p><p>9.3 2 factor is used when committing important functions, e.g. customer information change, password change, transaction commit.<\/p><p>9.4 OTP life time is 5 minutes and must be specific to each transaction<\/p><p>9.5 OTP must be hard to guess.<\/p><p>9.6 Support out-of-band notification (Email and\/or SMS notification) for reporting committed transaction.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77dafcb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"77dafcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf1c394 elementor-widget elementor-widget-text-editor\" data-id=\"cf1c394\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>10. Before Deployment [subject to be reviewed by IT security team]<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca9feae elementor-widget elementor-widget-text-editor\" data-id=\"ca9feae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \" style=\"margin: 0\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>10.1 All internet-facing web application must be placed behind Web Application Firewall.<\/p><p>10.2 Application deployment script and deployment task is handed to IT security before deployment<\/p><p>10.3 Application user matrix and user management task will be prepared and handed to IT security before deployment.<\/p><p>10.4 Application solution must be developed and implemented according to the design approval from the IT solution committee.<\/p><p>10.5 Default password using by this solution must be changed<\/p><p>10.6 Application must pass Security Acceptance Test (SAT). All identified gaps are to be closed before deployment. SAT is normally composed of secure source code review, application scanning &amp; penetration testing, security requirement review [this sheet], review of regulator requirement (PCI-DSS, MAS, SO), infrastructure hardening and vulnerability assessment) \u2013 as considered by IT security<\/p><p>10.7 Application log is sent to the centralized management log.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Frame Work Security Frame Work 1. User identification &amp; Authentication 1.1 Support unique user-ID assignment 1.2 Prevent sharing of user-ID, e.g. prohibit multiple log-on from different locations 1.3 Perform user-ID authentication before granting access to resources 1.4 Perform user-ID authentication before re-enabling the expired session 1.5 No display of sensitive information until user get&hellip;<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-4274","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Frame Work - Fusion Solution<\/title>\n<meta name=\"description\" content=\"Security Frame Work\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fusionsol.com\/en\/security-frame-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Frame Work - Fusion Solution\" \/>\n<meta property=\"og:description\" content=\"Security Frame Work\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fusionsol.com\/en\/security-frame-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Fusion Solution\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fusion.solution\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-02T02:58:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/security-frame-work\\\/\",\"url\":\"https:\\\/\\\/www.fusionsol.com\\\/security-frame-work\\\/\",\"name\":\"Security Frame Work - Fusion Solution\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/#website\"},\"datePublished\":\"2017-12-19T03:09:53+00:00\",\"dateModified\":\"2025-10-02T02:58:40+00:00\",\"description\":\"Security Frame Work\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/security-frame-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fusionsol.com\\\/security-frame-work\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/security-frame-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fusionsol.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Frame Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/#website\",\"url\":\"https:\\\/\\\/www.fusionsol.com\\\/\",\"name\":\"Fusion Solution\",\"description\":\"Business Innovation Provider\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fusionsol.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/#organization\",\"name\":\"Fusion Solution\",\"url\":\"https:\\\/\\\/www.fusionsol.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.fusionsol.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2020\\\/04\\\/FusionLogo.png\",\"contentUrl\":\"https:\\\/\\\/www.fusionsol.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2020\\\/04\\\/FusionLogo.png\",\"width\":249,\"height\":249,\"caption\":\"Fusion Solution\"},\"image\":{\"@id\":\"https:\\\/\\\/www.fusionsol.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/fusion.solution\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCYhatfvclBLCGPdNCyX7EZg\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Frame Work - Fusion Solution","description":"Security Frame Work","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fusionsol.com\/en\/security-frame-work\/","og_locale":"en_US","og_type":"article","og_title":"Security Frame Work - Fusion Solution","og_description":"Security Frame Work","og_url":"https:\/\/www.fusionsol.com\/en\/security-frame-work\/","og_site_name":"Fusion Solution","article_publisher":"https:\/\/www.facebook.com\/fusion.solution\/","article_modified_time":"2025-10-02T02:58:40+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fusionsol.com\/security-frame-work\/","url":"https:\/\/www.fusionsol.com\/security-frame-work\/","name":"Security Frame Work - Fusion Solution","isPartOf":{"@id":"https:\/\/www.fusionsol.com\/#website"},"datePublished":"2017-12-19T03:09:53+00:00","dateModified":"2025-10-02T02:58:40+00:00","description":"Security Frame Work","breadcrumb":{"@id":"https:\/\/www.fusionsol.com\/security-frame-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fusionsol.com\/security-frame-work\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fusionsol.com\/security-frame-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fusionsol.com\/"},{"@type":"ListItem","position":2,"name":"Security Frame Work"}]},{"@type":"WebSite","@id":"https:\/\/www.fusionsol.com\/#website","url":"https:\/\/www.fusionsol.com\/","name":"Fusion Solution","description":"Business Innovation Provider","publisher":{"@id":"https:\/\/www.fusionsol.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fusionsol.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fusionsol.com\/#organization","name":"Fusion Solution","url":"https:\/\/www.fusionsol.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fusionsol.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.fusionsol.com\/wp-content\/uploads\/sites\/2\/2020\/04\/FusionLogo.png","contentUrl":"https:\/\/www.fusionsol.com\/wp-content\/uploads\/sites\/2\/2020\/04\/FusionLogo.png","width":249,"height":249,"caption":"Fusion Solution"},"image":{"@id":"https:\/\/www.fusionsol.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fusion.solution\/","https:\/\/www.youtube.com\/channel\/UCYhatfvclBLCGPdNCyX7EZg"]}]}},"_links":{"self":[{"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/pages\/4274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/comments?post=4274"}],"version-history":[{"count":5,"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/pages\/4274\/revisions"}],"predecessor-version":[{"id":37352,"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/pages\/4274\/revisions\/37352"}],"wp:attachment":[{"href":"http:\/\/www.fusionsol.com\/en\/wp-json\/wp\/v2\/media?parent=4274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}