Cybersecurity
With SeqSphere+ version 10.5 we did (with fixing of several issues; all were non-critical) and will do proactive vulnerability assessments in preparation for the EU Cyber Resilience Act. Systematic threat modeling and white-box penetration tests will follow within the next 1-2 years. Critical updates will be communicated to all registered users via email, via our home-page, and within the software. With respect to cybersecurity the following topics next to required ports (see below) might be of interest:
- The password policy can be defined for the user accounts by the admin (by default no policy is set).
- The access logging can be enabled, that logs user logins, sample retrieval, storage, and deletion (by default it is disabled).
- The sample audit trail logs each modification for a sample, together with user login name and timestamp. The audit trail is always enabled. It is lost when the sample is deleted.
- The default database schemes does not contain database fields that might be critical for patient anonymity. By default all users that can edit project samples can add such fields. However, the user roles can be used to disallow users creating new fields (e.g., for patient data).
Ports and Services
The communication between SeqSphere+ Client and SeqSphere+ Server runs on port 8064 (port can be changed).
The server and client are communicating via https using a self-signed certificate that is created when the server is started for the first time (SHA-256 with RSA encrypting, 2048 bit).
For some (optional) functions the SeqSphere+ Client needs an Internet connection. The following hosts are connected:
Upload
Function
|
Host
|
Protocol, Port
|
Upload/download for SeqSphere+ license activation, alternatively activation by email possible |
act.ridom.de |
https, 443
|
Upload of alleles and optional metadata for cgMLST.org submissions and download of task templates |
nomenclature.seqsphere.de |
https, 443
|
Upload of spa-types and optional metadata for S. aureus spa-typing and download of spa-types |
spa.ridom.de |
https, 443
|
Upload of contigs for SARS-CoV-2 PANGO lineage typing The server does not store any result or sequence data |
tools.ridom.de |
https, 443
|
Upload of meta data for EBI ENA submission |
www.ebi.ac.uk |
https, 443
|
Upload of read data for EBI ENA submission (via FTP or Aspera) |
webin.ebi.ac.uk |
ftp, 21 or TCP/UDP, 33001
|
Download
Function
|
Host(s)
|
Protocol, Port
|
Download of SeqSphere+ software updates, index files for NCBI Genome Browser, and PubMLST.org MLST schemes |
www.ridom.de |
https, 443
|
Download of genomes from NCBI Genome |
www.ncbi.nlm.nih.gov |
https, 443
|
Download of read data from NCBI SRA |
trace.ncbi.nlm.nih.gov, sra-pub-run-odp.s3.amazonaws.com |
https, 443
|
Download of MLST schemes from PubMLST.org |
pubmlst.org, rest.pubmlst.org |
https, 443
|
Geocoding with GeoNames |
www.geonames.org |
http, 80
|
Additional Download required only for Linux
Function
|
Host(s)
|
Protocol, Port
|
Download of MOB-Suite database on Linux |
zenodo.org |
https, 443
|
The SeqSphere+ Server does not require any Internet connection.
Submission to cgMLST.org
The cgMLST.org Nomenclature Server (www.cgMLST.org) provides a global nomenclature for stable public cgMLST schemes, i.e. for Task Templates that were downloaded from the Task Template Sphere. If Samples are using those downloaded Task Templates they can be submitted to cgMLST.org.
If no submission of any data is wanted or allowed, then only local Task Templates must be used. Samples that are using only local Task Templates will not and cannot be submitted to cgMLST.org. Local Task Templates can be defined using the cgMLST Target Definer, or by converting public Task Templates into local ones.
Remote Access
By installing SeqSphere+, Ridom has by no means remote access to the user's local computer or SeqSphere+ database.
Remote access for training and support is usually done with Microsoft Teams.