You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/technical-standards/Reference/Development-standards/Production Environment Tools & PII Handling.md
+18-16Lines changed: 18 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,37 +22,39 @@ Covers all development, testing, debugging, or API interaction tools used in pro
22
22
23
23
### Prohibited Use of Unvetted Tools
24
24
25
-
Developers must not use third-party tools to access production environments or handle production PII unless they have a clear and documented understanding of how the tool manages, stores, and transmits data, and are satisfied that its use aligns with Hackney’s security and data protection standards.
25
+
Developers **must not** use third-party tools to access production environments or handle production PII unless they have a clear and documented understanding of how the tool manages, stores, and transmits data, and are satisfied that its use aligns with Hackney’s security and data protection standards.
26
26
27
-
Where a new tool is approved for use, supporting evidence of this assessment must be recorded in the [Hackney Service Catalogue](https://docs.google.com/spreadsheets/d/1QoinQ9Yvlr4gvUoROYAA8vDWOWyXw7-vokZmPEH296A/edit?gid=1633075159#gid=1633075159) in columns Q to U.
27
+
Where a new tool is approved for use, supporting evidence of this assessment **must** be recorded in the [Hackney Service Catalogue](https://docs.google.com/spreadsheets/d/1QoinQ9Yvlr4gvUoROYAA8vDWOWyXw7-vokZmPEH296A/edit?gid=1633075159#gid=1633075159) in columns Q to U.
28
28
29
29
### Approval Process for New Tools
30
30
31
-
Before using any new tool for production data, developers must:
31
+
Before using any new tool in a production environment — particularly where it may interact with PII — developers **must** complete the [Developer Tool Assessment Checklist](https://forms.gle/j9fWxAHvHdMrZ8wq8).
32
32
33
-
- Obtain approval from the Head of Engineering.
34
-
- Add approved tools to the [Hackney Service Catalogue](https://docs.google.com/spreadsheets/d/1QoinQ9Yvlr4gvUoROYAA8vDWOWyXw7-vokZmPEH296A/edit?gid=1633075159#gid=1633075159), so that its use is documented and visible to relevant teams.
33
+
Once the checklist is submitted:
34
+
35
+
- The developer **must** notify the Head of Engineering, who will review the responses for overall suitability.
36
+
- If the tool is approved, the developer **must** add it to the [Hackney Service Catalogue](https://docs.google.com/spreadsheets/d/1QoinQ9Yvlr4gvUoROYAA8vDWOWyXw7-vokZmPEH296A/edit?gid=1633075159#gid=1633075159) along with all supporting evidence, such as privacy policies, configuration screenshots, or network behavior logs. This is so that its use is documented and visible to relevant teams.
35
37
36
38
### Assessment Criteria for Tool Approval
37
39
38
40
When assessing a tool for use in production environments with PII, the following minimum requirements apply:
39
41
40
-
1. The tool must not store request or response data in external or cloud environments unless this has been formally reviewed and approved.
41
-
2. If the tool stores data locally, it must provide controls to securely manage and delete this data.
42
-
3. The tool must encrypt data in transit (e.g. using HTTPS/TLS) when communicating with production systems.
43
-
4. If the tool stores data at rest (locally or remotely), it must use encryption for that stored data.
44
-
5. The tool must not retain sensitive data longer than necessary for the task being performed. Where the tool is cloud-based or connects to external services, it must provide a clear and accessible privacy policy explaining data retention periods, storage locations and third party access.
45
-
6. The tool must provide mechanisms to restrict access to sensitive data, such as user authentication and role-based access control, especially for tools used by multiple developers in differing teams.
46
-
7. Where the tool collects telemetry, usage data, or analytics, this functionality must be disabled.
47
-
- If this is not possible, the tool must be reviewed and approved before use with production systems or data.
48
-
8. Where audit logging exists within a tool, logging of sensitive data (such as request and response bodies) must be disabled.
49
-
- If this is not possible, the tool must be reviewed and approved before use with production systems or data.
42
+
1. The tool **must not** store request or response data in external or cloud environments unless this has been formally reviewed and approved.
43
+
2. If the tool stores data locally, it **must** provide controls to securely manage and delete this data.
44
+
3. The tool **must** encrypt data in transit (e.g. using HTTPS/TLS) when communicating with production systems.
45
+
4. If the tool stores data at rest (locally or remotely), it **must** use encryption for that stored data.
46
+
5. The tool **must not** retain sensitive data longer than necessary for the task being performed. Where the tool is cloud-based or connects to external services, it **must** provide a clear and accessible privacy policy explaining data retention periods, storage locations and third party access.
47
+
6. The tool **must** provide mechanisms to restrict access to sensitive data, such as user authentication and role-based access control, especially for tools used by multiple developers in differing teams.
48
+
7. Where the tool collects telemetry, usage data, or analytics, this functionality **must** be disabled.
49
+
- If this is not possible, the tool **must** be reviewed and approved before use with production systems or data.
50
+
8. Where audit logging exists within a tool, logging of sensitive data (such as request and response bodies) **must** be disabled.
51
+
- If this is not possible, the tool **must** be reviewed and approved before use with production systems or data.
50
52
51
53
# Communication and Developer Awareness
52
54
53
55
## Responsibility for Communication
54
56
55
-
The Head of Engineering must ensure this standard is communicated across all development teams, including internal staff, contractors, and third-party developers.
57
+
The Head of Engineering **must** ensure this standard is communicated across all development teams, including internal staff, contractors, and third-party developers.
0 commit comments