# Security of Pckgr

Pckgr is a secure SaaS platform designed to facilitate the deployment of applications to Microsoft Intune while prioritizing security at every stage.

Pckgr has built its own private repository for hosting applications, ensuring that all applications are sourced, stored, and delivered through verified, controlled, and secure channels. With a least privilege access model and cloud-hosted infrastructure, Pckgr provides a reliable and secure solution for organizations managing application deployments at scale.

## Granting Pckgr Permissions

Pckgr applies the principle of least privilege when requesting permissions to link to a customer’s Intune tenant. This ensures Pckgr only has access to the functionality required to deploy and update packages.

Pckgr does not have read or write access to end user accounts or user data within customer environments.

<figure><img src="https://2039453165-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F16V56CCiWnNRFvzQlrk2%2Fuploads%2FTHmv7eciUDIZTLnnyG5T%2FPermissions.png?alt=media&#x26;token=d4a6e40a-1d4c-406c-805d-3b223c6403d5" alt="" width="338"><figcaption></figcaption></figure>

## Access Control and Authentication

Pckgr enforces strong authentication and access control mechanisms to protect access to the platform.

* Single Sign-On (SSO) is supported via Microsoft Entra ID (Azure AD)
* Multi-Factor Authentication (MFA) is supported for both SSO and native authentication
* Role-Based Access Control (RBAC) is used to manage permissions
* Access can be restricted by company or tenant and scoped to specific applications and policies
* All access follows least privilege principles

These controls ensure users only have access to the resources required for their role.

## Application Packaging and Hosting

<details>

<summary><strong>Click to Read</strong></summary>

Pckgr ensures a secure application packaging and upload process by hosting all applications on servers in Microsoft Azure that are closed off from external access. These servers are regularly patched and do not have unnecessary third-party software installed.

Packages are hosted using an Azure Storage account that is only accessible to uploading servers and Azure Functions responsible for delivery. Premium Azure Functions are used to deliver packages to customer Intune tenants in a controlled and secure manner.

</details>

## Website Hosting: Amazon Web Services

<details>

<summary><strong>Click to Read</strong></summary>

Pckgr is hosted via Amazon Web Services (AWS).&#x20;

* AWS also has auditing capacity to monitor and detect activity and requests on the account.&#x20;
* AWS provides server-side encryption (with three key management options: SSE-KMS, SSE-C, SSE-S3) and also client-side encryption for data uploads.
* AWS supports checksum algorithms (SHA-1, SHA-256, CRC32, or CRC32C) to examine data integrity on user uploads and downloads.&#x20;
* AWS provides Trusted Advisor. It has three related checks:&#x20;
  * Logging configuration of Amazon S3 buckets
  * Security checks for Amazon storage buckets that have open access permissions
  * Fault tolerance checks for Amazon S3 buckets that don't have versioning enabled, or have versioning suspended
* Amazon storage objects, buckets and related sub-resources are confidential, only the AWS account that created it can access it.&#x20;

By using this premium database, Pckgr ensures security and maximum accessibility of the applications available.&#x20;

</details>

## Pckgr's Private Repository

<details>

<summary><strong>Click to Read</strong></summary>

Pckgr’s Private Repository ensures robust security by hosting all application installers on its private infrastructure within Microsoft Azure and AWS environments. These servers are isolated from external access, regularly patched, and protected with advanced encryption protocols, including server-side and client-side encryption, as well as integrity checks using SHA-256 algorithms.

Each application undergoes comprehensive malware scanning and version validation during packaging to ensure the integrity and reliability of deployments. By removing dependencies on external vendor URLs, this repository mitigates risks associated with broken links or malicious updates.&#x20;

Furthermore, access to hosted applications is controlled through secure delivery mechanisms like Azure Functions and Microsoft Delivery Optimization, providing a safe and efficient deployment experience while maintaining stringent compliance with data protection and privacy standards.

</details>

## GDPR Alignment:

Pckgr is an Australian-based company and understands the importance of aligning with GDPR regulations for the benefit of our customers based in the EU and UK. While GDPR imposes strict requirements on organizations handling personal data, many of its provisions do not directly apply to Pckgr's services because Pckgr does not access, process, or store company data, focusing instead on application deployment management. Here is how Pckgr maintains a minimal data footprint:

<details>

<summary><strong>Minimal Data Processing and Access</strong></summary>

Pckgr does not collect or process any customer data beyond what is strictly necessary for the operation of its services. Specifically:&#x20;

**Application Management Only:** Pckgr's core functionality is focused on deploying applications through Microsoft Intune and managing software updates. This process operates entirely within the customer's Intune environment, ensuring that Pckgr does not access, view, or store sensitive company data or end-user information.&#x20;

**No User Data Collection:** Pckgr does not access employee or user data within the organizations using its platform. All operations are limited to managing application packages and deployment workflows, which are handled without requiring access to personal or sensitive information.

</details>

<details>

<summary><strong>Use of GDPR-Compliant Third-Party Services</strong></summary>

Pckgr leverages reputable third-party providers to handle ancillary functions such as billing, hosting, and analytics. These providers are independently GDPR-compliant, ensuring that all data processing on behalf of Pckgr adheres to regulatory standards:&#x20;

**Billing (Stripe):** All payment data is securely processed by Stripe, a GDPR-compliant platform that employs advanced encryption and fraud monitoring. Pckgr does not store or access any payment details.

**Hosting (Azure and AWS):** Pckgr's application packages and infrastructure are hosted on Microsoft Azure and Amazon Web Services (AWS), both of which are GDPR-compliant and provide robust security measures, including encryption, access controls, and regular audits.&#x20;

**Analytics (Google Analytics):** Website usage data is collected anonymously using cookies and is managed in compliance with GDPR requirements. Users have the option to control cookie settings directly from their browsers.

</details>

<details>

<summary><strong>Customer Ownership of Data</strong></summary>

Pckgr emphasizes customer ownership and control over all data:&#x20;

**No Data Storage:** Pckgr does not store any customer data in its systems, aside from operational metadata necessary for service delivery, such as telemetry data for error tracking and subscription information.&#x20;

**Self-Contained Environments:** All deployments and configurations occur within the customer’s Microsoft Intune environment, ensuring complete isolation from Pckgr’s systems.

</details>

<details>

<summary><strong>Limited Applicability of GDPR</strong></summary>

Because Pckgr does not handle personal **or company data:**&#x20;

**Data Subject Rights (Access, Deletion, Portability):** GDPR rights, such as the right to access or delete personal data, are not typically applicable to Pckgr since no personal or sensitive customer data is processed or stored within its systems.&#x20;

D**ata Breach Notifications:** Pckgr’s limited data processing scope reduces the risk of data breaches. In the event of a breach affecting operational metadata (e.g., telemetry data), Pckgr would notify affected users within 72 hours, adhering to GDPR standards.

</details>

<details>

<summary><strong>Privacy by Design and Default</strong></summary>

Pckgr’s systems are built with privacy at their core:&#x20;

**Minimal Permissions:** Pckgr operates on the principle of least privilege, only requiring the permissions necessary to deploy and manage applications within Intune.&#x20;

**No Processing of User Data:** By design, Pckgr avoids any interaction with personal or sensitive user data.&#x20;

**Secure Infrastructure:** All hosted data and services are encrypted, patched regularly, and monitored for unauthorized access.

</details>

<details>

<summary><strong>Transparency and Accountability</strong></summary>

While Pckgr’s GDPR obligations are limited, the company maintains transparency and accountability by:&#x20;

* Clearly communicating its data practices through a privacy policy.&#x20;
* Leveraging GDPR-compliant third-party processors for all datahandling needs.&#x20;
* Ensuring that any metadata collected, such as telemetry data, is processed securely and retained only as long as necessary for operational purposes.

</details>

## Logging and Monitoring

Pckgr implements logging and monitoring across application and infrastructure layers.

* Authentication and access events are logged
* Administrative actions and configuration changes are tracked
* System and infrastructure activity is monitored using Azure and AWS tooling

Monitoring and alerting mechanisms are in place to detect unusual or unauthorized activity and support timely investigation.

***

## Incident Response

Pckgr maintains internal processes for identifying and responding to security incidents.

In the event of an incident, Pckgr will:

* Assess the scope and impact
* Contain and remediate the issue
* Notify affected customers where applicable

This ensures timely response and continuous improvement of security practices.

***

## Data Handling and Privacy

Pckgr follows a data minimization approach and only processes the data required to deliver its service.

#### Minimal Data Storage

Pckgr stores limited operational data including:

* Tenant identifiers
* User account information such as email and company name
* Application deployment metadata
* Platform activity logs

Pckgr does not store or process sensitive personal data or end-user data.

All deployments and configurations occur within the customer’s Microsoft Intune environment.

***

## Use of AI

Pckgr uses AI in a limited and controlled manner to support internal workflows such as application analysis and packaging automation.

* AI is only used on publicly available or internally generated data
* AI is not used on customer data or customer environments
* All AI-assisted outputs are manually reviewed and tested before deployment

Pckgr does not use customer data to train or improve AI models.

***

## **Subprocessors**

Pckgr uses a limited number of trusted third-party service providers (“subprocessors”) to support the delivery of its services. These subprocessors are selected based on their security posture and ability to meet industry-standard data protection requirements.

Pckgr ensures that all subprocessors are subject to appropriate contractual obligations, including confidentiality, security, and data protection requirements.

### **Current Subprocessors**

| Provider                  | Purpose                                                   | Data Processed                                                   | Location      |
| ------------------------- | --------------------------------------------------------- | ---------------------------------------------------------------- | ------------- |
| Microsoft Azure           | Application hosting, storage, and delivery infrastructure | Operational data (e.g. tenant identifiers, application metadata) | United States |
| Amazon Web Services (AWS) | Website and platform hosting                              | Operational data and system logs                                 | United States |
| Stripe                    | Billing and payment processing                            | Billing information (processed directly by Stripe)               | United States |

### **Data Processing Overview**

Pckgr follows a data minimization approach and does not process or store sensitive personal data as part of its core service. Subprocessors only receive access to data strictly necessary to perform their function.

### **Updates to Subprocessors**

Pckgr may update its list of subprocessors from time to time. Customers will be notified of material changes where required.

## Code Signing

Code signing is a security practice employed by our application to ensure the integrity and authenticity of the scripts used within it. This documentation section outlines the importance of code signing, its benefits, and provides instructions for downloading the public certificate associated with our code signing process.

### What is Code Signing?

Code signing is the process of digitally signing executable scripts and software components to verify their authenticity and integrity. It involves using a digital certificate, which is essentially a unique electronic identity document, to sign the code. The digital signature serves as a stamp of approval, indicating that the code has not been tampered with or maliciously modified since it was signed.

### The Benefits of Code Signing

By employing code signing, we enhance the security and trustworthiness of our application in the following ways:

1. **Authenticity:** Code signing allows users to verify that the scripts they receive are indeed from our trusted source, as the digital signature can be traced back to our organization.
2. **Integrity:** The digital signature acts as a tamper-evident seal. If the code has been altered in any way after signing, the signature verification process will fail, alerting users to potential tampering or unauthorized modifications.
3. **User Trust:** Code signing fosters user confidence by assuring them that our application has undergone rigorous security measures. Users are more likely to trust and install software that has been properly code signed.
4. **Protection against Malware:** Code signing helps protect users from downloading and executing malicious or unauthorized scripts. Most operating systems and security software systems will display a warning if the code is not signed or if the signature is invalid.

### Downloading the Public Certificate

To facilitate the verification process and allow users to independently verify the authenticity of our signed code, we provide the public certificate used for code signing. Download the Public Certificate here:

{% file src="<https://2039453165-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F16V56CCiWnNRFvzQlrk2%2Fuploads%2FAEW3pnzDxnQuyIVw5zr2%2FPckgrCert.cer?alt=media&token=2515b5c6-4c3a-411a-bcb9-430913fb2f7b>" %}

Note: As we have changed our code singing to start using DigiCert, the following new Public Certificate must also be added as all new packages will be signed with this:

{% file src="<https://2039453165-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F16V56CCiWnNRFvzQlrk2%2Fuploads%2FNE6iR14XDQOPxyGQJ9zC%2FPckgr_Public.cer?alt=media&token=5ecf0aea-996c-4c39-bbb3-7378e3873349>" %}

### Adding the Certificate to Trusted Publishers Local Machine Certificate Store

To establish a higher level of trust and ensure a smooth verification process, you can add the downloaded public certificate to the Trusted Publishers local machine certificate store on your operating system. This step helps your system recognize the certificate as a trusted source for code signing.

## Conclusion

Code signing plays a vital role in establishing trust and ensuring the integrity of our application's scripts. By employing this security measure, we aim to provide our users with reliable and secure software. If you have any further questions or concerns regarding code signing, please reach out to our support team for assistance.
