| Application control | Prevent unapproved executables, libraries, scripts, and installers from running on workstations and servers. | Production runs as minimal container images on hardened hosts with non-root users, read-only filesystems where possible, and no shell access in running containers. Development laptops run vendor-provided OS and are restricted to store-installed applications. |
| Patch applications | Apply security patches to operating systems and applications within two weeks of release, and within 48 hours for internet-facing services if an exploit exists. | Runtime dependencies pinned in lockfiles and rebuilt weekly. Critical CVE advisories (Snyk / GitHub Dependabot alerts) trigger out-of-band patches within 48 hours. Base container images rebuilt on upstream publish. |
| Configure Microsoft Office macro settings | Block Office macros from the internet; allow only digitally signed macros or macros from trusted locations. | Not applicable — Mustr does not process or execute Microsoft Office documents on the server side. Staff macOS/Windows workstations default to blocking macros from the internet per vendor defaults. |
| User application hardening | Disable web-browser features and plugins that are exploitable (Flash, Java, ads, auto-exec). | Staff workstations run current Chrome/Safari/Firefox only. Flash and Java browser plugins are not installed. An ad-blocker and tracker-blocker are deployed on all staff browsers. |
| Restrict administrative privileges | Privileged accounts used only for privileged work; regular reviews; separate from day-to-day email/browsing. | Production database administrative access is broken-glass only and requires out-of-band approval. The application connects as a restricted role that cannot disable row-level security. No persistent SSH sessions; infrastructure changes go through version-controlled scripts. |
| Patch operating systems | Apply OS patches within two weeks of release and within 48 hours for known exploited vulnerabilities. | Hosts run the latest LTS Ubuntu with unattended-upgrades enabled for security patches. Managed database and cache services are upgraded by the provider on their published cadence. |
| Multi-factor authentication | Multi-factor authentication for all users of internet-facing services, and for privileged actions on internal systems. | Staff accounts on GitHub, the hosting provider, Stripe, and domain registrar all require MFA (hardware key where available, TOTP otherwise). Customer-facing MFA on Mustr sign-in is on the roadmap; passwordless email sign-in and WebAuthn step-up are being evaluated. |
| Regular backups | Daily backups of important information, software, and configuration settings, retained for at least three months, tested regularly. | Managed PostgreSQL snapshots taken daily and retained 30 days. Application configuration is managed in version control. Restore-to-staging is tested at least quarterly; see the Backup & Restore section below. |