We have pooled our security knowledge and lessons learnt over the past two decades to bring you a new white paper: [[https://www.papercut.com/kb/Main/SecurityWhitepaper|Securing your Print System]]. This paper provides practical and tested advice on how to secure your print system end-end from before a print job is printed, through securing the print workflow
to safeguarding your printed documents. the
PaperCut has been developed from day one with security in mind. With its roots in education and with the full understanding that college kids “like to hack”, PaperCut’s development processes continually focused on security. At the core of this is the open source code based culture where
majority of PaperCut’s source code is made available to customers. The code has been reviewed by leading education organizations. An example of this was an independent security expert working for a college found an [[http://en. wikipedia.org/wiki/Cross-site_request_forgery|XSRF]] (Cross-site request forgery) security issue during a review in 2008. This issue was fully disclosed and quickly addressed in subsequent release by the PaperCut development team..
At a software-level PaperCut leverages Active Directory security groups for access control
Administrators can be setup with different levels of access. For example, system administrators may have access to all features, while office staff are limited to reports and a sub-set of features such as account management. PaperCut uses SSL/HTTPS for communication and remote web based administration ensuring sensitive data like passwords and account information is secured over the network. Internal passwords, if used, are stored in a [[http://en.wikipedia.org/wiki/Bcrypt|BCrypt]] hashed format which is seeded by username and salted with a random salt. All security related development is internally assessed and R&D is conducted to ensure we're meeting best practice. .
PaperCut also leverages a number of 3rd party components such as the [[http://jetty.codehaus.org/jetty/|Jetty HTTP Server]], [[http://tapestry.apache.org/|Apache Tapestry]], [[https://github.com/codedance/GhostTrap|Ghost Trap]] and [[http://db
apache.org/derby/|Apache Derby]] database. PaperCut actively works with the open source community backing these projects and has reported and assist with bugs and issues found over the years. The security of 3rd party components are actively monitored and any security implications if relevant to PaperCut are openly addressed. The PaperCut development team has also found security problems in copier/ MFP firmware and has worked with leading vendors to address these issues. and
PaperCut is developed in line with security best practices such as [[https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Secure+Coding+Standard|CERT Coding Standards]], [[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project|OWASP Top 10]],
[[http://java.sun.com/security/seccodeguide.html|Oracle Java Security Guidelines]]. A number of our larger University customers have also had PaperCut subjected to full [[https://www.pcisecuritystandards.org/|PCI Security Audits]] prior to deployment for handling online payment. ,
The development team regularly review security and add features proactive in line with best-practice (for example
the introduction of `HTTPOnly cookie headers added in version 11. 2). Another example would be the [[https:// github. com/ codedance/ GhostTrap| Ghost Trap]] project. This is a best practice security related project instigated by PaperCut. The aim is to bring best-of-breed security to the Ghostscript Interpreters by sandboxing it with the same technology used in the Google Chrome browser.
We have pooled our security knowledge and lessons learnt over the past two decades to bring you a new white paper: [[https://www.papercut.com/kb/Main/SecurityWhitepaper|Securing your Print System]]. This paper provides practical and tested advice on how to secure your print system end-end from before a print job is printed, through securing the print workflowdocuments. the has . . and . and . and with PaperCut /.and , .[[https://.//|]].security.