Thank you for using our Jicoo booking system. We are pleased to inform you of an important security update.
Official acquisition of CASA Tier 2 certification
We are pleased to announce that our booking system SaaS, “Jicoo”, has officially acquired Tier 2 certification under the Cloud Application Security Assessment (CASA) program offered by the App Defense Alliance (ADA).
Certification Details
- Certification Type: Tier 2 (Lab Tested - Lab Validated)
- Assessment organization: PwC (independent third-party organization)
Please refer to the following link for details of the certification type.
[https://appdefensealliance.dev/casa/casa-tiering?hl=ja#assurance](https://appdefensealliance.dev/casa/casa-tiering?hl=ja# assurance)
Significance of CASA Tier 2 Certification
CASA certification is based on the industry-recognized OWASP Application Security Verification Standard (ASVS) and is highly credible in terms of
- verification of technical security controls: security controls are implemented based on rigorous standards
- consistent secure development requirements: meets uniform requirements for secure application development; 3. conforms to industry standards
- compliance with industry standards: validated using open security standards.
Evaluation Categories
The evaluation by PwC resulted in a passing grade in all of the following categories
- Architecture, design, and threat modeling requirements
- Authentication validation requirements
- Session Management Validation Requirements
- Access control validation requirements
- Validation, sanitization, and encoding validation requirements
- Stored Encryption Validation Requirements Stored Encryption Validation Requirements
- Error Handling and Logging Validation Requirements
- Data Protection Validation Requirements
- Communication verification requirements
- Malicious Code Validation Requirements Malicious Code Validation Requirements
- Business Logic Validation Requirements Business Logic Validation Requirements
- File and Resource Validation Requirements
- API and Web Service Validation Requirements
- Configuration verification requirements
Benefits to Customers
- Highest level of security: Our rigorous evaluation to internationally recognized standards ensures that your data is protected with the highest level of security. 2.
- proof of reliability: Independent third-party (PwC) evaluations provide objective proof of the reliability of our security measures.
- continuous security: We strive to maintain continuous security through periodic reassessments.