{"id":42321,"date":"2019-05-31T18:03:42","date_gmt":"2019-05-31T16:03:42","guid":{"rendered":"https:\/\/www2.polyas.de\/ct_content_page_2\/system-security"},"modified":"2024-04-29T21:18:15","modified_gmt":"2024-04-29T19:18:15","slug":"system-security","status":"publish","type":"page","link":"https:\/\/www.polyas.com\/security\/system-security","title":{"rendered":"System security of POLYAS online voting software"},"content":{"rendered":"<div  class='flex_column av-2h0g7x4-de4ae1467e542757120a2c90fb2718d7 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1aizrzs-d0678c6b847944e7200954068aba5ebd\">\n.avia-image-container.av-1aizrzs-d0678c6b847944e7200954068aba5ebd img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-1aizrzs-d0678c6b847944e7200954068aba5ebd .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-1aizrzs-d0678c6b847944e7200954068aba5ebd av-styling- avia-align-center  avia-builder-el-1  el_before_av_textblock  avia-builder-el-first '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image- avia-img-lazy-loading-not- avia_image ' src=\"https:\/\/www.polyas.de\/wp-content\/uploads\/2020\/07\/Datenschutz-bei-Polyas_1.jpg\" alt='' title=''   itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-ltsofnzg-e00b2b2a0be9be2e3c09c71bd36eb6b0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>System security of POLYAS online voting software<\/h1>\n<p>To offer the highest integrity, availability and security in your POLYAS online election, we\u2019ve developed complete monitoring, cutting-edge encryption and a sustained backup-concept for POLYAS CORE 2.5.0 and POLYAS CORE 3. Learn more about POLYAS security standards &#8211; your provider of legally-binding online elections.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-ltymfqmc-a7e66dfd12d3c3a0f73a2f3629a0358f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Regular system security checks by POLYAS<\/h2>\n<p>The POLYAS security strategy is our central guiding principle in product development and process design. Here we consider access rights, data backups and stability of the systems.<\/p>\n<p><strong>Secure online voting: encryption<\/strong><\/p>\n<p>In both POLYAS CORE 2.5.0 and POLYAS CORE 3, vote submission occurs exclusively via a TLS-encrypted connection via server certificate of D-Trust GmbH. This prevents ballots from being manipulated in transmission over the internet. In POLYAS CORE 3, encryption also occurs in voters\u2019 browsers to ensure that ballots are encrypted when created, transported and saved.<\/p>\n<p><strong>Penetration test with external auditors<\/strong><\/p>\n<p>Penetration tests are performed by external security auditors on the POLYAS system at least annually. Over a number of few weeks, all relevant security components are checked in different scenarios and user-rolls. Our external auditors perform unannounced tests on all components of the online voting system (vote submission system, servers) as well as our working infrastructure and the website. This is how we are able to quickly identify and eliminate potential points of weakness. A source code audit also allows us to identify security relevant weak spots.<\/p>\n<p><strong>Preventing brute-force attacks<\/strong><\/p>\n<p>POLYAS prevents brute-force attacks from acquiring passwords of voters and election administrators by strictly limiting the number of login attempts per time-unit and IP-address. All passwords for the POLYAS online voting system are hashed with SHA-256 algorithms which increases the effort needed to conduct attacks using the brute-force method.<\/p>\n<p><strong>Protection agains DDoS attacks<\/strong><\/p>\n<p>The POLYAS online voting system is distributed de-centrally on multiple separate servers. This means there is no single point of failure in the system and allows possible DDoS attacks to be quickly dealt with. Our voting system is hosted on the Open Telekom Cloud which is in the only provider with DDoS mitigation.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-ltymg7xp-b78053bb5458bc6df78350d079a20a72 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>System availability at POLYAS<\/h2>\n<div>\n<div>\n<div>\n<div>\n<p>The availability of POLYAS online voting software CORE 2.2.3 and CORE 3 can be at least 98% guaranteed during the election time period. This goes for voting software and the use of all available functions in the POLYAS online voting system. This is how POLYAS ensures that the voting software is free of technical faults during the contract-period, as well as any viruses and malware that could impair its functional reliability and security.<\/p>\n<p>All election data is stored across different servers. If one server is unexpectedly inaccessible, the election can be transferred to an environment with a different hosting-provider. Additionally, we make regular backups of all live elections (including votes submitted, electoral roll data) to prevent the loss of election or submitted vote data.<\/p>\n<p><a href=\"\/faq\">Learn more about the POLYAS online voting system in our FAQs<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ltzjiloq-ca07d89252e665da6549c35602240f27\">\n.av_promobox.av-ltzjiloq-ca07d89252e665da6549c35602240f27{\ncolor:#000000;\nbackground:#e8f8f8;\nborder-color:#ededed;\n}\n<\/style>\n<div  class='av_promobox av-ltzjiloq-ca07d89252e665da6549c35602240f27 avia-button-no'><div class='avia-promocontent'><p>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-46677 size-thumbnail\" src=\"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png\" alt=\"\" width=\"80\" height=\"80\" srcset=\"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png 80w, https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-36x36.png 36w\" sizes=\"auto, (max-width: 80px) 100vw, 80px\" \/><br \/>\n<strong><\/p>\n<p><strong>POLYAS-tip<\/strong>: with POLYAS online elections, your election and voter data is protected.&nbsp;<a href=\"\/security\/data-security\">Learn more about data protection ay POLYAS now<\/a><\/p>\n<p><\/strong><\/p>\n<\/div><\/div><br \/>\n       <section  class='av_textblock_section av-wz0wl4-34aab32a2d0f1ae4906b93362ed1f18e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Verified system security of POLYAS online voting software<\/h2>\n<p>Security of the POLYAS online voting system is constantly tested and confirmed by independent, external parties.<\/p>\n<p>POLYAS CORE 2.5.0 software has been successfully verified by the German Research Center for Artificial Intelligence on behalf of the German Federal Office for Information Security as complying with all requirements for online voting products under common criteria standards.<\/p>\n<p>POLYAS CORE 3 has also been checked by independent partners and the German Informatics Society is our partner in developing additional audit measures, such as measures for universal and individual verification.<\/p>\n<p>Do you have further questions regarding the verification of system security at POLYAS?<\/p>\n<p>As election organizer, you can check that the election and vote-count ran correctly once the election has concluded. This allows you to make sure your online election with POLYAS ran securely and with integrity in every respect.<\/p>\n<p><a href=\"\/security\/verification-election-results\">Learn more about checking election results at POLYAS<\/a><\/p>\n<\/div><\/section><\/p><\/div> <div  class='flex_column av-1nz9rg8-75c54a224fb808df4d271da46d3d88ea av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  flex_column_div  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lu9i2vcx-f98b442447e01de64a594721f37db094\">\n#top .hr.hr-invisible.av-lu9i2vcx-f98b442447e01de64a594721f37db094{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-lu9i2vcx-f98b442447e01de64a594721f37db094 hr-invisible'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-ltym5gx4-4b5d2bf9f8cb84828b4c30d830082a87 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock cnt2_sidemenu1'  itemprop=\"text\" ><h3><strong>Topics<\/strong><\/h3>\n<ul>\n<li><a href=\"\/security\">Secure Online Voting with POLYAS<\/a><\/li>\n<li><a href=\"\/security\/certified-online-voting-software\">Certified online voting software<\/a><\/li>\n<li><a href=\"\/security\/secrecy-of-the-ballot\">Secrecy of the Ballot with POLYAS Online Voting<\/a><\/li>\n<li><a href=\"\/security\/verification-election-results\">Independent verification of the election results<\/a><\/li>\n<li><a href=\"\/security\/data-security\">Data security and data protection at POLYAS<\/a><\/li>\n<\/ul>\n<\/div><\/section><br \/>\n<div  class='hr av-13shxaw-70ecde758ef09bd32c279342ccec690e hr-default'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lu9idg7z-bf603fd1ba39051b13a329fc88d83331 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock cnt2_sidemenu2'  itemprop=\"text\" ><h3><strong>Further information<\/strong><\/h3>\n<ul>\n<li><a href=\"\/increase-voter-turnout\">How to Increase Voter Turnout in your Election<\/a><\/li>\n<li><a href=\"\/election-administration\">Election Administration<\/a><\/li>\n<li><a href=\"\/election-material\">Election Material<\/a><\/li>\n<li><a href=\"\/election-glossary\">POLYAS Election Glossary<\/a><\/li>\n<\/ul>\n<\/div><\/section><\/p>\n<p><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-42321","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v25.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>System security of POLYAS online voting software<\/title>\n<meta name=\"description\" content=\"System security of POLYAS online voting software is maintained using modern measures. Learn more about your next secure online election!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polyas.com\/security\/system-security\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"System security of POLYAS online voting software\" \/>\n<meta property=\"og:description\" content=\"System security of POLYAS online voting software is maintained using modern measures. Learn more about your next secure online election!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polyas.com\/security\/system-security\" \/>\n<meta property=\"og:site_name\" content=\"POLYAS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T19:18:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"15\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polyas.com\/security\/system-security\",\"url\":\"https:\/\/www.polyas.com\/security\/system-security\",\"name\":\"System security of POLYAS online voting software\",\"isPartOf\":{\"@id\":\"https:\/\/www.polyas.de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.polyas.com\/security\/system-security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.polyas.com\/security\/system-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png\",\"datePublished\":\"2019-05-31T16:03:42+00:00\",\"dateModified\":\"2024-04-29T19:18:15+00:00\",\"description\":\"System security of POLYAS online voting software is maintained using modern measures. Learn more about your next secure online election!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polyas.com\/security\/system-security#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polyas.com\/security\/system-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.polyas.com\/security\/system-security#primaryimage\",\"url\":\"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png\",\"contentUrl\":\"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png\",\"width\":198,\"height\":174},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polyas.com\/security\/system-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.polyas.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"System security of POLYAS online voting software\",\"item\":\"https:\/\/www.polyas.com\/security\/system-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"System security of POLYAS online voting software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polyas.de\/#website\",\"url\":\"https:\/\/www.polyas.de\/\",\"name\":\"POLYAS\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polyas.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"System security of POLYAS online voting software","description":"System security of POLYAS online voting software is maintained using modern measures. Learn more about your next secure online election!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polyas.com\/security\/system-security","og_locale":"de_DE","og_type":"article","og_title":"System security of POLYAS online voting software","og_description":"System security of POLYAS online voting software is maintained using modern measures. Learn more about your next secure online election!","og_url":"https:\/\/www.polyas.com\/security\/system-security","og_site_name":"POLYAS","article_modified_time":"2024-04-29T19:18:15+00:00","og_image":[{"url":"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"15\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polyas.com\/security\/system-security","url":"https:\/\/www.polyas.com\/security\/system-security","name":"System security of POLYAS online voting software","isPartOf":{"@id":"https:\/\/www.polyas.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.polyas.com\/security\/system-security#primaryimage"},"image":{"@id":"https:\/\/www.polyas.com\/security\/system-security#primaryimage"},"thumbnailUrl":"https:\/\/www.polyas.de\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04-80x80.png","datePublished":"2019-05-31T16:03:42+00:00","dateModified":"2024-04-29T19:18:15+00:00","description":"System security of POLYAS online voting software is maintained using modern measures. Learn more about your next secure online election!","breadcrumb":{"@id":"https:\/\/www.polyas.com\/security\/system-security#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polyas.com\/security\/system-security"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.polyas.com\/security\/system-security#primaryimage","url":"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png","contentUrl":"https:\/\/www.polyas.com\/wp-content\/uploads\/2024\/03\/Bildschirmfoto-2024-03-20-um-09.15.04.png","width":198,"height":174},{"@type":"BreadcrumbList","@id":"https:\/\/www.polyas.com\/security\/system-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.polyas.de\/"},{"@type":"ListItem","position":2,"name":"System security of POLYAS online voting software","item":"https:\/\/www.polyas.com\/security\/system-security"},{"@type":"ListItem","position":3,"name":"System security of POLYAS online voting software"}]},{"@type":"WebSite","@id":"https:\/\/www.polyas.de\/#website","url":"https:\/\/www.polyas.de\/","name":"POLYAS","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polyas.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages\/42321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/comments?post=42321"}],"version-history":[{"count":0,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/pages\/42321\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/media?parent=42321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/categories?post=42321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.polyas.com\/wp-json\/wp\/v2\/tags?post=42321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}