Overview
Access security configuration at/configuracion/seguridad to manage security and audit settings.
Security Features
GIMA provides comprehensive security controls:Password Policies
Configure password complexity, expiration, and reset requirements
Access Control
Manage user permissions and role-based access control (RBAC)
Audit Logging
Track user actions and system events for compliance and troubleshooting
Session Management
Control session timeouts and concurrent login policies
Two-Factor Authentication
Enable additional authentication layers for enhanced security
IP Restrictions
Limit access to specific IP addresses or ranges
Password Policies
Configure password requirements to ensure strong authentication:Set Complexity Requirements
Define password complexity rules:
- Minimum length (recommended: 8-12 characters)
- Require uppercase letters
- Require lowercase letters
- Require numbers
- Require special characters
Configure Expiration
Set password expiration policies:
- Password age (e.g., 90 days)
- Advance warning before expiration
- Password history (prevent reuse of recent passwords)
Set Lockout Rules
Configure account lockout after failed attempts:
- Failed attempt threshold (e.g., 5 attempts)
- Lockout duration (e.g., 30 minutes)
- Reset failed attempt counter after successful login
Recommended Password Policy
Standard Security
Standard Security
For general organizational use:
- Minimum 8 characters
- At least one uppercase letter
- At least one lowercase letter
- At least one number
- Password expiration: 90 days
- Password history: 5 previous passwords
- Account lockout: 5 failed attempts, 30-minute lockout
High Security
High Security
For sensitive environments:
- Minimum 12 characters
- At least one uppercase letter
- At least one lowercase letter
- At least one number
- At least one special character
- Password expiration: 60 days
- Password history: 10 previous passwords
- Account lockout: 3 failed attempts, 60-minute lockout
- Two-factor authentication required
Overly restrictive password policies can lead to users writing down passwords or using predictable patterns. Balance security with usability.
Role-Based Access Control (RBAC)
GIMA uses role-based permissions to control what users can access and modify:Default Roles
Administrator
Administrator
Full system accessPermissions:
- Create, read, update, delete all assets
- Manage users and roles
- Configure system settings
- Access all reports and audits
- Manage categories and locations
Manager
Manager
Management-level accessPermissions:
- View all assets
- Create and update assets in assigned areas
- Approve maintenance requests
- Access reports for assigned departments
- Manage team members
Technician
Technician
Maintenance and technical accessPermissions:
- View assigned assets
- Update asset status and condition
- Create and complete maintenance tasks
- Access technical documentation
- Update asset location
Viewer
Viewer
Read-only accessPermissions:
- View assets in assigned areas
- View reports (limited)
- View maintenance history
- No create, update, or delete permissions
Creating Custom Roles
Access Role Management
Navigate to user management (
/configuracion/User) and access role configuration.Create New Role
Click “Create Role” and enter:
- Role name
- Role description
- Department or area (if applicable)
Assign Permissions
Select which permissions this role should have:
- Asset management (view, create, edit, delete)
- Maintenance (view, create, assign, complete)
- Reports (access specific report types)
- Configuration (access specific settings)
- User management (if applicable)
Audit Logging
GIMA tracks user actions and system events for security and compliance:Logged Events
User Actions
User Actions
- User login/logout
- Failed login attempts
- Password changes/resets
- User creation/modification/deletion
- Role and permission changes
Asset Events
Asset Events
- Asset creation
- Asset updates (with field-level changes)
- Asset deletion
- Asset status changes
- Asset location changes
- Asset ownership transfers
Maintenance Events
Maintenance Events
- Maintenance task creation
- Task assignment changes
- Task completion
- Maintenance schedule changes
- Work order approvals
Configuration Changes
Configuration Changes
- Security setting changes
- Category creation/modification
- Location creation/modification
- System configuration updates
System Events
System Events
- System startup/shutdown
- Database backups
- System errors
- Security alerts
Audit Log Information
Each audit entry includes:- Timestamp: Exact date and time of the event
- User: Who performed the action (username and user ID)
- Action: What action was taken
- Resource: What was affected (asset, user, configuration, etc.)
- Details: Specific changes made (before/after values)
- IP Address: Source IP address of the request
- Session ID: Session identifier
- Result: Success or failure of the action
Accessing Audit Logs
Audit logs are stored securely and cannot be modified or deleted by users. Log retention policies should be configured based on organizational requirements.
Session Management
Control user sessions to enhance security:Session Settings
Session Timeout
Session Timeout
Configure automatic logout after inactivity:
- Standard: 30 minutes of inactivity
- High Security: 15 minutes of inactivity
- Extended: 2 hours (for maintenance operations)
Concurrent Sessions
Concurrent Sessions
Control how many simultaneous logins are allowed:
- Single Session: Only one active session per user
- Multiple Sessions: Allow multiple devices (limit to 3-5)
- Unlimited: No restriction (not recommended)
Session Security
Session Security
Additional session protection:
- Secure session cookies (HTTP-only, Secure flag)
- Session ID regeneration after login
- Bind sessions to IP address (optional)
- Session activity logging
Two-Factor Authentication (2FA)
Add an extra layer of security with two-factor authentication:Enable 2FA System-Wide
Enable 2FA in security settings. Choose:
- Optional: Users can enable 2FA if desired
- Required for Admins: Mandatory for administrator accounts
- Required for All: Mandatory for all users
Configure 2FA Methods
Select which 2FA methods are available:
- Authenticator app (Google Authenticator, Authy)
- SMS verification codes
- Email verification codes
- Hardware security keys (FIDO2/U2F)
IP Restrictions
Limit access to GIMA from specific IP addresses or networks:IP Whitelist
Allow access only from approved IP addresses:- Office network IP ranges
- VPN exit points
- Specific trusted IPs
Configuration
Add Allowed IPs
Enter IP addresses or CIDR ranges:
- Single IP:
192.168.1.100 - IP range:
192.168.1.0/24 - Multiple entries separated by commas
Configure Exceptions
Optionally allow specific users or roles to bypass IP restrictions (e.g., for remote work).
Security Best Practices
Regular Password Updates
Enforce periodic password changes for all users
Principle of Least Privilege
Grant users only the permissions they need
Monitor Audit Logs
Regularly review logs for suspicious activity
Enable 2FA
Require two-factor authentication for sensitive accounts
Session Timeouts
Use appropriate session timeout values
Regular Security Reviews
Periodically audit user permissions and roles
Backup Audit Logs
Regularly export and backup audit logs
Security Training
Train users on security best practices
Compliance and Regulations
Data Protection
GIMA security features help comply with:- GDPR: User data protection and access controls
- SOC 2: Audit logging and access monitoring
- ISO 27001: Information security management
- HIPAA: If managing healthcare assets
Audit Trail Requirements
Maintain comprehensive audit trails for:- Financial asset tracking (Sarbanes-Oxley)
- Government contracts (FedRAMP, FISMA)
- Industry-specific regulations
Security Incident Response
If you detect a security incident:Identify the Incident
Review audit logs to understand what happened:
- Unauthorized access attempts
- Unusual data modifications
- Suspicious user behavior
Contain the Threat
Take immediate action:
- Disable compromised accounts
- Change affected passwords
- Block suspicious IP addresses
Investigate
Analyze the incident:
- Export relevant audit logs
- Identify affected data and users
- Determine root cause
Remediate
Fix security gaps:
- Update security policies
- Apply system updates
- Strengthen access controls
Related Configuration
User Management
Manage users, roles, and permissions
Notifications
Configure security alert notifications
Audit Reports
Generate security and compliance reports