Security principles in DoubleCloud

The following security principles help keep your resources secure.

Openness and transparency

Trust in your service provider is essential for reliable and successful operations. We provide all the relevant information about our platform to the customers to reaffirm their loyalty.

To protect the cloud infrastructure, it's important to meet international standards and legal requirements for information security.

The DoubleCloud team works non-stop to meet the requirements set by government legislation and industry standards in all countries of operation.

Ensuring security at each step of service creation and provision

The DoubleCloud team follows the Security Development Lifecycle (SDL) , building the foundation for cloud service security from the earliest stages of the project:

It's further enhanced with Defense in Depth that creates multi-layer security controls. They prevent attacks and help detect attackers' activities in advance:

did-diagram

The Defense in Depth layers represent the following:

  • Data includes online storage and backups.
  • Application includes content security and Information rights management (IRM) , Message level security, SSO , and security-minded coding practices.
  • Host includes platform vulnerability management with security patches and malware protection.
  • Internal Network includes Transport layer security (TLS) with encryption and identity management.
  • Perimeter includes firewall rules, network address translation, DoS prevention, message parsing and validation.
  • Physical includes offline security measures - keys, badges, locks, security personnel, secure premises.
  • Policies, Procedure and Awareness include usage policies, credentials management, code reviews and security awareness education for the team.

Shared responsibility

In DoubleCloud services, security responsibilities are divided and shared by the client-owner of the end system and the provider-owner of the cloud infrastructure.

See also: