eNlight Cloud Security
To guarantee that your activities run smoothly, eNlight has been built to meet all security needs and to combat any risks that exist in today's online environment. With eNlight cloud, you can be certain that your application, website, information, and database are safe from hackers. To strengthen our clients' faith and confidence in us, we ensure that their data is kept completely secret. By implementing proper security precautions, we follow the norms and regulations. We are qualified and experienced in ensuring entire protection against data theft and information leaks, as well as reducing risks and simplifying server security.
Physical Security
ESDS' expertise in designing and constructing cutting-edge, completely secure datacenters has been used to the eNlight Cloud Platform and Infrastructure. To ensure complete security, we adhere to the tightest regulations. Professional security personnel monitor physical access to eNlight Infrastructure across the premises. Throughout the premises, modern security systems such as video surveillance, biometric access control, motion and entrance detection cameras with alarms are installed. Our seven-layer security guarantees that only Authorized Personnel have access to the Datacenter Premise, and all visitors must produce identification before being led by a member of our staff. Only a few personnel with genuine reasons and business purposes have access to datacenter information and access.. All access to ESDS Datacenter is duly recorded and regularly audited to maintain a strict check.
eNlight Security Standards
Our services are certified with the following standards to ensure maximum security
- ISO 9001
- ISO 20000 / BS 15000
- ISO 27001 / BS 7799
Secure Cloud Infrastructure
Data is stored on corporate storage systems with several security levels by eNlight Cloud. The best practises used to store eNlight data, such as storage isolation from the public network and thick provisioning of storage to prevent sharing, add to these security layers. For further data protection, eNlight uses hardware virtualization technologies to isolate cloud servers at the hypervisor layer. This explicit virtualization of physical resources creates a distinct boundary between the guest and the hypervisor, allowing for even more secure isolation. Customer instances do not have access to raw disc devices; instead, virtualized discs are supplied. The eNlight Virtualization layer immediately resets a customer's storage chunk, preventing data from being exposed to the other.
Server Isolation & Security
The isolation layer duplicates cloud resources (processors, memory, storage, and so on) inside eNlight's secure environment to meet the original server's execution needs. Servers and applications may function on the eNlight cloud "as is," with no need for modification or redesign, and with no downtime. The closely integrated components of eNlight may be readily expanded to provide server, application, and data security on physical, virtual, and cloud servers, as well as virtual desktops. To help you simplify security operations, eNlight Cloud provides a complete, centrally managed platform.
Storage Security
Employees of ESDS are not allowed to see the content of the files you put in your eNlight account; they can only see the metadata (file names and locations). Storage servers are safely tucked within a Private Network, which isolates them from the public network and eliminates any hazards and attacks that the Internet offers. Without traversing the Internet, traffic to and from eNlight Cloud stays within the company firewall. Our controlled routing regulations also define which users are permitted to access Cloud resources.
Network Isolation
Network virtualization methods are used by eNlight Cloud to segregate multiple networks on the same hardware and hence allocate resources accordingly. This provides good isolation as well as controlled network resource sharing across users. Viruses and worms cannot spread into the isolated network of eNlight Cloud, and hostile users and external applications cannot target eNlight servers because they lack the authentication credentials necessary to establish connection within eNlight's Isolated Network.
Network Security
Every client is assigned to a VLAN in the backend, which is managed by an L3 switch. This mitigates minor network flaws while also providing considerable protection against common network security concerns like as DDoS attacks, Man in the Middle (MITM) attacks, IP Spoofing, Port Scanning, and packet sniffing by other tenants. The operating system (OS) of the host, the virtual instance OS or guest OS, and the firewall all offer security. Some of the features of eNlight' Network Security are:
- Private VLANs.
- Optional hardware firewall or load-balancing.
- Anti-spoof / anti-sniff firewall technology.
- Customer isolation in public cloud.
- ARP access list used to avoid man-in-middle kind of attacks and IP thefts.
- On request dedicated Firewall Provision with SSL and IPsec VPNs.
- High end Cisco anomaly detector with sophisticated algorithms to analyze the traffic.
- High end Cisco anomaly Guard, capable of handling 1Gbit/s traffic, to protect network from DDoS attacks.
- Out of Path Traffic filtering system to block malicious traffic without affecting normal traffic.