Journey to a Secure Cloud
U2 Cloud’s infrastructure was architected to be one of the most secure and flexible cloud computing environments available. Maintaining a secure infrastructure is one of the top concerns of companies today. At U2 Cloud, we see security as a mutual responsibility. U2 Cloud has secured the underlying infrastructure and you must secure your users access and control.
This document summarizes the numerous controls implemented within U2 Cloud, so customers can determine if these capabilities and controls are suitable for their unique requirements.
- Identity and Access Management – Ensures that only properly authenticated entities are allowed access.
- Integrity & Encryption – Used internally within U2 Cloud for protecting control channels and is provided for customers providing rigorous data protection capabilities.
- Availability & Isolation – Minimizes interaction with data by keeping appropriate containers logically or physically separate.
- Physical & Environmental Security
Identity & Access Management
U2 Cloud enables more secure, identity-based access to systems, applications, and data both on premises and in the cloud from virtually any location or device. It enables use of a single identity across an organization as well as with partners’ networks, and provides seamless, always-on connectivity, management of organization identities, credentials, information protection, system and application settings.
Secure Access – All of the services provided by U2Cloud are delivered over SSL. All communications between U2 Cloud’s internal components are protected with SSL. In most cases, the SSL certificates are self-signed. Exceptions are for any certificates for connections that could be accessed from the Internet. Encryption of data in storage and in transit is used to align with best practices for ensuring confidentiality and integrity of
Availability & Isolation
Beyond authenticating access to data, simply keeping different data appropriately segregated provides well-recognized protection. U2 Cloud provides isolation at a number of levels, as discussed below.
Isolation of Hypervisor, Root OS, and Guest VMs
A critical boundary is the isolation of the root VM from the guest VMs and the guest VMs from one another, managed by the hypervisor and the root OS.
VLANs are used to isolate the internal and management networks. VLANs partition a network such that no communication is possible between VLANs without passing through a router, which prevents a compromised node from faking traffic from outside its VLAN and it also cannot eavesdrop on traffic that is not to or from its VLANs.
Isolation of Customer Access
The systems managing access to customer environments (the U2 Cloud Portal) are isolated within U2 Cloud’s network. This logically separates customer access infrastructure from customer applications and storage.
The hypervisor and the root OS provide network packet filters that assure that the untrusted VMs cannot generate spoofed traffic, cannot receive traffic not addressed to them, cannot direct traffic to protected infrastructure endpoints, and cannot send or receive inappropriate broadcast traffic.
Physical & Environmental Security
U2 Cloud’s data centers are state of the art, utilizing innovative architectural and engineering approaches. Data centers are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.
U2 Cloud only provides data center access and information to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an U2 Cloud. All physical access to data centers by U2 Cloud employees is logged and audited routinely.
Fire Detection and Suppression
Automatic fire detection and suppression equipment has been installed to reduce risk. The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms and generator equipment rooms.
The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and seven days a week. Uninterruptible Power Supply (UPS) units provide back-up power in the event of an electrical failure for critical and essential loads in the facility. Data centers use generators to provide back-up power for the entire facility.
Climate and Temperature
Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages. Data centers are conditioned to maintain atmospheric conditions at optimal levels. Personnel and systems monitor and control temperature and humidity at appropriate levels.
U2 Cloud monitors electrical, mechanical, and life support systems and equipment so that any issues are immediately
identified. Preventative maintenance is performed to maintain the continued operability of equipment.
The controls outlined in this Appendix are designed to provide strong data security safeguards that meet the needs of a typical user. They are not intended or designed to address all industry specific requirements that are driven by regulatory requirements such as HIPAA or PCI.