Security and safety of your data is something we make an essential preoccupation at Exoscale. We understand that trusting an external entity with your data is a difficult step to take.
Getting in touch
First and foremost, if you need to get in touch with the team in for
critical security purposes, we encourage you to send a PGP-encrypted
email@example.com which will ensure that only
security-accredited personnel at Exoscale will be be able to read it.
We ask that you also use this method to contact us should you discover any security issue with the service, and that you apply standard responsible disclosure etiquette.
Our 2048-bit RSA PGP key has fingerprint
60F0 613C 22EE 9391 C158 13FF 4C41 9669 526B C0D7
it is reproduced below:
-----BEGIN PGP PUBLIC KEY BLOCK----- mQENBFi9gksBCACoe3H2z5lS+Aen26ZjgPmGcOl5yj3yc0BbocoXwQ59Zs1OUhU3 ZI/uLPPirONS2BkQdq62xHsQ/nYzp0cUGmQKrTdDLaFb9roRrr3Gxax5E16On1yN M6DN5/QEED7j7JocIkRQfi8WdcLXbYBlXVM/nvhPqhsqBAb2mxT2a+9zHp9vRRBu gikVZGVW6Cox4iVdUxOjg5zHvnoxX2oxE4SBl2rAcmodFwpAxhUWjZf5NwXFGp5t kr6ariMhWQ7ZSYfwZbpPmRMT+BDm1faMdvQ7ya4vu+xQP+j1z2Sz4uW6ZdDcp6Sw DBw5xEftQ/oz/WPDjN+60HKA2s6OGNNIW6hLABEBAAG0KEV4b3NjYWxlIFNlY3Vy aXR5IDxzZWN1cml0eUBleG9zY2FsZS5jaD6JAVQEEwEIAD4WIQRg8GE8Iu6TkcFY E/9MQZZpUmvA1wUCWL2CSwIbAwUJA8JnAAULCQgHAgYVCAkKCwIEFgIDAQIeAQIX gAAKCRBMQZZpUmvA136NCACJ8SICW0XT8A0TE6OTgQ5IN/y2jAO+sd5rHsoS8wxp 2k0gc5dFGmoQ7n9wH7R3w14iahBAdjw6VP+jnGMDf9SyawPd1cSEtL+4GcWbwo3U SBx7bq+DhvZidRjbpKkuwJeLGSONcyPCn+Idy08Q0tl3s6Im1SyUUJ+rkY1L1Y/V lcURGIoEk5NjAmluMVrZnaKElBT6/O7mCIo7zmicdKnLbSzSOwPHeXysWm8rjhEz /iPdOA8K/Ud1I7LdVL8I0T5iPq9XcFmpqPpBwQ5S+GJOD2uQiryQHwXys1jb4YEW n7PVT6g0CRUm5ark7OHguaKC6uq9zZ2vDN+NvyD310ZZuQENBFi9gksBCADkBq59 uoEDxPBGSYhV7LRh6+MNqDfan7IrLoMfJOQHU4QKJyP3VhlFaroiffhUtQNZ6fEM hmdiy4kAp+KpIVhgldQo+gMlqyL6jbYXUO5SmyKttK5VszCL+B1Y/II8N3KnMP9f 3LfS4oUdn511igphCywqPeJMg/zwEun771aCUIRx94cKt1nZT5+KG0k1H7iP90Yq 4DLrSy9z0/4wS8A26b3/GIrRM7Yia1zERiUgLANSIeSpWzvXMB0FPRy5v5NV69JT EroZx7Jz//9368NSaHBlvzi1WjptuK5NFFS0CLjnrCsCY2vfF2KTJB1OyAqZ/Apm z441SkZfO6Se9LnxABEBAAGJATwEGAEIACYWIQRg8GE8Iu6TkcFYE/9MQZZpUmvA 1wUCWL2CSwIbDAUJA8JnAAAKCRBMQZZpUmvA141JB/9DkXRGtOgxykst31qJH+RA Ktb8Zns5vQDYk5J881Lgjfw59ZQOZDDueckuH8LltAh1ogyNheOgtIABOvQ+jVSR gik/6q2vA98TVC7grLPAsdJ5rTO9f6zYzw9D0pNm4kfDjNIMgJ24RPSomqdj2Peq CsH7WEL+Pd+ZJsjPf7GvicmosOuiIgooDd6GKhLJPz0+WBCmbCZ0zU49MP9Yw4if SxY5knAQGT5ybzkE/wNh55Sk+3N2ffn4/w/tF9SA0bR+n/819PdVruRSU2YaDxmS dJM3P1OaI1DzdlgxKZ8WzBvHTdaHNtlmz5GocW+ockbLXYbl3B/H9pJagqxdLwiV =nsyu -----END PGP PUBLIC KEY BLOCK-----
Our security model in plain English
Who has physical access?
We only operate from locations conforming to the most restrictive security standards (ISO27001) and we are part of the Cloud Security Alliance (CSA).
Conforming to recommendations made in these frameworks and standards, we track all access to datacenters. Only Exoscale staff and accredited Datacenter personnel has physical access. We keep an audit trail of access to individual datacenter racks and work with trained staff for operations such as disk changes or hardware reboots.
When drives are decommisioned they are destroyed or cryptographically locked.
Who has logical access?
The operations team at Exoscale is the only team which has actual access to hypervisors and storage nodes. Strict access control is maintained and tracked, as well as regular credentials cycling.
We rely on very few external services to maintain the highest possible level of security, and reduce our threat-model to a minimum. We still can’t do everything by ourselves and thus rely on a few external providers.
We rely on two services which are PCI-DSS for processing payments:
- PostFinance which processes Credit Card and Postcard payments.
- Paypal which processes Paypal payments.
We do not store any Credit Card information only anonymized tokens, as provided by these services.
We additionally use the online accounting solution provided by Bexio, a Swiss company with a dedication to security similar to ours to provide faster reconciliation of wired payments. As such invoice information is duplicated on Bexio.
We only gather website analytics for our public websites (this website, as well as https://community.exoscale.com). No activity within our customer portal is ever tracked. Our provider for website analytics is Google.
We use Mailchimp to send Email campaigns and newsletters. We do not store address lists at mailchimp, but synchronize on a per-campaign basis to avoid storing your email addresses permanently there.
Below this point, we dive in deeper detail on the exact frameworks and standards we adhere to. You can read on if you are interested in the fine print.
Exoscale has elected the Cloud Security Alliance (CSA) framework in order to structure and enforce the compliance controls regarding all aspects of security with 100 control points dealing with:
- Data Governance
- Information Security
- Risk Management
- Security Architecture
We conform to the OCF Level 1, having completed our Cloud Control Matrix which maps to the following selected frameworks:
- HIPAA / HITECH Act
- ISO/IEC 27001-2005
- PCI DSSv2.0
- BITS Shared Assessments
Roles and responsibilities
Roles and responsibilities vary upon the cloud model chosen: these are defined by the SPI stack, as defined in the CSA guidance.
“The lower down the stack the cloud service provider stops, the more security capabilities and management consumers are responsible for implementing and managing themselves.”
Therefore we attract our readers on the fact that as a IaaS provider with Exoscale, most responsibilities and data access control enforcement are on the customer side. Nevertheless we impose ourselves a high level of security on all infrastructure layers, as described in the following sections.
Laws and Regulation
At general level, concerning data and activities conducted in our swiss datacenters we shall mainly be subject to the Swiss Code of Obligations.
The purpose of this section is to answer general questions within the context of Exoscale, providing IaaS Cloud Computing Services to the customer. We would like to bring particularly to your attention the Data Protection and Export Control obligations.
Concerning data and activities conducted in our swiss datacenters we shall mainly be subject to the Swiss Federal Data Protection Act (“DPA”) and the Swiss Federal Data Protection Ordinance (“DPO”). Unlike most other countries, the Swiss data protection laws and regulations apply to individuals, but also to legal entities.
Collecting and Processing Personal Data
When collecting data, the collector shall ensure that he
- informs data subjects about the data processing and its intended purpose;
- informs data subjects about whether the data will be disclosed to third parties and whether a transfer outside Switzerland is contemplated; and
- obtains any consents required for the data processing.
The DPA provides that the mere act of collecting personal data constitutes the processing of personal data. Therefore, all legal requirements which apply to the processing of personal data also apply to the collection of personal data. Among others, the following provisions shall be complied with in the processing of personal data:
- Personal data must be processed in good faith; Personal data must not be collected by misrepresentation or deception; The processing of personal data must be proportionate.
- Personal data may only be used for the purpose intended at the time of collection.
- The collection of personal data and the purposes for which the personal data is processed must be obvious to the person/entity from whom personal data are collected.
- Anyone who processes personal data must not breach the privacy of the data subjects.
- As a rule, no justification for processing personal data is required if the data subjects have made the data generally available and have not expressly restricted the data processing.
- A lawful justification for data processing exists if the data subject has consented to it, the law provides for it, or the data processor has an overriding interest in the data processing.
- The data processing must comply with technical and organizational security requirements, especially when processed electronically. Personal data must be protected against intentional or accidental deletion, accidental loss, technical errors, falsification, theft and unlawful use, unauthorized access, changes, copying, or other unauthorized processing.
- Data processing may be delegated to a third party under an agreement, provided that the third party data processor processes data only to the same extent as the person employing the third party data processor was authorized to do and that no legal or contractual confidentiality obligation prohibits the outsourcing.
Disclosing of Personal Data
The DPA does not permit the disclosure of sensitive data or personality profiles to third parties without lawful justification. The consent of the data subject can constitute a lawful justification. Companies within the same group as the disclosing entity, i.e. the parent company or subsidiaries are considered third parties and the sharing of personal data within a group is deemed to be a disclosure to third parties for the purposes of the DPA.
The DPA prohibits a transfer of personal data abroad if it could seriously endanger the personality rights of the data subjects. If the legislation of the foreign country does not afford adequate protection for the personal data to be transferred or accessed, under Swiss data protection laws and regulations, transfer or access outside Switzerland is not allowed, except in certain restricted cases which have to meet specific requirements with respect to such disclosure abroad. In the latter case, the Federal Data Protection and Information Commissioner must be informed of the safeguards or rules used before the first transfer of data is made or, if that is not possible, immediately after the disclosure has occurred. Please note that we do NOT transfer data abroad. The data is stored in Switzerland only.
Products, software, and technical information provided or used in connection to the services may be subject to export laws and regulations of Switzerland and other countries, and any use or transfer of the products, software, and technical information must be in compliance with all such applicable regulations.
Disclosure Procedures and Policies
The procedures and policies for responding to a request for data or information disclosure from governmental authorities depend mainly on the treaties entered into with the requesting country requesting. In broad terms, exchange of information between countries may be requested within the context of:
- criminal proceedings or
- tax fraud or tax evasion.
- In case of criminal proceedings, information can be exchanged by way of mutual legal assistance in criminal matters (“MLA”) based on multi- or bilateral agreements or in accordance with the Federal Act on International Mutual Assistance in Criminal Matters. For instance, with respect to the Schengen States, the Federal Law on Exchange of Information between Criminal Proceedings Authorities between Switzerland and the Schengen States shall apply.
- In case of tax fraud or tax evasion, when foreign tax authorities are involved, the exchange of information is carried out by means of administrative assistance within the legal framework of bilateral double taxation agreements (“DTAs”). In the case of tax related criminal proceedings, information can be exchanged also, alternatively, according to section (i) above. In particular, the OECD has concluded a model double taxation agreement with Switzerland, which provides pursuant to Article 26 for a system of administrative assistance among the tax authorities of the signatory countries, according to which States shall exchange information that is foreseeably relevant to the correct application of a tax convention as well as for purposes of the administration and enforcement of “domestic tax laws” of the contracting States upon specific request. Any information received thereunder by a contracting State shall be treated as secret. Such persons or authorities shall use the information only for such purposes. They may disclose the information in public court proceedings or in judicial decisions. To date, Switzerland has adopted or renegotiated over 35 Article 26-friendly DTAs. However, the cases where we would directly be requested to transfer data that is stored on our cloud but that is owned by the customer seem to be extremely limited. One possible hypothesis would be a case where the customer refuses to transfer data stored by us as requested by competent authorities and such authorities would then request us directly to provide the relevant information. In such event, we would obviously comply with the laws, but would, to the extent legally possible, promptly inform the customer of the situation.
The “USA Patriot Act”
The USA Patriot Act applies to
- US entities,
- affiliates and subsidiaries of US entities throughout the world,
- servers located in the US independently from the nationality of the entities which operate them, and
- as well as to data hosted in Europe by US entities.
Our company is based in Switzerland and does not have any affiliate or subsidiary in the US. Further, our cloud is hosted in leading data center companies in Switzerland. The data is stored in Switzerland and not in the US. Thus, we are not governed by the USA Patriot Act. If however the customer is related to entities in the US or servers located in the US then the customer’s data may be subject to the USA Patriot Act.