Technical Security
1 minute read
Overview π
- Secure
- Protect
- Control
- Secure Dev
- Bug Bounty Program
- Regular Pentest

Secure - secured by default π
- Secure Code
- Data Center Redundancy
- Network Redundancy
- Power-Supply Redundancy

Protect - protected by default π
- Instances and Security Groups are closed by default
- Databases fully encrypted and filtered by default
- Secured Access Control Lists on all storage buckets
- Included DDOS Protection of the network

Control - fine-grained access control π
- Role-Based Access Control to Exoscale organizations
- Two-Factor Authentication supported
- Optional SSO configuration
- Full IAM for all API calls
- Audit Trail for all events

Secure Dev - world-class engineering π
- Code Review
- Change Management
- Secure Development Practices

Bug Bounty Program - crowdfunded security π
- Competitive Bounties
- 300 active Researchers taking part in the program
- Bugcrowd a crowdsourced security platform. It is one of the internet’s largest bug bounty and vulnerability disclosure companies.

Regular Pentest - timeboxed assessments π
- Annual Pentest
- Performed by Third Parties
- Full Product Coverage
