{"id":3035,"date":"2015-08-31T15:39:47","date_gmt":"2015-08-31T15:39:47","guid":{"rendered":"http:\/\/www.esds.co.in\/kb\/?p=3035"},"modified":"2015-08-31T15:48:45","modified_gmt":"2015-08-31T15:48:45","slug":"cloud-security-standards-in-enlight-cloud-services","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/","title":{"rendered":"Cloud Security Standards in eNlight Cloud Services"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-3036\" src=\"http:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2015\/08\/eNlight_CloudSecurity.jpg\" alt=\"eNlight_CloudSecurity\" width=\"673\" height=\"380\" srcset=\"https:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2015\/08\/eNlight_CloudSecurity.jpg 673w, https:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2015\/08\/eNlight_CloudSecurity-300x169.jpg 300w\" sizes=\"(max-width: 673px) 100vw, 673px\" \/><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#Summary_Examining_cloud_computing_security_standards_guidelines_and_features_in_eNlight_Cloud_Services\" >Summary: Examining cloud computing security standards, guidelines and features in eNlight Cloud Services.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#1_How_does_eNlight_Cloud_comply_with_regulations_and_legal_requirements\" >1) How does eNlight Cloud comply with regulations and legal requirements?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#2_Where_will_my_data_be_geographically_located\" >2) Where will my data be geographically located?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#3_Is_my_data_handled_securely\" >3) Is my data handled securely?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#4_How_is_service_availability_assured\" >4) How is service availability assured?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#5_How_is_my_data_protected_against_privileged_user_abuse\" >5) How is my data protected against privileged user abuse?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#6_What_levels_of_isolation_are_used\" >6) What levels of isolation are used?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#7_How_are_the_eNlight_systems_guarded_against_threats_from_the_Internet\" >7) How are the eNlight systems guarded against threats from the Internet?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#8_How_are_the_activities_of_servers_monitored_and_logged\" >8) How are the activities of servers monitored and logged?<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Summary_Examining_cloud_computing_security_standards_guidelines_and_features_in_eNlight_Cloud_Services\"><\/span>Summary: <strong>Examining cloud computing security standards, guidelines and features in <span id=\"d2cd67d0-3c78-4f77-aa4e-f1c64fcfc1e3\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span> Cloud Services.<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"1_How_does_eNlight_Cloud_comply_with_regulations_and_legal_requirements\"><\/span>1) How does <span id=\"eeeb145c-cbc5-4abd-ad48-661f9e7e24ed\" class=\"GINGER_SOFTWARE_mark\"><span id=\"042331a8-1837-4c3d-82eb-60b9d9b1a93a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"52ca0bdb-a10e-40a0-b408-981556285cf9\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f152f1b6-5cb4-4da3-a720-c53933bbc91a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"6f9d0712-483b-4e8a-b2f8-3ea22d474904\" class=\"GINGER_SOFTWARE_mark\"><span id=\"4ef2cbd4-c68f-4d83-a6b1-1c265d3929bd\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> Cloud comply with regulations and legal requirements?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify\">A monthly audit is carried out to ensure that <span id=\"d7983ba6-5fa0-4246-a4a6-61d7c021f4a2\" class=\"GINGER_SOFTWARE_mark\"><span id=\"9bc34b25-037f-424d-9441-aec1dc8562bf\" class=\"GINGER_SOFTWARE_mark\"><span id=\"6d63df9e-75ec-4e91-a066-bcb2c3be37c6\" class=\"GINGER_SOFTWARE_mark\"><span id=\"9cb3280a-03e5-4dcd-860b-63ea05e3c649\" class=\"GINGER_SOFTWARE_mark\"><span id=\"961a5bde-f6ad-4760-89c3-d8374331bd30\" class=\"GINGER_SOFTWARE_mark\"><span id=\"289c1210-b52b-4c84-ad7b-91a0f485bbe3\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> complies with all necessary regulations and legal requirements, as well as to ensure that ESDS is continuing to provide a quality service. Some of the activities that form part of this monthly audit include:<\/p>\n<ul>\n<li>Router logs are Inspected and monitored.<\/li>\n<li>The <span id=\"206200be-a021-4e8a-8266-4078d0124d4f\" class=\"GINGER_SOFTWARE_mark\"><span id=\"caa4461c-31b6-4560-85db-80b0c46cc10f\" class=\"GINGER_SOFTWARE_mark\"><span id=\"4793b00f-d4a2-4f40-a867-e273f5fa275f\" class=\"GINGER_SOFTWARE_mark\"><span id=\"51e10da8-499b-4b18-8a22-641fbf729223\" class=\"GINGER_SOFTWARE_mark\"><span id=\"d186ec30-4e12-4a46-b2bf-0010239b1090\" class=\"GINGER_SOFTWARE_mark\"><span id=\"a26dfa00-d037-4f94-8212-989767d76b53\" class=\"GINGER_SOFTWARE_mark\">health<\/span><\/span><\/span><\/span><\/span><\/span> of switches is investigated as are the access logs.<\/li>\n<li>Hosting nodes are also checked to ensure that they are healthy.<\/li>\n<\/ul>\n<p style=\"text-align: justify\">The service level agreement (SLA) is in place to guarantee legal compliance where possible. If there are any <span id=\"1b12ecc9-0309-420f-9363-a36bf68e5027\" class=\"GINGER_SOFTWARE_mark\"><span id=\"48380d22-d5fa-40ef-b48d-2bc19cb3a34d\" class=\"GINGER_SOFTWARE_mark\"><span id=\"858eff9e-fec4-4ec6-9cc1-f03d14b5443b\" class=\"GINGER_SOFTWARE_mark\"><span id=\"8bf38441-b0f4-4f30-8a2d-b8d5effca157\" class=\"GINGER_SOFTWARE_mark\"><span id=\"00d0e262-1215-41c7-8b51-0081de459e91\" class=\"GINGER_SOFTWARE_mark\"><span id=\"1f3ef1b4-08f3-45ce-b5a8-343a50c86561\" class=\"GINGER_SOFTWARE_mark\">conflicts then<\/span><\/span><\/span><\/span><\/span><\/span> this will also provide a number of different options.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Where_will_my_data_be_geographically_located\"><\/span>2) Where will my data be geographically located?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>All data in <span id=\"80e0a36d-a8ff-4cee-87d8-a6d605f8ca1a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"97eaf93f-fa56-468d-b3bf-cde4ba56eecf\" class=\"GINGER_SOFTWARE_mark\"><span id=\"3e28c812-c6d9-4d2f-a92e-059e0168ebcd\" class=\"GINGER_SOFTWARE_mark\"><span id=\"69d7d935-0e09-4fc8-aaf1-2dc6e8114087\" class=\"GINGER_SOFTWARE_mark\"><span id=\"e19eed30-3de4-4331-bf6e-e188bcf324ac\" class=\"GINGER_SOFTWARE_mark\"><span id=\"404e7a87-5f3e-4bfc-b72c-88e811f16e87\" class=\"GINGER_SOFTWARE_mark\">eNlight Cloud<\/span><\/span><\/span><\/span><\/span><\/span> will be hosted on servers located in our data centers in the India (Nasik \/ Mumbai).<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Is_my_data_handled_securely\"><\/span>3) Is my data handled securely?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Enterprise storage devices, such as SAN (Storage Area Networks) are used for the storage of data in <span id=\"c9b70930-67c4-4f22-a53e-e910efadf1e6\" class=\"GINGER_SOFTWARE_mark\"><span id=\"d6b7acd9-ccba-4422-abfc-b88eadca972a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"fda4fcee-bc49-4787-82e7-83ee1b485c80\" class=\"GINGER_SOFTWARE_mark\"><span id=\"fe03ff64-019a-4547-b2e8-f3fe75cae363\" class=\"GINGER_SOFTWARE_mark\"><span id=\"27cca288-aaaf-42ae-a1d7-dc9e755a7ae3\" class=\"GINGER_SOFTWARE_mark\"><span id=\"07df45e1-a97f-457a-8f6f-eb2c52598f6e\" class=\"GINGER_SOFTWARE_mark\">eNlight Cloud<\/span><\/span><\/span><\/span><\/span><\/span>. SAN <span id=\"2d4fc770-d36b-48c1-b4df-e8f57fe64e99\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f4279ac8-dd00-4014-91dc-589b1abda449\" class=\"GINGER_SOFTWARE_mark\"><span id=\"5d2ec4ef-c325-4c5e-88e4-cfe148d272a0\" class=\"GINGER_SOFTWARE_mark\"><span id=\"deb281be-6b68-490c-9340-e4455791e1ce\" class=\"GINGER_SOFTWARE_mark\"><span id=\"70f49798-8809-4f85-9dbb-7744637ea7de\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f4e5e3f9-b94f-4f44-961b-d1d80104351d\" class=\"GINGER_SOFTWARE_mark\">represent<\/span><\/span><\/span><\/span><\/span><\/span> one the of the most secure storage options available. Additional layers of security are provided <span id=\"ab7d7e87-6230-4047-a3fd-489f16f3c0f3\" class=\"GINGER_SOFTWARE_mark\"><span id=\"3b0ed3ca-ef3d-4087-a39c-f07166e1ee36\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f8d004fc-735b-43e0-95cf-b62b7c8c2e01\" class=\"GINGER_SOFTWARE_mark\"><span id=\"41cf299e-1737-4175-917f-1256b833ee30\" class=\"GINGER_SOFTWARE_mark\"><span id=\"e45d1ff0-e826-4228-9139-5407b3b707cc\" class=\"GINGER_SOFTWARE_mark\"><span id=\"aba84d56-ac5e-483e-9da6-7fc41884dcdf\" class=\"GINGER_SOFTWARE_mark\">in<\/span><\/span><\/span><\/span><\/span><\/span> a multitude of ways including:<\/p>\n<ul>\n<li>Storage is hosted internally and isn\u2019t available from any public networks.<\/li>\n<li>We have a large amount of storage available at all times to prevent any issues with customers not being able to add additional disk space when it is needed.<\/li>\n<li>We use hardware virtualization technologies. It means that Cloud VMs are isolated at the hypervisor layer.<\/li>\n<li>Users are free to choose SSL methods and ESDS provides maximum assistance to get them configured such that Data is always secure in transit.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"4_How_is_service_availability_assured\"><\/span>4) How is service availability assured?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify\">Using Tier 3 data centers, ESDS can guarantee <span id=\"ded225a6-4bf5-4b39-ad34-d9c1e079312c\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f6416410-9e02-4acc-aa40-afe102eb1da7\" class=\"GINGER_SOFTWARE_mark\"><span id=\"8bd296a3-8a08-4e54-a75b-a9abe241b933\" class=\"GINGER_SOFTWARE_mark\"><span id=\"492a39fc-70b3-4d1a-a921-7480c52683d0\" class=\"GINGER_SOFTWARE_mark\"><span id=\"ba5c8f28-fc3d-47ac-ba18-66da1191975b\" class=\"GINGER_SOFTWARE_mark\"><span id=\"3244fdf4-c235-4e83-9313-1d872f590415\" class=\"GINGER_SOFTWARE_mark\">upto<\/span><\/span><\/span><\/span><\/span><\/span> 99.99% uptime with the <span id=\"5acde32c-abd3-41de-a161-692afb670da7\" class=\"GINGER_SOFTWARE_mark\"><span id=\"aee09718-d43d-43d9-a49f-4c344bdab375\" class=\"GINGER_SOFTWARE_mark\"><span id=\"fbbfd550-48b5-4092-986b-9552af873a97\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f0abfadd-2d4f-4fa2-8047-a869d747980d\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f01d4a0b-8d95-405b-b659-032681fab5b0\" class=\"GINGER_SOFTWARE_mark\"><span id=\"dd78fcf3-3ce0-412c-a7f8-82344c015b68\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> Cloud. Redundancy is provided right down to the rack level with there being back-up measures in place in the event of <span id=\"20ed9057-2928-4a20-80ae-44809de501b6\" class=\"GINGER_SOFTWARE_mark\"><span id=\"a9e26ca8-8d59-4aeb-8424-9460668714a7\" class=\"GINGER_SOFTWARE_mark\"><span id=\"92ec4720-f271-45fb-982c-b7eab3535742\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f8be3533-77f6-4bee-989a-f094e8c28d34\" class=\"GINGER_SOFTWARE_mark\"><span id=\"767ffb6c-f4ae-4d2d-95d3-01c057141368\" class=\"GINGER_SOFTWARE_mark\"><span id=\"df2cf694-2a2f-4c92-a799-455a2542a1f8\" class=\"GINGER_SOFTWARE_mark\">power<\/span><\/span><\/span><\/span><\/span><\/span> of network supply failure.\u00a0<strong>Read More:<\/strong> <span style=\"text-decoration: underline\"><strong><a href=\"http:\/\/www.esds.co.in\/blog\/tier-standard-topology-are-you-sure-about-the-uptime-differences\/\" target=\"_blank\">Tier standard topology, Are You Sure about the Uptime Differences?<\/a><\/strong><\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_How_is_my_data_protected_against_privileged_user_abuse\"><\/span>5) How is my data protected against privileged user abuse?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify\">All members of staff with ESDS who are involved in <span id=\"e89b5cdc-ef08-496a-9597-1533ae015b36\" class=\"GINGER_SOFTWARE_mark\"><span id=\"af6ea379-cbcc-4c69-bfdd-d6238a30cc12\" class=\"GINGER_SOFTWARE_mark\"><span id=\"57bb9772-a059-4abf-aad2-fc2afaf3a164\" class=\"GINGER_SOFTWARE_mark\"><span id=\"7341e5c2-bb1c-4bce-9680-ec0ecd5fec44\" class=\"GINGER_SOFTWARE_mark\"><span id=\"7d1448b1-19e0-40e7-b6e8-342a2e23efa0\" class=\"GINGER_SOFTWARE_mark\"><span id=\"043a67e1-49b6-4da4-937c-4ffe14d4eeee\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> operations are required to sign an NDA (non-disclosure agreement) \/ privacy policy that guarantees confidentiality for customers as any breach of this agreement could result in legal action against the member of staff concerned. The data centers itself are also protected <span id=\"bb9ba95d-352d-46f8-b6bf-9f587d2cb5bc\" class=\"GINGER_SOFTWARE_mark\"><span id=\"fe9bc932-7454-4c00-b293-b50516a748e2\" class=\"GINGER_SOFTWARE_mark\"><span id=\"49b2d919-aa04-4b67-89e0-499b403fed46\" class=\"GINGER_SOFTWARE_mark\"><span id=\"7e05692e-2315-482c-846e-3c7a8b03b199\" class=\"GINGER_SOFTWARE_mark\"><span id=\"bd736956-f9fd-4c90-ba0d-038485131297\" class=\"GINGER_SOFTWARE_mark\"><span id=\"b26ab957-c33b-40d7-a7d3-7800d907b4dd\" class=\"GINGER_SOFTWARE_mark\">with<\/span><\/span><\/span><\/span><\/span><\/span> various physical security features that mean only authorized individuals are provided with access to the data floor and the servers running the Cloud. <span id=\"9c39460e-9f74-45d7-a813-57ba5a6a3104\" class=\"GINGER_SOFTWARE_mark\"><span id=\"26ced694-4a99-48df-810c-f8c53c17d922\" class=\"GINGER_SOFTWARE_mark\"><span id=\"353e60ac-728c-4c18-9d14-051bd9818113\" class=\"GINGER_SOFTWARE_mark\"><span id=\"c221c84e-3ef4-41d4-b11b-fe76be888bb2\" class=\"GINGER_SOFTWARE_mark\"><span id=\"04f2b109-1bab-4a32-8111-5a3a9936f544\" class=\"GINGER_SOFTWARE_mark\"><span id=\"eff6a922-9180-4d78-b085-f3d1157e762b\" class=\"GINGER_SOFTWARE_mark\">All of servers<\/span><\/span><\/span><\/span><\/span><\/span> are also protected by hardware firewalls that will be logging all traffic that goes through them.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"6_What_levels_of_isolation_are_used\"><\/span>6) What levels of isolation are used?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>We have developed <span id=\"6c5d05a6-218b-412b-9c14-bc2627d2d6f1\" class=\"GINGER_SOFTWARE_mark\"><span id=\"e4a3e58b-efa4-4b3d-8495-e70246e66fa3\" class=\"GINGER_SOFTWARE_mark\"><span id=\"bb8e36f7-54ab-40ce-b328-e2f034b61368\" class=\"GINGER_SOFTWARE_mark\"><span id=\"feb786cd-fd2d-4497-92af-567a5ccb8401\" class=\"GINGER_SOFTWARE_mark\"><span id=\"405064d9-3106-4f98-8a9e-0761f02dbf3a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"73a38fe7-bb83-4dc5-b49d-022ccf129f9a\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> Cloud around three layers of isolation, with these being:<\/p>\n<ul>\n<li>Server logins and client billing details are protected to the highest level; they can only be accessed by the Client.<\/li>\n<li>We have a secure billing area that is separate from our main website.<\/li>\n<li>Layer 3 switches are used to create a final layer of network isolation and security.<\/li>\n<li><span id=\"82dd213a-11e9-4c24-ae94-160152122b2f\" class=\"GINGER_SOFTWARE_mark\"><span id=\"5c6c7538-6c25-44c9-bdbc-effce6335668\" class=\"GINGER_SOFTWARE_mark\"><span id=\"253f2166-50ea-43a3-8b06-0e8b2a75eb4a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"ffde69b9-a762-4133-a587-12760032cfc9\" class=\"GINGER_SOFTWARE_mark\"><span id=\"02f15116-a8b6-4286-be79-abe18e525c78\" class=\"GINGER_SOFTWARE_mark\"><span id=\"6e9c20ab-6230-46ad-abeb-05adc3c3f4b3\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> Cloud uses Type-1 <span id=\"77be1785-7caf-42c6-9568-f04ba8c65133\" class=\"GINGER_SOFTWARE_mark\"><span id=\"0d5e0ce9-16ff-4f64-a348-9ffdc7d9bde8\" class=\"GINGER_SOFTWARE_mark\"><span id=\"2b9110c0-00ad-41e6-80ef-b6fbfa390ca4\" class=\"GINGER_SOFTWARE_mark\"><span id=\"35b46979-6daa-4232-85a4-67d741e76a5d\" class=\"GINGER_SOFTWARE_mark\"><span id=\"4d3a6c0f-3189-4d8f-94e7-b717ca6b86d9\" class=\"GINGER_SOFTWARE_mark\"><span id=\"4be90f4e-a94b-483f-8d87-f1c46480881d\" class=\"GINGER_SOFTWARE_mark\">hypervisors<\/span><\/span><\/span><\/span><\/span><\/span>. These help to provide complete logical isolation between VMs and management flexibility.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"7_How_are_the_eNlight_systems_guarded_against_threats_from_the_Internet\"><\/span>7) How are the <span id=\"04d72f9c-96a5-476d-9993-a12cde66bc9d\" class=\"GINGER_SOFTWARE_mark\"><span id=\"47c42b02-969d-4327-a37c-f1b05feea5fd\" class=\"GINGER_SOFTWARE_mark\"><span id=\"b45a87d5-907b-496f-bd69-404199c71c9a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"1751a6da-5a70-4611-b44a-3ee44f53f9d3\" class=\"GINGER_SOFTWARE_mark\"><span id=\"57ae9896-8521-4df4-8d7c-00a51358691b\" class=\"GINGER_SOFTWARE_mark\"><span id=\"fb47b88f-bc3c-45a2-8456-8b25db175a28\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> systems guarded against threats from the Internet?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The following arrangements are in place to protect <span id=\"ad38ca29-068f-4e8c-84cb-3acb5757f8c8\" class=\"GINGER_SOFTWARE_mark\"><span id=\"360f1c09-ff90-42ed-bc37-b674cc0aa5d5\" class=\"GINGER_SOFTWARE_mark\"><span id=\"5410d009-2678-4b59-9ba9-0f453d5fd04a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"7b141523-6969-4086-8619-3b5ab25bcf6b\" class=\"GINGER_SOFTWARE_mark\"><span id=\"ea40a227-ce96-4c75-b6b7-fa895fd40233\" class=\"GINGER_SOFTWARE_mark\"><span id=\"7664da99-a3a0-424c-88a5-884b9445e2bb\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> hosting nodes and <span id=\"940212e0-677b-497d-8a3b-07fd03d867cf\" class=\"GINGER_SOFTWARE_mark\"><span id=\"14c4da7d-7887-4395-9f7f-2aa12ee940cd\" class=\"GINGER_SOFTWARE_mark\"><span id=\"61dcd4c0-eec6-4de3-9907-579fe16c773c\" class=\"GINGER_SOFTWARE_mark\"><span id=\"8f91d152-8286-44df-ae86-e98825f44351\" class=\"GINGER_SOFTWARE_mark\"><span id=\"25556f2f-7874-4b91-809c-4ae40981b9e0\" class=\"GINGER_SOFTWARE_mark\"><span id=\"5541998f-82e0-48d3-972b-549167033c71\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> VMs from external threats:<\/p>\n<ul>\n<li>All the servers have their software firewalls enabled as standard.<\/li>\n<li>Our 24&#215;7 NOC (Network Operations Center) teams ensure all network activities are monitored and any questionable patters are picked up on.<\/li>\n<li>A specialist IDS (Intrusion Detection System) runs alongside the main router to continuously monitor traffic and blocks known threats such as network viruses. Potential DDOS attacks can able be detected and prevented.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"8_How_are_the_activities_of_servers_monitored_and_logged\"><\/span>8) How are the activities of servers monitored and logged?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify\">The performance of Virtual Machines in <span id=\"0bc1a04a-f869-4849-b175-dc7e49439daa\" class=\"GINGER_SOFTWARE_mark\"><span id=\"cccb9816-8afa-447d-8797-f3b0a990b07f\" class=\"GINGER_SOFTWARE_mark\"><span id=\"82f7966d-4a00-484b-80f5-7a101517812c\" class=\"GINGER_SOFTWARE_mark\"><span id=\"f71ea053-31b6-4b0a-996f-c328abc50b85\" class=\"GINGER_SOFTWARE_mark\"><span id=\"396ac7eb-7de3-4760-825d-306ef0c98383\" class=\"GINGER_SOFTWARE_mark\"><span id=\"9f60582f-010e-478f-bf80-6ab92ad0c077\" class=\"GINGER_SOFTWARE_mark\">eNlight Cloud<\/span><\/span><\/span><\/span><\/span><\/span> is monitored consistently by the platform.\u00a0 <span id=\"9ecc9439-e571-477c-9d23-0376ee6a0d22\" class=\"GINGER_SOFTWARE_mark\"><span id=\"63e48d32-d13e-4616-bd67-d3b7a9750955\" class=\"GINGER_SOFTWARE_mark\"><span id=\"d75cf7c7-d9a5-44eb-b843-f38465643e7a\" class=\"GINGER_SOFTWARE_mark\"><span id=\"0a731eaf-cf63-41fa-90f8-8fc8cd3ab820\" class=\"GINGER_SOFTWARE_mark\"><span id=\"c8d22532-be45-4b15-9f0f-6b86e3b4e34b\" class=\"GINGER_SOFTWARE_mark\"><span id=\"03620296-0ccb-41e3-b2b7-b0b1dfdb49fc\" class=\"GINGER_SOFTWARE_mark\">eNlight<\/span><\/span><\/span><\/span><\/span><\/span> Cloud platform keeps and generates <span id=\"3cde1f5d-77fe-4d8f-acf8-871c184046a3\" class=\"GINGER_SOFTWARE_mark\"><span id=\"d1df66c9-eea5-41fa-bc30-56d9d867af2b\" class=\"GINGER_SOFTWARE_mark\"><span id=\"2e0ae870-0495-4182-95a4-1bc45900d00e\" class=\"GINGER_SOFTWARE_mark\"><span id=\"4a5e1932-be4a-4218-9f91-6c2ebaa85966\" class=\"GINGER_SOFTWARE_mark\"><span id=\"1e4cf25c-10cf-4b2e-ace3-3386bda050ce\" class=\"GINGER_SOFTWARE_mark\"><span id=\"4f5ecb69-72d9-47fd-b609-c1b4e298598e\" class=\"GINGER_SOFTWARE_mark\">log<\/span><\/span><\/span><\/span><\/span><\/span> for each operation and activity that is done on the server. This helps in overall server monitoring and keeping the server healthy. In addition, all the control panel activity logs are available in the Client Area section for future review.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Examining cloud computing security standards, guidelines and features in eNlight Cloud Services. 1) How does eNlight Cloud comply with regulations and legal requirements? A monthly audit is carried out to ensure that eNlight complies with all necessary regulations and legal requirements, as well as to ensure that ESDS is continuing to provide a quality&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[435],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.9.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security in eNlight<\/title>\n<meta name=\"description\" content=\"Examining cloud computing security standards, guidelines and features in eNlight Cloud Services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security in eNlight\" \/>\n<meta property=\"og:description\" content=\"Examining cloud computing security standards, guidelines and features in eNlight Cloud Services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/\" \/>\n<meta property=\"og:site_name\" content=\"ESDS Official Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESDSdc\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-31T15:39:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-31T15:48:45+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2015\/08\/eNlight_CloudSecurity.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ESDSDataCenter\" \/>\n<meta name=\"twitter:site\" content=\"@ESDSDataCenter\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"ESDS Official Knowledgebase\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.esds.co.in\/kb\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2015\/08\/eNlight_CloudSecurity.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#webpage\",\"url\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/\",\"name\":\"Cloud Security in eNlight\",\"isPartOf\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#primaryimage\"},\"datePublished\":\"2015-08-31T15:39:47+00:00\",\"dateModified\":\"2015-08-31T15:48:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/d6f54dbda254c30373f777c3afc1ee85\"},\"description\":\"Examining cloud computing security standards, guidelines and features in eNlight Cloud Services.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/cloud-security-standards-in-enlight-cloud-services\/\",\"name\":\"Cloud Security Standards in eNlight Cloud Services\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/d6f54dbda254c30373f777c3afc1ee85\",\"name\":\"Nilesh\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0ee75c69a8018595f3d1cfb1fc7e524e?s=96&d=mm&r=g\",\"caption\":\"Nilesh\"},\"description\":\"IT tech writer for over 5 years, at ESDS I am to you for the web hosting sector news and technical insights. I also discuss in the context of substantive issues such as new programming languages, high-performance computing and open source.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/3035"}],"collection":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/comments?post=3035"}],"version-history":[{"count":9,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/3035\/revisions"}],"predecessor-version":[{"id":3045,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/3035\/revisions\/3045"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/media?parent=3035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/categories?post=3035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/tags?post=3035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}