Technical Security

  • Secure
  • Protect
  • Control
  • Secure Dev
  • Bug Bounty Program
  • Regular Pentest

technical-security

  • Secure Code
  • Data Center Redundancy
  • Network Redundancy
  • Power-Supply Redundancy

secure

  • Instances and Security Groups are closed by default
  • Databases fully encrypted and filtered by default
  • Secured Access Control Lists on all storage buckets
  • Included DDOS Protection of the network

protect

  • Role-Based Access Control to Exoscale organizations
  • Two-Factor Authentication supported
  • Optional SSO configuration
  • Full IAM for all API calls
  • Audit Trail for all events

control

  • Code Review
  • Change Management
  • Secure Development Practices

secure-dev

  • Competitive Bounties
  • 300 active Researchers taking part in the program
  • Bugcrowd a crowdsourced security platform. It is one of the internet’s largest bug bounty and vulnerability disclosure companies.

bug-bounty

  • Annual Pentest
  • Performed by Third Parties
  • Full Product Coverage

regular-pentest