Toggle menu

Cloud Security Principles

Separation Between Users

A malicious or compromised user of the service should not be able to affect the service or data of another.

NCSC - Separation Between Users

The hosting services use "Infrastructure as a Service" and "Public Deployment" models. We provide a managed "Platform as a Service" to you.

All of our services run on Virtual Machines, AWS EC2 and Google Cloud Compute instances respectively. Network services are virtualised using Virtual Private Cloud offerings from both providers.

Virtual machines, networks and security rules are dedicated to a single hosted client and environment, those resources are not shared between clients and there is no network connectivity between clients or different environments for the same client.

Last modified on January 19, 2022

Share this page

Facebook icon Twitter icon email icon

Print

print icon