Cloud Security Principles
Separation Between Users
A malicious or compromised user of the service should not be able to affect the service or data of another.
NCSC - Separation Between Users
The hosting services use "Infrastructure as a Service" and "Public Deployment" models. We provide a managed "Platform as a Service" to you.
All of our services run on Virtual Machines, AWS EC2 and Google Cloud Compute instances respectively. Network services are virtualised using Virtual Private Cloud offerings from both providers.
Virtual machines, networks and security rules are dedicated to a single hosted client and environment, those resources are not shared between clients and there is no network connectivity between clients or different environments for the same client.