Regulatory Compliance

We keep security and availability at the heart of our products, infrastructure and company policies.

SOC 2 (Type II)

CloudLinux`s SOC 2 Type II Report attests to our technical and internal operational controls regarding security and availability. Contact our Support team to read the Report.

PCI DSS

The Payment Card Industry Data Security Standards (PCI DSS) certification safeguards cardholder data. CloudLinux complies with PCI DSS for every monetary transaction a customer makes. Contact our Support team to read the Self-Assessment Questionnaire (SAQ).

GDPR

CloudLinux guarantees full compliance with the General Data Protection Regulation (GDPR). Customer data and information are encrypted and accessible only by the customer. CloudLinux users can request deletion of their personal data at any time. Contact our Support team to activate your right of erasure.

HIPAA

CloudLinux complies with the Health Insurance Portability and Accountability Act’s hosting standards for protecting the private health information of our client`s patients.

CCPA

CloudLinux complies with the California Consumers Protection Act (CCPA) requirements, ensuring the protection of personal data and personal privacy when collecting and using customer information.

Protecting your information and privacy

Data Security

Through industry-standard data protection, secure infrastructure, and third-party verification, CloudLinux ensures data security across our product ecosystem.

Data Ownership

Your data and information are yours—we do not, and will not, sell or rent your or your team’s information. We don’t help third parties advertise their products to you.

Secure Infrastructure

CloudLinux infrastructure is built to protect your data according to high industry standards.

Data Hosting

CloudLinux hosts data in reputable data centers in US and Europe regions and ensures continual product availability by using native backup tools. Industry-leading infrastructure providers are certified as compliant with ISO 27001 and have received a SOC 2 (Type II) report.

Data Encryption

CloudLinux encrypts all data in transit and at rest. Data transfer is protected using the industry-standard TLS 1.2 protocol, while data at rest is encrypted using AES-256 server-side encryption.

Security is embedded in our culture

Maintaining a secure company, product, and infrastructure is top of mind at CloudLinux across teams and departments. Our rigorous security policies and procedures are woven into how we operate as an organization with integrity and ethics.

Dedicated security team

CloudLinux in-house team of security specialists is focused on ensuring security across the company—in our product and infrastructure, as well as in all operations. The team also oversees risk management and standards compliance. Company executives are directly involved in overseeing security strategy.

Internal training & monitoring

CloudLinux employees complete mandatory annual training on a wide range of privacy and security topics.

Access management

CloudLinux adheres to the principle of least privilege—employees’ data access rights are regularly reviewed to ensure only minimum required privileges are granted. All required workstations run on centrally controlled endpoint-management software that enforces security configurations and protection solutions.

Your compare list

Compare
REMOVE ALL
COMPARE
0
EN