Dedicated Server Security Specifications

Knowledge Base

Dedicated Server Security Specifications


Icons/System/eye-open Created with Sketch. 84 Views 30.06.2024 Cloud / Dedicated Server (bare metal)

Objective

In addition to the responsibility model between OVHcloud and the customer on the Dedicated Server service, this sheet aims to present the specific features and security features of this service. It also highlights best practices that will enable the customer to make the most of it.

1 - Certifications

  • ISO/IEC 27001
  • ISO/IEC 27701
  • ISO/IEC 27017
  • ISO/IEC 27018
  • HDS
  • SOC 1 type II
  • SOC 2 type II
  • CSA type II
  • C5 type II
  • CISPE

2 - Best practices to deploy on the service

2.1 - Recommendations for getting started

Once the service has been delivered, and after receiving the login credentials for connecting to its Dedicated Server, OVHcloud recommends that the customer change their credentials and harden its operating system. Hardening references and guides are discussed in 9.1 OS Image Delivery and hardening of this page.
Other guides are available in the guide on Dedicated Servers to assist the customer with the transfer control and operation of the service.

2.2 - Vulnerability Scan

The customer is authorized to carry out vulnerability scans on the service they have subscribed to at OVHcloud from any service. OVHcloud does not need to be notified prior to the tests. The security measures deployed by OVHcloud (especially network protections) cannot be deactivated, even more so Reason for conducting such audits which should establish a clear view of the security of the customer’s infrastructure. The customer is not authorized to use their service to scan other infrastructure.

3 - Service Guarantees

3.1 - SLA

Recovery of the SLAs of the specific conditions by service component.

ComponentSLACalculation methodCompensation
Dedicated Server99.9% minimum (depending on the range)The total number of minutes in the month, less the number of minutes of downtime in the month, divided by the total number of minutes in the month. For calculating compensation, the downtime is calculated from the moment the incident ticket is opened, until the issue is resolved.Credit of 5% of the monthly cost of Dedicated Servers that are unavailable, in increments of 30 minutes of downtime beyond the SLA, up to a limit of 50% of the monthly cost.

3.2 - GIT

Incident typeIntervention timeRecovery timeCompensation
Level 1 incident: total unavailability of the service detected by OVHcloud1 hour1 hour from the beginning of the interventionIncident detection by OVHcloud
Level 1 incident: total service unavailability reported by customer1 hour1 hour from the beginning of the interventionCreation of ticket by the customer
Level 2 incident: substantial degradation of Dedicated Server performance1 hourØCreation of ticket by the customer

4 - Backups

4.1 - Technical backups

Technical backups are the backups taken by OVHcloud to ensure the service levels stipulated in the contract. These backups are not intended to be enabled at the customer's request. These backups do not contain any business data deposited by customers on their own dedicated servers.

These are backups of infrastructure configurations that deliver the service to customers such as: router configuration, vRack configurations, IP allocation, etc.

4.2 - Business backups

List of features and backup options adapted to the service:

Option nameGranularityRTORPODocumentation and tutorials
- FTP backup or Backup Storage is a 500GB storage space made available to the customer following subscription to the service.
- The service must be activated by the customer.
- No backup routine is configured by OVHcloud.
At the customer's choiceDepends on customer choiceN/AUse Backup Storage on a dedicated server
- Backup Storage is an additional storage option that allows you to have up to 10TB of additional disk space to deposit backups.At the customer's choiceDepends on customer choiceN/AUse Backup Storage on a dedicated server

5 - Logs

Read the guide Getting started with OVHcloud APIs to get familiar with using OVHcloud APIv6.

SourceContentLinks
Control PlaneLogs on all interactions made via API calls, launched by admin, technical or billing contacts, on the services they have access to.- https://api.ovh.com/console/#/me (see /me/api/logs calls)
- List of API calls done with your account
- List of API calls done on services you have access to
ServiceList of tasks launched on a given serverDedicated Servers ToDos
ServiceList of interventions launched on a given serverTechnical interventions history

Tasks are actions launched by the client on a Dedicated Server: installing the OS, rebooting the OS, activating 'rescue' mode, etc ...

Interventions are actions carried out by OVHcloud teams in the Datacentres on the physical servers: checking the state of the equipment, changing CPU, RAM or defective disk, etc.

6 - API

NameCapabilitiesLinks
Control Plan and serviceManipulating customer accounts and services on which the account has service management rightsAPI calls for Dedicated Servers

7 - User accounts

7.1 - Control Plane

Via the OVHcloud Control Panel, the customer can manage the service using three typical contacts.

To reference each customer who has subscribed to one or more services, OVHcloud uses a proprietary account with an internal NIC handle.

To increase access to the customer account, the customer can enable two-factor authentication (2FA) or single sign-on (SSO) by linking their account to an external Active Directory.

7.2 - Data Plane

Once the service has been delivered, at the OS installation stage, the customer has the choice between using an SSH key (for Linux distributions) to access their server, or a single password, generated automatically by OVHcloud if they have not configured an SSH key.

The client is autonomous in creating user accounts on its OS, once it has administrative rights on its server.

8 - Anti-virus

OVHcloud does not support installing antivirus software when installing the operating system. The customer is responsible for deploying security measures on the dedicated servers they operate.

9 - Services available when the Service is installed

9.1 - Providing OS images and hardening

Read the guide Getting started with OVHcloud APIs to get familiar with using OVHcloud APIv6.

OVHcloud offers a catalog of operating systems, and is committed to providing operating systems that were last updated less than 30 days ago.

The hardening of the operating systems provided is that of a nominal installation of the publisher. For advanced hardening, OVHcloud recommends referring to each publisher’s documentation .

PublisherHardening Documentation
Debianhttps://wiki.debian.org/Hardening
Redhathttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/overview-of-security-hardening-security-hardening
Ubuntuhttps://ubuntu.com/security/certifications/docs/usg
Windowshttps://docs.microsoft.com/en-gb/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines

9.2 - Bring Your Own Image

Bring Your Own Image is a feature that allows the customer to import an image of their choice to a server outside of the catalog offered by OVHcloud. Prerequisites and instructions are available on this link.

9.3 - OVHcloud Monitoring

A monitoring service is activated by default by OVHcloud to monitor the status of customers' servers, via the ICMP protocol. Customers can track the status of their own servers or disable this service, via their OVHcloud Control Panel or via an API call.

The client can also enable monitoring of other network services that are disabled by default.

It is the customer’s responsibility to follow the tightening guidelines of the OS publishers and to restrict ICMP flows to what is strictly necessary.

In order to continue to benefit from the OVHcloud monitoring service, the customer must configure filtering rules on their servers’ internal firewall, and select the other services whose status they want to track.

OVHcloud offers a feature called OVHcloud Link Aggregation that can be activated by the customer and which allows them to benefit from a high-speed, redundant private network for their Dedicated Servers.

If the customer activates this feature, the monitoring carried out by OVHcloud will be disabled.

10 - Reversibility

To ensure data portability and reversibility on the service, OVHcloud allows the customer to export and import their data autonomously. OVHcloud’s portability principles are described in its own portability policy, and those specific to the Dedicated Servers service are set out in its specific policy.

10.1 - Business Data Erasure

Following the customer’s decommission of the service and prior to the removal of the hard drive from the rack, an erasing robot applies a secure data erasure procedure based on the NIST SP 800-88 r1 level ‘Purge’. In case of technical constraints or limitations on certain ranges of hard drives and when the level 'Purge' cannot be applied, the erase at the level 'Clear' will run.

10.2 - Technical data erasure

Following the customer’s decommission of the service, OVHcloud frees up the resources allocated to them, such as the IP addresses and deletes the configurations made during service delivery.

11. HDS guarantee representation

This table is published prior to OVHcloud's effective certification on the 2024 version of the HDS repository. It allows OVHcloud customers to fuel their own compliance approach with the HDS version 2024 framework. OVHcloud has created and published this table in an effort to apply the different requirements of the repository as closely as possible. The versions audited by the auditors were posted online before February 2024.

Company name of the actorRole in hosting serviceHDS certifiedSecNumCloud 3.2 QualifiedHosting activities on which the player intervenesHDS Repository Requirement #29HDS Repository Requirement #30
OVHcloudWeb hosting providerYesNo1° The provision and maintenance in operational condition of the physical sites used to host the hardware infrastructure of the information system used for the processing of healthcare data.
2° The provision and maintenance in operational condition of the hardware infrastructure of the information system used for the processing of healthcare data.
3° The provision and maintenance in operational condition of the virtual infrastructure of the information system used for the processing of healthcare data.
4° The provision and maintenance in operational condition of the platform for hosting applications of the information system.
6° The backup of healthcare data.
No, no access to data from a third country in the European Economic AreaNo(1)

(1): OVHcloud complies with all the requirements of Chapter 19.6 of the SecNumCloud framework for protection against non-European law.

Related articles