DDoS protection
Using our high-bandwidth, globally distributed network built to absorb distributed denial-of-service (DDoS) attacks, applications hosted on our PaaS are protected with our robust security implementation.
Learn moreRead-only file system
Every application is deployed to a read-only file system— meaning no unwanted changes can be made to your code post-deployment. Any software installation or change to the application can only be done through a secure, auditable process, reducing the attack vector of your environments while enhancing your application security.
Learn moreEncryption
Protect your data from unwanted eyes with either at-rest (on Amazon Web Services, Microsoft Azure, OVHcloud, Google Cloud Platform, or Orange Cloud) or in-transit data encryption. Use IaaS-provided key management services to protect your data with at-rest encryption. Or opt for our controlled networks protected by private networking rules, with in-transit encryption to keep data secure.
User management
Take full control of who has access to your projects, invite users to your organization, and grant them permissions to keep things moving with simple, flexible user management. Add, edit, or remove permissions at any time to reflect your project’s and team’s requirements.
Learn morePatches and updates
Biweekly releases of fully tested patches, versions, and upgrades of runtimes and services ensure your applications remain up to date without bugs or breakages. All new security updates are deployed within 30 days—as per our PCI certificate specifications—with major security releases typically rolled out across our entire infrastructure within 2 hours.
Automated TLS certificates
Upsun automatically provides Transport Layer Security (TLS) certificates from
Let’s Encrypt for all sites and environments at no additional cost. Each certificate is valid for 90 days and is automatically renewed 28 days before expiration. So you can rest easy and forget about the admin.
Learn moreKeyless SSH
Access your applications without having to worry about the keys. Keyless Secure Shell (SSH) access—powered by OAuth 2 and SSH certificates—securely connects users to their application server faster.
Learn moreMultifactor authentication
Enhanced security with multifactor authentication (MFA) requires a second security factor from users to gain SSH access to their Upsun projects. Selected on a per-project basis, Upsun users can implement MFA through the Upsun console on as few or as many projects as they want.
Learn moreWeb application firewall
Our built-in Platform.sh web application firewall (WAF) protects every application and environment hosted on Upsun by monitoring requests to your application and blocking anything suspicious.
Learn morePCI DSS and SOC 2 compliance
SOC 2 Type 2 and PCI DSS Level 1-compliant cloud hosting—fully automated and managed by Upsun—gives you more time to focus on code. Regular, independent third-party audits provide an external examination of the controls we’ve implemented on our infrastructure and operations, helping to ensure the highest security standards.
Insurance
We’ve got you covered. Upsun, powered by Platform.sh, has group-level Public Liability and Technology Error and Omission insurance securely in place. All Platform.sh subsidiaries, including Upsun, are covered by these policies to give you true peace of mind.
Privacy
We care about our customers and strive to be good custodians of their data. We don’t sell your data and remain transparent about how we use it. Adhering to GDPR, CCPA/CPRA, SOC 2, the Australian Privacy Act, and PIPEDA to ensure the highest standards of data privacy regulation.
Subprocessors
Upsun engages subprocessors in countries within and outside of the EU and ensures that all data transfers are executed with the proper contract templates: our
EU DPA for transfers to the EU and countries with an
adequacy decision as designated by the European Commission, or SCCs plus Supplementary Measures Assessments for transfers to countries lacking an adequacy decision.
Policies and procedures
Built with a security-first mindset, Upsun policies and procedures are designed to cover the core aspects of information security: confidentiality, integrity, and availability. From data retention and data breach to firewall policy and vendor management,
our extensive policies secure data and applications in line with cybersecurity best practices.