• Powered by Platform.sh
  • English
  • Contact us
  • Docs
  • Login
Watch a demoFree trial
Trust Center
Trust Center
Trust CenterPrivacySecurityReliabilityLegal
Trust CenterSecurityData collection

Data collection

Active version 1.0 | Updated 03 September 2025

Table of contents

Information about data privacy, including our Record of Processing Activities, can be found at our Privacy page.

Application logs

Application logs are those generated by the host application or application server (such as PHP-FPM). These logs are immutable to Customers to prevent tampering. They are also secured behind key-based SSH so that only the Customer and our relevant teams have access.

System logs

Upsun records routine system logs. We do not access Customer-specific system logs or the customer environment unless one of the following situations applies:

  1. we are requested to do so by the Customer,
  2. to fix a problem or outage,
  3. to prevent an outage, or
  4. to comply with a legal obligation.

Access logs

There are two main types of access logs: Web and SSH.

Web access logs

Application access logs are immutable to Customers to prevent tampering. These logs are secured behind key-based SSH so that only the Customer and our relevant teams have access.

SSH access logs

SSH access logs are securely stored in our infrastructure and aren’t accessible to Customers. These logs can be accessed by Upsun support personnel as part of an audit, if requested.

Access by Customers and Upsun support personnel to customer environments is logged. However, to protect Customer privacy, we only log the connection itself, not what was done during the session.

Active version 1.0 | Updated 03 September 2025

© 2025 Platform.sh. All rights reserved.