Security & Compliance
Built-in protections and documentation to help you meet security and audit requirements—without slowing down operations.
Defense-in-depth by design
EDpCloud favors secure defaults, least-privilege operation, and verifiable data integrity across all replication paths.
Data protection
- In transit: TLS by default, modern cipher suites
- At rest: encrypted repositories and credential protection
- Integrity: checksums and verification with optional versioning/retention
Access & identity
- Role-based controls for admins/operators
- Separation of duties; minimal credentials on endpoints
- Key rotation and credential scoping recommendations
Hardening & operations
- Host and network hardening guides
- Structured logging & audit-friendly events
- Config backup and disaster-recovery runbooks
Compliance alignment
| Control Area | What EDpCloud Provides | Customer Responsibility | Artifacts |
|---|---|---|---|
| Encryption in transit | TLS-protected channels | Cert lifecycle mgmt | Security brief, config guide |
| Encryption at rest | Encrypted data stores (where applicable) | Key mgmt / HSM policies | Security brief |
| Access control | RBAC, scoped roles | IAM policies, joiner/mover/leaver | Admin guide |
| Logging & audit | Structured logs, event streams | SIEM ingestion, retention | Logging guide |
| DR/BCP | Replication policies, runbooks | Business RTO/RPO definition | DR guide |
| Vulnerability mgmt | SBOM, update advisories | Patch scheduling, scanning | SBOM, release notes |
Documentation package
- Security brief (PDF)
- SBOM and release notes
- Hardening checklist (Linux/Windows)
- Logging/observability integration notes
Frequently asked questions
What encryption does EDpCloud use by default?
TLS for data in transit and encrypted storage options for data at rest.
Can EDpCloud fit into zero-trust architectures?
Yes—use scoped credentials, segment by policy, and enforce mutual TLS where applicable.
How do you handle keys and certificates?
We support external key/cert management and document rotation patterns.
Do you provide an SBOM and security advisories?
Yes—SBOMs and advisories are available with each significant release.
How do you support audits?
We provide deployment diagrams, config samples, and event catalogs to align with audit requests.
Share this Post