Move to the CenturyLink Cloud with confidence.
With our "defence in depth" approach, customer environments are protected by multiple security measures at every level - securing physical equipment, cloud resources, and customer data. In addition, an extensive permissions system extending to the group and individual VM levels ensure only authorized users can access and alter systems. And we've worked with the leading IT auditing firms to ensure our systems are ready to support most global organizations.
We provide customers with role-based access to their cloud environments. Users access the Control Portal with a username and password, or by Single Sign On through SAML. All actions performed by users through the Control Portal - such as provisioning servers, adding public IP addresses and powering-on a server - are logged and auditable. These logs are never deleted, and customers can view access logs on an entity by entity basis.
CenturyLink Cloud establishes a robust digital perimeter around your cloud environment. Access to customer servers can only be done via a certificate-based VPN connection unless specific public ports have been explicitly opened up by the customer. Customers can extend to two-factor authentication via LDAP (Microsoft Active Directory or OpenLDAP on Linux) for additional security where needed.
Customer environments on the CenturyLink Cloud are protected by a series of redundant Juniper SRX firewalls employing Unified Threat Management (UTM) technology. Each customer service runs on its own private VLAN, and each virtual machine is isolated with zone-based firewalls. Customers can also use secure connections such as Persistent\User VPN, Direct Connection, or MPLS.
Data centre Intrusion Detection System (IDS) and Intrusion Detection and Protection System (IDP) attack detection and prevention features screen incoming traffic for potential attacks. This protection is available data centre-wide, and is implicitly enabled. Read this KB article for more details on CenturyLink Cloud and IDS & IDP.
In addition to real-time monitoring and NOC support, we perform Nessus vulnerability scans upon request as a service task. Then, you can choose to work with us as part of a paid engagement to mitigate any vulnerabilities, or take action on their own. To make sure that cloud servers are regularly protected with the latest operating system patches, CenturyLink Cloud offers managed operating system capabilities that keep customer machines up-to-date with vendor updates.
Each CenturyLink Cloud data centre is housed within private, caged enclosures. Entry to the data centre premises requires an electronic proximity key card. Data centre facilities are staffed 24x7x365 and monitored by cameras. An electronic proximity card control portal, biometric scan, and onsite data centre personnel provide additional security inside the facility. Only CenturyLink authorized staff are allowed access to the private cage enclosure and they access physical hosts via two factor VPN authentication (SSH or RDP Access with Local administrator/root account and password required). All access is logged in both the control panel and the ticketing system.
CenturyLink understands that compliance is essential. We offer a variety of solutions that adhere to the most stringent of compliance standards (HIPAA, SOC1, SOC2, SOC3, ISO, PCI, FERPA and COPPA.) Even if your solution doesn’t require regulatory compliance at this time, know that CenturyLink can scale with you and provide the protection and ease of mind when you do. Learn more about compliance.
Servers need to be regularly patched to stay secure and remain compliant with the OS vendor requirements. This is particularly important for longstanding VMs that your business counts on to always be up and running without a hitch. CenturyLink Cloud offers Automatic Operating System Patching Management — or Patching-as-a-Service — that will automatically patch individual servers or Groups. You can enable the service through a Blueprint, script package or an API. Once deployed, the service informs you when the patching begins and ends via email. You can also pull the list of patches applied via API to ensure that all critical patches have been installed on your servers. It’s a simple thing, with a big payoff in time savings and peace of mind. Learn more about Automated Patch Management.
Connect networks within a particular data centre through the use of configurable firewall policies, and create firewall policies that connect different data centres.
Ensure maximum uptime and reliability, the CenturyLink Cloud offers a portfolio of cloud load balancers to meet the unique requirements of your apps.
Protect your data across the public internet with desktop virtual private network (VPN) software via a self-service, persistent network-to-network tunnel.
Lightning-quick servers in the public cloud with 100% flash storage. Breakthrough performance for data and web scale architectures.
CenturyLink Named “Visionary” in the Gartner 2014 MQ for Cloud IaaS.Get the Report
We’ve helped businesses like yours be more successful in the cloud.View Success Stories
Ready to talk pricing? Tell us about your project, and let our cloud experts put a proposal together for you.Request a Quote