Skip to main content

Security & Compliance

Octos Cloud infrastructure is designed with security at every layer — from physical data center access to software-defined isolation. All data stays within Indian borders.

Data residency

All Octos Cloud data centers are located in India. Your data never leaves Indian jurisdiction, ensuring compliance with:

  • Reserve Bank of India (RBI) data localization guidelines
  • SEBI regulations for financial services
  • MEITY government data residency requirements
  • DPDP Act (Digital Personal Data Protection) requirements

Infrastructure certifications

CertificationStatus
ISO 27001Information Security Management
SOC 2 Type IISecurity, Availability, Confidentiality
PCI DSSPayment Card Industry Data Security
HIPAAHealth Information Privacy (on request)

Contact sales for detailed audit reports and compliance documentation.

Physical security

Octos Cloud operates from Tier-III+ certified data centers with:

  • 24/7 manned security and CCTV surveillance
  • Biometric access controls
  • Redundant power systems with N+1 UPS
  • Fire suppression systems
  • Seismic-resistant construction

Network security

ControlImplementation
DDoS mitigationAlways-on, automated L3/L4 protection
FirewallSecurity groups with stateful packet inspection
IsolationPer-tenant network segmentation
Private networkingFully isolated L2/L3 networks

Encryption

LayerStandard
At restAES-256 encryption for all block storage
In transitTLS 1.3 for all management plane traffic
Key managementHardware Security Modules (HSM)

Access controls

  • Role-based access control (RBAC) — Assign granular permissions to team members
  • Two-factor authentication (2FA) — Email-based OTP on every login
  • API tokens — Scoped personal access tokens with configurable expiry
  • Activity logs — Full audit trail of all portal actions
  • Login history — IP address and timestamp tracking

Shared responsibility model

ResponsibilityOctos CloudCustomer
Physical infrastructure
Hypervisor security
Network infrastructure
OS patching (on managed services)
Security group configuration
OS patching (on VMs)
Application security
Data backup strategy
Access key management

Next steps