Secure cloud and audit for compliance with the personal data law (152-FL)

Storage of confidential data in a secure infrastructure and audit of personal data processing systems

secure cloud

key features

Compliance with personal data legislation and minimizing the risk of critical data loss

Regulatory compliance

Assigning experts to support equipment and ensure compliance with the requirements of the Federal Law-152

Focus on core business processes

Improving the resilience and availability of IT systems

Increased fault tolerance

Regular hardware upgrades and software updates by a competent provider

Timely hardware and software updates

our solutions

Fast start

Ready-made architecture for personal data processing system under data protection level 2 to 4 in a matter of 2 hours


Ensure low installation cost and reduced cost of ownership of personal data processing system

high reliability

Cloud platform based on TIER III data center; SLA up to 99.95%

data protection

Control of data access at the virtual and physical level


Over 20 years in the IT industry, licensed by FSTEC and FSB


Expert statements and certificates of conformity with the requirements of personal data law (152-FL)



BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.


To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

solution overview

infrastructure as a service (iaas)

security as a service (secaas)

what you get

personal data law (152-FL) compliance audit

solution for your business goals

If you process large volumes of personal data, including special and biometric personal data

processing large volumes of personal data

If you are planning to localize your IT infrastructure in Russia to comply with Federal Law-152

localization of IT infrastructure

If you are building your own secure information system for storing and processing personal data

creation of your own personal data storage

your benefits

Identification and mitigation of risks associated with personal data processing

Individual advice and planning for improving your personal data processing system

Improved reliability of customer’s information systems

Regulatory compliance

solution overview


1 interview

In-depth interviews with stakeholders within the company involved in processing personal data

2 Documentation

Audit of documentation on personal data processing and storage

3 technical parameters

Researching the technical aspects of the personal data processing system

4 finding vulnerabilities

Security audit of personal data processing system using software and hardware security scanners. Identification of vulnerabilities in network architecture and hardware configuration

5 recommendations

Recommendations for improvement of personal data processing system and related business processes to minimize the risks associated with the processing and storage of personal data

what you get

A detailed report on the compliance with the requirements of the Personal Data Law of Russia

The list of specific steps to organize the processing of natural resources in accordance with 152-FL and international safety standards


Get a quote

Licenses and certificates

How can we help you?

Thank you for your inquiry, we will get back to you shortly!

Request Demo Access