SECURE CLOUD AND PERSONAL DATA LAW (FZ-152) COMPLIANCE

"Linxdatacenter" offers cloud infrastructure services under cloud 152-fz in systems of security levels III and IV for storing personal data in information systems. We are included in the register of personal data operators, certified by FSTEC and FSS.

secure cloud

key features

Compliance with personal data legislation and minimizing the risk of critical data loss

Regulatory compliance

Assigning experts to support equipment and ensure compliance with the requirements of the Federal Law-152

Focus on core business processes

Improving the resilience and availability of IT systems

Increased fault tolerance

Regular hardware upgrades and software updates by a competent provider

Timely hardware and software updates

our solutions

Fast start

Ready-made architecture for personal data processing system under data protection level 2 to 4 in a matter of 2 hours

cost-effectiveness

Low one-time costs and reduced cost of ownership of personal data processing system

high reliability

Cloud platform based on TIER III data center; SLA up to 99.95%

data protection

Control of data access at the virtual and physical level

expertise

Over 20 years in the IT industry, licensed by FSTEC and FSB

documentation

Expert statements and certificates of conformity with the requirements of personal data law (FZ-152)

CASES

client:

BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.

Solution

To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

solution overview

infrastructure as a service (iaas)

security as a service (secaas)

what you get

personal data law (fz-152) compliance audit

solution for your business goals

If you process large volumes of personal data, including special and biometric personal data

processing large volumes of personal data

If you are planning to localize your IT infrastructure in Russia to comply with Federal Law-152

localization of IT infrastructure

If you are building your own secure information system for storing and processing personal data

creation of your own personal data storage

your benefits

Identification and mitigation of risks associated with personal data processing

Individual advice and planning for improving your personal data processing system

Improved reliability of customer’s information systems

Regulatory compliance

solution overview

stages

1 interview

In-depth interviews with stakeholders within the company involved in processing personal data

2 Documentation

Audit of documentation on personal data processing and storage

3 technical parameters

Researching the technical aspects of the personal data processing system

4 finding vulnerabilities

Security audit of personal data processing system using software and hardware security scanners. Identification of vulnerabilities in network architecture and hardware configuration

5 recommendations

Recommendations for improvement of personal data processing system and related business processes to minimize the risks associated with the processing and storage of personal data

what you get

A detailed report on the compliance with the requirements of the Personal Data Law of Russia

The list of specific steps to organize the processing of natural resources in accordance with 152-FZ and international safety standards

Basic questions and answers

Licenses and certificates

Write to us

Secure cloud — FZ-152

BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.

Solution

To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

client:

BEST, money transfer and payments operator

business challenge

The customer faced a technical issue with a persistent BGP session flag with Linxdatacenter hardware. We examined the problem and found out that one of customer’s hosts was under a DDoS attack.

Because of the distributed nature of the attack, traffic couldn’t be filtered effectively, and disconnecting the host from the external network wasn’t an option. The attack stopped after changes in the server configuration, but resumed the day after. A 5.5 Gbps attack overloaded the junctions with internet providers, affecting other Linx Cloud users. To mitigate the effects of the attack, we employed a dedicated DDoS protection service.

Solution

To ensure the continuous availability of resources hosted in Linx Cloud, we rerouted all the customer’s traffic through StormWall Anti-DDoS system. The attack was stopped within half an hour. To prevent future cyberattacks, we organized all connections to the customer’s resources through the StormWall network.

Thank you for your inquiry, we will get back to you shortly!