Skip to content

Commit 9ef652a

Browse files
author
tcpdumpfbacke
committed
Proof
1 parent ae469a2 commit 9ef652a

File tree

15 files changed

+60
-60
lines changed

15 files changed

+60
-60
lines changed

pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.de-de.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
66

77
## Objective
88

9-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
1010

1111
## 1.Certifications
1212

@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
6060
| **Source** | **Content** | **Documentation** |
6161
| --- | --- | --- |
6262
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET) |
63-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
63+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
6464

6565
## 6.API
6666

@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104104
>
105105
106-
For a MongoDB engine :
106+
For a MongoDB engine:
107107

108108
- **Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132132

133133
### 8.3 CVE monitoring
134134

135-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136136

137137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
138138

pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-asia.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
66

77
## Objective
88

9-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
1010

1111
## 1.Certifications
1212

@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
6060
| **Source** | **Content** | **Documentation** |
6161
| --- | --- | --- |
6262
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET) |
63-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
63+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
6464

6565
## 6.API
6666

@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104104
>
105105
106-
For a MongoDB engine :
106+
For a MongoDB engine:
107107

108108
- **Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132132

133133
### 8.3 CVE monitoring
134134

135-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136136

137137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
138138

pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-au.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
66

77
## Objective
88

9-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
1010

1111
## 1.Certifications
1212

@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
6060
| **Source** | **Content** | **Documentation** |
6161
| --- | --- | --- |
6262
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET) |
63-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
63+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
6464

6565
## 6.API
6666

@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104104
>
105105
106-
For a MongoDB engine :
106+
For a MongoDB engine:
107107

108108
- **Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132132

133133
### 8.3 CVE monitoring
134134

135-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136136

137137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
138138

pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-ca.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
66

77
## Objective
88

9-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
1010

1111
## 1.Certifications
1212

@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
6060
| **Source** | **Content** | **Documentation** |
6161
| --- | --- | --- |
6262
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET) |
63-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
63+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
6464

6565
## 6.API
6666

@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104104
>
105105
106-
For a MongoDB engine :
106+
For a MongoDB engine:
107107

108108
- **Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132132

133133
### 8.3 CVE monitoring
134134

135-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136136

137137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
138138

pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-gb.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
66

77
## Objective
88

9-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
1010

1111
## 1.Certifications
1212

@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
6060
| **Source** | **Content** | **Documentation** |
6161
| --- | --- | --- |
6262
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET) |
63-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
63+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs` |
6464

6565
## 6.API
6666

@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104104
>
105105
106-
For a MongoDB engine :
106+
For a MongoDB engine:
107107

108108
- **Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132132

133133
### 8.3 CVE monitoring
134134

135-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136136

137137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
138138

0 commit comments

Comments
 (0)