You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.de-de.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
6
6
7
7
## Objective
8
8
9
-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9
+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
10
10
11
11
## 1.Certifications
12
12
@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
60
60
|**Source**|**Content**|**Documentation**|
61
61
| --- | --- | --- |
62
62
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET)|
63
-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
63
+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
64
64
65
65
## 6.API
66
66
@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103
103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104
104
>
105
105
106
-
For a MongoDB engine:
106
+
For a MongoDB engine:
107
107
108
108
-**Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109
109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132
132
133
133
### 8.3 CVE monitoring
134
134
135
-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135
+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136
136
137
137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
Copy file name to clipboardExpand all lines: pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-asia.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
6
6
7
7
## Objective
8
8
9
-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9
+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
10
10
11
11
## 1.Certifications
12
12
@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
60
60
|**Source**|**Content**|**Documentation**|
61
61
| --- | --- | --- |
62
62
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET)|
63
-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
63
+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
64
64
65
65
## 6.API
66
66
@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103
103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104
104
>
105
105
106
-
For a MongoDB engine:
106
+
For a MongoDB engine:
107
107
108
108
-**Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109
109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132
132
133
133
### 8.3 CVE monitoring
134
134
135
-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135
+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136
136
137
137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
Copy file name to clipboardExpand all lines: pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-au.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
6
6
7
7
## Objective
8
8
9
-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9
+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
10
10
11
11
## 1.Certifications
12
12
@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
60
60
|**Source**|**Content**|**Documentation**|
61
61
| --- | --- | --- |
62
62
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET)|
63
-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
63
+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
64
64
65
65
## 6.API
66
66
@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103
103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104
104
>
105
105
106
-
For a MongoDB engine:
106
+
For a MongoDB engine:
107
107
108
108
-**Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109
109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132
132
133
133
### 8.3 CVE monitoring
134
134
135
-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135
+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136
136
137
137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
Copy file name to clipboardExpand all lines: pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-ca.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
6
6
7
7
## Objective
8
8
9
-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9
+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
10
10
11
11
## 1.Certifications
12
12
@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
60
60
|**Source**|**Content**|**Documentation**|
61
61
| --- | --- | --- |
62
62
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET)|
63
-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
63
+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
64
64
65
65
## 6.API
66
66
@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103
103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104
104
>
105
105
106
-
For a MongoDB engine:
106
+
For a MongoDB engine:
107
107
108
108
-**Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109
109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132
132
133
133
### 8.3 CVE monitoring
134
134
135
-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135
+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136
136
137
137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
Copy file name to clipboardExpand all lines: pages/public_cloud/data_analytics/analytics/information_01_security_overview/guide.en-gb.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ updated: 2025-11-04
6
6
7
7
## Objective
8
8
9
-
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheets aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
9
+
In addition to [the responsibility model for Analytics services](/pages/public_cloud/data_analytics/analytics/information_06_shared_responsibility/), this security fact sheet aims at describing security features and functions associated to the service. It describes also best practices that customers can adopt to secure their services.
10
10
11
11
## 1.Certifications
12
12
@@ -60,7 +60,7 @@ If you need to restore your data using a backup, you can follow [this guide](/pa
60
60
|**Source**|**Content**|**Documentation**|
61
61
| --- | --- | --- |
62
62
| Control Panel | Logs of interactions made by admin, technical or billing contacts in the Control Panel and services they have access to, using API calls. |- <https://api.ovh.com/console/#/me> (see `/me/api/logs`)<br>- [List of API calls done with your account](https://api.ovh.com/console/#/me/api/logs/self~GET)<br>- [List of API calls done on services you have access to](https://api.ovh.com/console/#/me/api/logs/services~GET)<br>-[Get your audit logs](https://api.ovh.com/console/#/me/logs/audit~GET)|
63
-
| Service | 1000 last logs for service usage | See Sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
63
+
| Service | 1000 last logs for service usage | See sheet 'log' in the Control Panel<br>- or via API (for Cassandra service as an example `/cloud/project/{serviceName}/database/cassandra/{clusterId}/logs`<br>- `/cloud/project/{serviceName}/database/{serviceType}/{clusterId}/logs`|
64
64
65
65
## 6.API
66
66
@@ -103,7 +103,7 @@ These operations are made, by default, by the OVHcloud operation team.
103
103
> Currently, OVHcloud does not offer KMS as a service, you cannot bring your own keys. KMIP is managed by OVHcloud.
104
104
>
105
105
106
-
For a MongoDB engine:
106
+
For a MongoDB engine:
107
107
108
108
-**Nodes:** service instances and the underlying VMs use full volume encryption using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) with a randomly generated ephemeral key for each instance and each volume.
109
109
The key is never re-used and will be trashed at the destruction of the instance, so there’s a natural key rotation with roll-forward upgrades.
@@ -132,7 +132,7 @@ Data is encrypted client-side with customer-controlled encryption keys, before b
132
132
133
133
### 8.3 CVE monitoring
134
134
135
-
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check...<br>
135
+
The OVHcloud operation team in charge of the maintenance of Public Cloud Analytics services is constantly monitoring CVE on the different DBMS available. This monitoring is done through different channels, official mailing lists, security community, internal security check, etc.<br>
136
136
137
137
We are also in constant communication with the MongoDB team, in order to provide fast and smooth transition to the latest security version of MongoDB.
0 commit comments