Q. How are systems, data, networks, management, provisioning, and personnel segmented?
A. Customers are segregated using a number of virtualisation and networking technologies. More details are available on a per-product basis.
Q. Are the controls segregating each layer of the infrastructure properly integrated so they do not interfere with each other? For example, investigate whether the storage compartmentalization can easily be bypassed by management tools or poor key management.
A. We use industry standard protocols and systems that have been thoroughly tested for any such interference.
Q. What cloud access and identity protocols are used?
A. We use secure password authentication across a minimum of 128-bit SSL encryption across our services.