Platform Security
Security is built into the core architecture of SwiftCloud. We employ industry-leading practices to protect your data, infrastructure, and privacy.
Security at a Glance
- ✓ KVM hypervisor isolation
- ✓ TLS 1.3 encryption in transit
- ✓ AES-256 encryption at rest
- ✓ Comprehensive audit logging
- ✓ DDoS protection
- ✓ Regular security audits
Tenant Isolation
We use Project-Based Isolation to ensure complete separation between customers and their resources.
Compute Isolation
- KVM Hypervisors: Virtual Machines run on KVM (Kernel-based Virtual Machine), providing hardware-level isolation between workloads. Each VM has its own kernel, preventing cross-VM attacks.
- Dedicated Resources: CPU and RAM are allocated exclusively to your VM. No noisy neighbors or resource contention.
- Secure Boot: VMs support secure boot to prevent unauthorized firmware and bootloaders.
Network Isolation
- Project Networks: Each project operates in an isolated network segment.
- Firewall Rules: Configurable security groups control inbound and outbound traffic.
- Private Networking: Resources within a project can communicate over private networks, isolated from the public internet.
Access Control
- Role-Based Access: Four distinct roles (Owner, Admin, Member, Viewer) with granular permissions.
- Project Isolation: Users can only access projects they've been explicitly added to.
- API Key Scopes: API keys can be limited to specific operations (read-only, VM management, etc.).
Data Encryption
In Transit
- TLS 1.3: All traffic between you and SwiftCloud is encrypted using TLS 1.3, the latest and most secure version.
- HSTS: HTTP Strict Transport Security enforces HTTPS connections.
- Perfect Forward Secrecy: Session keys are not compromised even if long-term keys are breached.
- VNC Encryption: Console access uses encrypted WebSocket connections.
At Rest
- Database Encryption: All database data is encrypted using AES-256.
- Backup Encryption: Database backups and snapshots are encrypted before storage.
- Secret Management: API keys, passwords, and tokens are hashed (bcrypt) or encrypted (AES-GCM).
- VM Disk Encryption: Optional encrypted storage for sensitive workloads (coming soon).
Audit Logs
Every critical action on the platform is recorded in an immutable Audit Log for compliance and troubleshooting.
What We Log
- Who: Which user performed the action (user ID, email)
- What: The action type (e.g.,
VM_CREATED,BALANCE_DEDUCTED) - When: Precise timestamp with timezone
- Where: IP address and user agent
- Details: Additional context (resource ID, project ID, parameters)
Logged Actions
- Authentication events (login, logout, failed attempts)
- Resource operations (create, update, delete VMs, domains, databases)
- Billing transactions (payments, balance changes, coupon redemptions)
- Access control changes (adding/removing team members, role changes)
- API key management (creation, revocation)
- Security events (password changes, 2FA enablement)
Accessing Audit Logs
- Admin Panel: Admins can view platform-wide audit logs
- Project Settings: Project-level logs for team members
- API Access: Retrieve logs programmatically via API (coming soon)
- Retention: Logs are retained for 12 months
Infrastructure Security
Data Centers
- Tier III+ Facilities: Our infrastructure partners operate Tier III+ data centers
- Physical Security: 24/7 security, biometric access, CCTV monitoring
- Redundancy: N+1 redundancy for power, cooling, and network
- Compliance: SOC 2, ISO 27001 certified facilities
Network Security
- DDoS Protection: Automatic DDoS mitigation up to 1Tbps
- Firewall: Multi-layer firewall rules at network perimeter
- Intrusion Detection: IDS/IPS systems monitor for suspicious activity
- Rate Limiting: API rate limiting prevents abuse
Vulnerability Management
- Regular Patching: Security patches applied within 48 hours of release
- Vulnerability Scanning: Automated scans identify potential weaknesses
- Penetration Testing: Annual third-party penetration tests
- Bug Bounty: Responsible disclosure program for security researchers (coming soon)
Authentication & Authorization
Authentication Methods
- Google OAuth: Enterprise-grade authentication via Google
- Magic Links: Passwordless email authentication with time-limited tokens
- API Keys: Bearer token authentication for API access
- 2FA: Two-factor authentication support (coming soon)
Session Security
- Secure Cookies: HTTP-only, Secure, SameSite cookies
- Session Timeout: Automatic logout after 30 days of inactivity
- Session Invalidation: Immediate invalidation on password change or logout
- Device Management: View and revoke active sessions (coming soon)
Password Security
- No Passwords Stored: We use passwordless authentication or OAuth
- bcrypt Hashing: Any stored credentials use bcrypt with cost factor 12
- Breach Detection: Integration with Have I Been Pwned API (coming soon)
Compliance & Certifications
Current Compliance
- GDPR: Compliant with EU General Data Protection Regulation
- Zambia Data Protection Act: Compliant with local data protection laws
- PCI DSS: Payment processing via PCI-compliant providers (DPO, Lenco)
In Progress
- SOC 2 Type II: Expected completion Q4 2026
- ISO 27001: Certification process initiated
Incident Response
Our Process
- Detection: Automated monitoring and alerting systems
- Assessment: Security team evaluates severity and impact
- Containment: Isolate affected systems to prevent spread
- Eradication: Remove threat and patch vulnerabilities
- Recovery: Restore systems from clean backups
- Notification: Inform affected users within 72 hours
- Review: Post-incident analysis and process improvement
Breach Notification
In the event of a data breach affecting your personal information:
- We will notify you via email within 72 hours
- Notification includes nature of breach, data affected, and recommended actions
- We provide credit monitoring services for significant breaches (if applicable)
- Regulatory authorities are notified as required by law
Security Best Practices for Users
Account Security
- Use strong, unique passwords for your email account
- Enable 2FA on your Google account (when using OAuth)
- Never share your magic link or API keys
- Review active sessions regularly
- Use a password manager
VM Security
- Keep your VM operating system updated
- Use SSH keys instead of passwords
- Configure firewall rules to limit access
- Regular backups of critical data
- Monitor resource usage for anomalies
API Security
- Use scoped API keys with minimum required permissions
- Rotate API keys periodically
- Never commit API keys to version control
- Use environment variables for key storage
- Monitor API usage for unusual activity
Reporting Security Issues
If you discover a security vulnerability:
- Do NOT disclose publicly until we've had time to respond
- Email: security@osystems.africa
- Include: Description, reproduction steps, potential impact
- We respond within 48 hours with acknowledgment
- We provide updates every 7 days until resolution
We appreciate responsible disclosure and will credit researchers in our security hall of fame (coming soon).
Security Updates
Stay informed about security:
- Status Page — Real-time system status
- Security Contact — Report vulnerabilities
- Security advisories via email for critical updates