Public Cloud Network and Security FAQs
PhoenixNAP Public Cloud offers customizable Network Services for your virtual environment. This Includes:
- Firewall – quickly deploy a firewall and configure your own set of rules to block or allow traffic to your virtual machines. Your whole account will be secured for only $7 per month.
- Load Balancer – configure a load balancer to ensure effective traffic distribution to all your users and protect your environment against Denial of Service attacks. Only outgoing bandwidth is charged while incoming is free.
- Network Storage– affordable storage option with enterprise-grade performance, able to cope with the most demanding tasks. Our Network Storage is highly scalable and can grow with your demands.
Even though Public Cloud is hosted in the shared environment, every client is assigned their own private virtual switc. Your network is completely secured and out of reach from other Public Cloud clients.
For our Public Cloud offering, every virtual machine will get one (1) private IP address. If you need more flexibility with virtual network configuration you may consider our Virtual Private Data Center (VPDC) offering.
In order to ping or access a virtual machine externally, it needs to have a public IP address. Please verify if a public IP is assigned to the VM in question. To do so:
No, by default, most VMs will be configured to use public NTP and DNS servers. To use internal NTP and DNS, you can configure and manage the individual VMs however you decide.
PhoenixNAP cloud offerings come with the load balancer options that are not capable of SSL offload. If you want to utilize more options you may optionally upload a virtual load balancer of your choice and thus achieve the desired functionality.
PhoenixNAP Public Cloud represents a shared responsibility model where we manage, operate, and control the components from the host operating system and virtualization layer all the way to the physical security of the data centers.
On the other hand, our clients assume the responsibility and management of the guest operating system and associated software including updates and patches. To make sure the virtual machines are secure, you need to implement security measures that are commercially reasonable for your use of Public Cloud, including encryption technologies, password and user ID requirements.
Whenever a storage device needs to be replaced, PhoenixNAP utilizes a decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. If a hardware device is unable to be decommissioned using the procedures stated in the National Industrial Security Program Operating Manual, the device will be degaussed or physically destroyed in accordance with industry-standard practices. You can rest assured that your data is safe with our Public Cloud.
We leverage security tools from F5 Networks, Arbor Networks, Rapid7 / Metasploit, and VMware in order to maintain compliance with PCI DSS 2.0, SSAE 16 Type 1 and SOC 2 Type 2. All of our systems leverage Two-Factor authentication for administrative access and all events are centrally logged and reported in real time. These controls are in place to secure the underlying infrastructure that powers our IaaS systems and are not in place to protect or enhance the logical security of our customers’ infrastructure.
No, your data cannot be recovered after you delete a VM, this is an irreversible process. If you want to keep your data, you can use the “Power Off” option for the VM in question when you do not need it running. This will reduce the cost significantly and keep the settings so you can power on the VM and have it ready immediately when you need to.
PhoenixNAP provides a minimum of 1.5 Gbps of DDoS protection for your Public Cloud and up to the maximum of 20Gbps. In case of a DDoS attack, our system evaluates if there is a risk of it exceeding the 20 Gbps limit. If the attack poses a threat to the network, the IPs will be null routed automatically to prevent any service disruption.