Trust & Security

Security is
infrastructure,
not an afterthought

From the physical layer to the API surface, every component of the Servercrust platform is designed with security as a first-class requirement โ€” not bolted on after the fact.

AES-256

Encryption at rest

TLS 1.3

Encryption in transit

24 / 7

Infrastructure monitoring

< 72h

Incident notification SLA

Data Encryption

Your data, encrypted end to end

Encryption is applied at every layer โ€” whether your data is moving across the network or sitting on a storage volume.

TLS 1.3 in transit

All data moving between your browser, our API, and your servers is encrypted with TLS 1.3. Older, insecure protocols are rejected entirely.

AES-256 at rest

Persistent storage volumes and database backups are encrypted at rest using AES-256. Keys are managed separately from the data they protect.

SSH key authentication

Password-based root access is disabled by default on all new instances. SSH key pairs are enforced, and keys are never stored server-side.

Secrets management

API keys, tokens, and credentials in the control panel are stored hashed. Plaintext secrets are never logged or persisted beyond initial creation.

Network Security

Built to absorb attacks

DDoS mitigation, private networking, and hardware firewalls are standard on every plan โ€” not optional add-ons.

Protection layers

L3/L4 volumetric attack scrubbing
L7 application-layer filtering
BGP blackholing for severe events
Rate limiting at the edge
Geo-based traffic controls on request

Always-on DDoS mitigation

Volumetric, protocol, and application-layer attacks are automatically detected and scrubbed at the network edge โ€” before traffic reaches your server.

Private networking

Resources within the same region can communicate over an isolated private network, invisible to the public internet and not traversing shared links.

Anycast routing

Traffic is routed to the nearest healthy PoP via anycast, reducing both latency and the blast radius of any single network-level event.

Dedicated firewalls

Every server sits behind a stateful hardware firewall. You define the rules โ€” only the ports you explicitly allow are ever exposed.

Compliance & Governance

How we handle your data responsibly

We align our practices with internationally recognised frameworks for data protection and security governance โ€” even while we work toward formal certification.

Data sovereignty

Your data stays in the region you choose โ€” Nairobi or Frankfurt. We do not replicate customer data across regions without explicit opt-in.

Access controls

Internal access to customer infrastructure follows least-privilege principles. Production access requires multi-factor authentication and is fully audit-logged.

Data processing

We collect only what's needed to deliver and bill for services. Personal data handling is documented in our Privacy Policy and never sold to third parties.

Incident response

Security events trigger an internal runbook. Customers affected by incidents that impact their data are notified within 72 hours of confirmation.

Our compliance direction

Servercrust's internal security controls are designed in alignment with ISO 27001, SOC 2 Type II, and GDPR principles. Formal certification processes are underway. Enterprise customers can request our current security documentation package by contacting our team.

Request security documentation
Infrastructure Hardening

Secure by default,
at every layer

Security defaults aren't something you have to opt into โ€” they come standard with every Servercrust product, from the hypervisor to the management plane.

Hypervisor isolation between all VMs on shared hardware
Regular third-party penetration testing of public-facing infrastructure
Automated vulnerability scanning on all host nodes
Immutable infrastructure deployments โ€” no manual production changes
Segregated management and customer traffic networks
Encrypted out-of-band IPMI access on bare metal servers
Offsite encrypted backups with tested restore procedures
24/7 infrastructure monitoring with automated alerting

Found a vulnerability?

We take security reports seriously. If you believe you've discovered a vulnerability in our infrastructure or platform, please disclose it responsibly โ€” we'll investigate promptly and keep you updated.

Email us with a clear description of the issue
Include steps to reproduce if possible
Allow us reasonable time to investigate before public disclosure
We will not pursue legal action for good-faith reports
security@servercrust.com

Security questions?

For enterprise security questionnaires, compliance documentation requests, penetration testing authorisation, or any other security-related enquiry, our team is available to help.