Security Policy
Infrastructure design, isolation principles, and controlled access. Transparent. Factual.
Overview
The security framework at BuyVPS depends on three main elements which include infrastructure design and isolation principles and controlled operational access. Our security strategy aims to reduce attackable areas while creating stable operational zones and it divides system control between network infrastructure and customer-controlled applications.
The document presents security methods for infrastructure protection while establishing customer obligations for their assigned tasks.
Infrastructure-Level Isolation
All VPS instances operate through KVM-based virtualization which provides hardware-assisted isolation for their virtualized environment. Storage runs on NVMe drives in Amsterdam and New York.
The virtual machines function through:
- An independent kernel.
- The system determines how CPU resources together with memory space will be distributed.
- Segmented virtual networking
- Clear storage boundaries
We do not use container-based virtualization for VPS instances. The hypervisor system operates as a resource allocation system which serves as its main purpose.
Network Security Architecture
Our network design includes:
- The network operates through segmented management systems
- Limited administrative access routes
- Duplicate connections to upstream networks
- Specific IP address management rules
The system monitors all abuse that leaves the network because it needs to protect the entire network reputation. Email traffic is rate-limited by default. The process for obtaining further IPv4 address blocks requires evaluation by the organization.
The network has baseline filtering which protects against typical volumetric attacks that occur at high speeds. This does not replace application-level security controls.
Access Control and Operational Security
The infrastructure systems operate under restricted access which only authorized personnel who have received proper authorization can access.
Operational practices include:
- The system implements role-based access control
- Administrative access requires multi-factor authentication
- Maintains logged access events which are auditable
- Restricts access to management endpoints
The system monitors all administrative actions which it continues to track.
Data Handling and Storage
BuyVPS provides infrastructure services. The system enables users to keep full control over their personal data and application security functions.
At the infrastructure level:
- The selected region contains all data storage
- The system performs no default data replication between different regions
- The backup system performs disk-level backups when users activate this feature
- Users can choose to enable off-site backup options during their selection process
Customers are responsible for:
- OS hardening
- Application security measures
- Firewall configuration inside the VPS
- Backup strategy validation
- Data encryption policies
Patch Management
The organization runs its internal operational procedures to perform scheduled hypervisor updates together with their dependent infrastructure elements.
The system needs to undergo scheduled maintenance which operates through specific areas while the company sends early alerts about all upcoming system disruptions.
Customers need to perform their own operating system and application updates for their VPS environment.
DDoS and Abuse Handling
The network-level mitigation system works to minimize the effects which big attacks create. However, no provider can guarantee immunity from all forms of distributed attacks.
The system starts abuse report investigations right away after receiving sufficient evidence which needs to include time stamps and source IP addresses and proper system logs. Report to abuse@buyvps.net.
The network integrity of BuyVPS allows the company to take measures against workloads which produce ongoing abuse or create threats to platform stability.
Vulnerability Reporting
The security team at BuyVPS needs your immediate contact to report any security vulnerability which threatens our infrastructure.
- The report provides an extensive analysis of the problem
- Detailed reproduction steps
- Details about system and endpoint impact
- Supporting evidence from logs and evidence
We encourage responsible disclosure and will acknowledge valid reports. Contact security@buyvps.net.
Customer Responsibilities
Security in a VPS environment is shared.
BuyVPS secures
- Physical infrastructure
- Hypervisor layer
- Network segmentation
- Access control to platform systems
Customers secure
- Operating systems
- Applications
- Authentication policies
- Encryption
- Backup integrity
Our team can defend production workloads by using secure VPS operations because we understand this separation method. See our VPS infrastructure.
Policy Updates
The policy will undergo changes when new infrastructure projects start their operations. The security posture page will display all major changes which impact system security.
Security questions
The first section delivers right away essential information about infrastructure security and shared responsibility and demonstrates to users the correct method for system problem reporting.