Don't Lose Sleep Over Compliance

Gain Peace of Mind with Our Governance, Risk and Compliance Assistance

Keeping your data and systems secure is a big enough challenge. But demonstrating to auditors that you comply with industry requirements can bring you to the breaking point. And the cost of non-compliance can ruin your business.

The compliance validation phase of an audit involves collecting information about your business activities. This provides assurances that your implemented controls are designed and operating effectively, and aligned with the policies set by the security organization.

That’s why we offer comprehensive security and compliance services. Our security experts use leading technologies and best practices to support your efforts to comply with regulatory mandates — often at a lower TCO than internally-developed solutions.

Rackspace Compliance Certifications and Security Standards

Compliance Certifications Global Regulations
HITECH
Content Delivery & Security Association (CDSA)
Tech UK Member
FISMA
“It is probably true to say that without the considerable amount of help from Rackspace we could not have passed the exceptionally stringent PCI audit. Rackspace certainly went above and beyond their remit to ensure that everything was perfect for us.”

Aingaran Somaskandarajah

Technical Lead, Oyster Card

Security and Compliance Controls Used by Rackspace

Physical Security

At all of our data centers:

  • Access is limited to authorized personnel
  • Badges and biometric scanning control access
  • Security cameras provide video surveillance
  • Independent firms perform annual audits
DC - man on computer in gated area

Environmental Controls

All of our data centers have the following:

  • Dual power paths into the facility
  • Uninterruptable power supplies (N+1 or greater)
  • Diesel generators (service agreements with fuel suppliers)
  • Fire suppression, smoke and flood detection
DC - man and woman clipboard

Network Infrastructure

Our network infrastructure provides the following:

  • High-performance bandwidth
  • Properly trunked and secured cables
  • Proactive monitoring and route management
  • Guaranteed uptime (backed by Service Level Agreements)
DC - man and woman looking at equipment

Human Resources

All of our data center employees:

  • Are screened carefully and must pass background checks
  • Sign non-disclosure and confidentiality agreements
  • Undergo annual security awareness training
Misc - Woman working at laptop

Operations Security

Our data center operations conform to:

  • ISO 27001/2-based policies and annual review
  • Documented change management procedures
  • Secure document and media destruction policies
  • Incident management and business continuity plans
  • Continuous monitoring and third-party reviews
Security - Monitoring

A Shared Responsibility

Cloud security is a shared responsibility. While your cloud platform provider is responsible for securing their cloud services, you also need to ensure that your environment is configured with security in mind. This includes the way your customers’ sensitive data is handled.

Sensitive data needs to be stored securely and remain accessible to authorized personnel only. And you must be able to demonstrate this to meet industry compliance requirements. How confident are you that in-house resources can properly secure, monitor and manage your systems?

Our certified security experts can help configure your environment to meet your compliance requirements. So, you — and your customers — can feel confident that your environment is stable and secure, 24x7x365.

Start the Conversation