SECURITY AT CELESP

Overview:

  • CELESP is committed to ensuring the security of our infrastructure and our users’ personal data.
  • All of the facilities we collocate with enforce multiple layers of security passing through a variety of technological as well as human measures. Beyond that, all CELESP equipment is in locked cages.
  • We impose strict filtering rules to ensure that CELESP’ can only communicate by means of their allowed IP addresses. This prevents BORNITES from spoofing other CELESP’ IPs or performing man in the middle attacks on our private system.
  • CELESP’ themselves operate within KVM or XEN virtualization, which ensures that each CELESP has its own kernel and users pace, which are entirely separate from other CELESP’. This guarantees that a malicious CELESP cannot access either the host itself or other CELESP’ resources.