From 29ea11b38e86bf4fb18a5f82fcaf41641aa62bda Mon Sep 17 00:00:00 2001 From: Aaron Collier Date: Thu, 7 Apr 2022 12:08:19 +0000 Subject: [PATCH 1/4] :memo: Orange Cloud is now encrypted (#2270) * :memo: Orange Cloud is now encrypted * :bug: Fix region --- docs/src/security/data-deletion.md | 6 ++++-- docs/src/security/encryption.md | 2 +- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/docs/src/security/data-deletion.md b/docs/src/security/data-deletion.md index caadaf5604..a02317c98b 100644 --- a/docs/src/security/data-deletion.md +++ b/docs/src/security/data-deletion.md @@ -3,12 +3,14 @@ title: "Data deletion" weight: 6 description: | - Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider will perform a wipe on the data utilizing either [NIST 800-88](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final) or [DoD 5220.22-M](http://www.dss.mil/documents/odaa/nispom2006-5220.pdf) depending upon the offering. This wipe is done immediately before reuse. + Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider performs a wipe on the data utilizing [NIST 800-88](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final). This wipe is done immediately before reuse. --- {{< description >}} -All projects, except those hosted on OVH or Orange Cloud for Business, utilize encrypted volumes. The encryption key is destroyed when we release the volume back to the provider, adding another layer of protection. +All projects, except those hosted on OVH, utilize encrypted volumes. +The encryption key is destroyed when the volume is released back to the provider, +which adds another layer of protection. ## Media destruction diff --git a/docs/src/security/encryption.md b/docs/src/security/encryption.md index 4c3c36b190..687cd11125 100644 --- a/docs/src/security/encryption.md +++ b/docs/src/security/encryption.md @@ -13,6 +13,6 @@ Data in transit on Platform.sh controlled networks (for example, between the app ## Data at rest -All application data is encrypted at rest by default using encrypted ephemeral storage (typically using an AES-256 block cipher). Some Enterprise-Dedicated clusters and the `FR-1` and `FR-3` regions do not have full encryption at rest. +All application data is encrypted at rest by default using encrypted ephemeral storage (typically using an AES-256 block cipher). Some Enterprise-Dedicated clusters and the `FR-3` region do not have full encryption at rest. If you have specific audit requirements surrounding data at rest encryption, please [contact support](/overview/get-support.md). From f4e9e5e88418747b1f0db0e1dce4e38096ef78cf Mon Sep 17 00:00:00 2001 From: Laurent Arnoud Date: Thu, 7 Apr 2022 13:09:52 +0000 Subject: [PATCH 2/4] :bug: Update available PHP extensions (#2272) tideways-xhprof has been available for some time but was removed on https://github.com/platformsh/platformsh-docs/pull/2034 --- docs/src/languages/php/extensions.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/src/languages/php/extensions.md b/docs/src/languages/php/extensions.md index 2e1b4a077c..aae8bf804f 100644 --- a/docs/src/languages/php/extensions.md +++ b/docs/src/languages/php/extensions.md @@ -115,7 +115,7 @@ and turn off those on by default with the `disabled_extensions` key. | `sysvsem` | | | | Def | Def | Def | Def | Def | Def | Def | | `sysvshm` | | | | Def | Def | Def | Def | Def | Def | Def | | `tideways` | | | | Avail | Avail | Avail | Avail | Avail | Avail | Avail | -| `tideways-xhprof` | | | | Avail | Avail | Avail | Avail | Avail | | | +| `tideways_xhprof` | | | | Avail | Avail | Avail | Avail | Avail | Avail | Avail | | `tidy` | Avail | Avail | Avail | Avail | Avail | Avail | Avail | Avail | Avail | Avail | | `tokenizer` | | | | Def | Def | Def | Def | Def | Def | Def | | `uuid` | | | | | Avail | Avail | Avail | Avail | Avail | Avail | From c22a138e9a871d93ce9f03f4cd18d6aaaa28047f Mon Sep 17 00:00:00 2001 From: Aloys <16886290+trolologuy@users.noreply.github.com> Date: Thu, 7 Apr 2022 15:20:02 +0200 Subject: [PATCH 3/4] :bug: Add missing delimiter --- docs/src/security/data-deletion.md | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/src/security/data-deletion.md b/docs/src/security/data-deletion.md index 7ff3ad0efa..c4da90de2f 100644 --- a/docs/src/security/data-deletion.md +++ b/docs/src/security/data-deletion.md @@ -4,6 +4,7 @@ weight: 6 description: | Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider will perform a wipe on the data utilizing [NIST 800-88](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final). This wipe is done immediately before reuse. +--- {{< description >}} From e74ed83a4d95a7270200650558849ada75c08150 Mon Sep 17 00:00:00 2001 From: Aloys <16886290+trolologuy@users.noreply.github.com> Date: Thu, 7 Apr 2022 15:20:58 +0200 Subject: [PATCH 4/4] :bug: Fix wrong merge --- docs/src/security/data-deletion.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/src/security/data-deletion.md b/docs/src/security/data-deletion.md index c4da90de2f..a02317c98b 100644 --- a/docs/src/security/data-deletion.md +++ b/docs/src/security/data-deletion.md @@ -3,7 +3,7 @@ title: "Data deletion" weight: 6 description: | - Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider will perform a wipe on the data utilizing [NIST 800-88](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final). This wipe is done immediately before reuse. + Data deletion is handled via our backend providers. When a volume is released back to the provider, the provider performs a wipe on the data utilizing [NIST 800-88](https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final). This wipe is done immediately before reuse. --- {{< description >}}