Cyso Cloud Trust Centre

At Cyso Cloud, trust forms the foundation of every service we deliver. Our Trust Centre provides complete visibility into our security practices, compliance certifications, and data protection measures.

logo
Dutch Cloud provider

Our Certifications

Our commitment to security, compliance, and technical excellence is validated through rigorous third-party certifications. These industry-recognised standards demonstrate our systematic approach to protecting your data, maintaining service quality, and delivering enterprise-grade cloud infrastructure that meets the most demanding regulatory requirements.

ISO/IEC 27001

The ISO/IEC 27001 standard defines requirements for establishing, implementing, maintaining and continually improving an information security management system. By operating under this framework, you can trust that we handle all aspects of security, risk management, incident response, change control and capacity planning in a systematic and auditable manner. Cyso Cloud operates under a standard SLA that clearly defines what you can expect from our services, including response times, availability guarantees, monitoring protocols and recovery procedures.

Learn more about ISO/IEC 27001 Learn more about ISO/IEC 27001

NEN 7510

The NEN 7510 standard was developed by the Dutch Standards Institute for information security in the Dutch healthcare sector and is built upon ISO 27001. The NEN 7510 standard contains additional healthcare-specific considerations covering privacy protection, access to patient information, data handling and logging actions in electronic health records. By leveraging our expertise and NEN 7510 certification, your organisation can meet these stringent quality standards for healthcare information security.

Learn more about NEN 7510 standards Learn more about NEN 7510 standards

Kubernetes Certified Service Provider

Cyso Cloud has achieved Kubernetes Certified Service Provider (KCSP) status, joining an elite group of organisations recognised by the Cloud Native Computing Foundation (CNCF) for demonstrating deep expertise in building, deploying, and managing applications on Kubernetes. This certification validates our engineering team's extensive experience in container orchestration, from enterprise-grade deployment strategies to advanced troubleshooting across complex environments.

View our KCSP listing View our KCSP listing

We keep your business running

Service Level Agreements
Our standard SLA guarantees 99.99% uptime with clearly defined response times, escalation procedures, and compensation frameworks. Comprehensive monitoring systems provide real-time service status visibility.

Disaster Recovery & Failover
Multi-zone architecture provides automatic failover capabilities with geographically distributed backup systems. Recovery time objectives (RTO) and recovery point objectives (RPO) are clearly defined and regularly tested.

Incident Response & Support
24/7 security operations centre with dedicated incident response team. Comprehensive incident management procedures include communication protocols, remediation processes, and post-incident analysis.

European Load Balancer Seamless cloud integration

Security Measures at Cyso Cloud

Security forms the foundation of everything we build. Our multi-layered approach combines physical data centre protection with advanced network defences and strict access controls. Every component of our infrastructure is designed to protect your data, applications, and business operations whilst maintaining complete compliance with European regulations.

GDPR Compliancy

Your data remains your property at all times. We operate exclusively within Europe from our datacenters in Amsterdam and Frankfurt, protected by European privacy laws including GDPR compliance. Our infrastructure maintains complete data sovereignty with no unauthorised transfers outside the EU.

Network Security

Our entire network infrastructure features automatic DDoS protection with detection and mitigation systems. All instances are secured with asymmetric cryptography and Secure Shell access by default. Security Groups function as virtual firewalls, providing granular network access control.

Access Control and Authentication

Two-factor authentication (2FA) is mandatory for all account access. Our access control systems operate on role-based principles with comprehensive logging and audit trails. All personnel with system access undergo thorough security screening and background checks.

Infrastructure Security

All mission-critical platform components feature redundant architecture (N+1) across multiple availability zones. Data storage includes redundant backup systems (N+2) with geographically distributed recovery options. Our data centres meet stringent physical security requirements including multi-layered access controls.

Our memberships

Dutch Cloud Community Membership
As a member of the Dutch Cloud Community, Cyso Cloud actively supports the Netherlands’ digital sovereignty and cloud sector development. The DCC represents over 110 Dutch hosting and cloud providers, advocating for fair procurement processes and promoting European alternatives to global hyperscalers. Our membership demonstrates our commitment to strengthening the Dutch cloud ecosystem whilst championing data residency within EU borders and supporting local digital independence.

Cloud Native Computing Foundation (CNCF) Membership
Through our CNCF membership, Cyso Cloud participates in the global community advancing cloud-native technologies. This membership validates our technical expertise through our Kubernetes Certified Service Provider status. Our CNCF participation enables us to deliver enterprise-grade, vendor-neutral container solutions whilst contributing to the democratisation of modern cloud technologies for European organisations.

Our memberships, Dutch Cloud Community and Cloud Native Computing Foundation

Contact us today

Do you have any questions about our policies or services? Make sure to get in touch with us and schedule a call today.

Cyso Cloud Team

Stay Ahead with the Latest Insights

Discover best practices for GDPR-compliant deployments, learn about the latest Open Source innovations, and explore real-world case studies from organizations successfully navigating their digital transformation journey.

View all blog posts View all blog posts