If you need individual hosting solutions for complex Internet projects, you might be interested in cluster hosting – a hosting variant that combines several real servers or instances in the cloud, such as Profihost’s FlexCluster system.
Rather than further increasing the performance of a server or cloud instance and eventually exploiting the system, it is often more effective to combine multiple servers or instances into one cluster. By the way, this brings a big advantage for security: the cluster elements secure each other. In the event of a sudden failure of one system, another jumps in while the problems can be resolved without downtime of the Internet project.
Even more resilience promises the combination of load balancing with a cluster IP, as they offer, for example, Host Europe and Strato. An additional IP address allows Web requests to be redirected to another server within minutes. If the server configured as master can not be reached, eg due to maintenance work or a software error, another server will start up in no time. There are also a number of other scenarios for ClusterIP.
System security with the hosting provider
By choosing the best possible hosting product and its correct use, customers contribute significantly to the security of an Internet project. On the security of the network at the provider, however, they have zero influence. Nevertheless, it is worth taking a look at the infrastructure of the hoster, as it is more or less secure depending on the provider.
Important is about an effective core firewall. This upstream is an intrusion prevention system (IPS). Such a system monitors all Internet-to-data center traffic and specializes in detecting and countering cyber-attacks. Practically all well-known hosters today use intrusion prevention systems or similar technologies. If the IPS detects a brute force attack, for example, it interrupts or alters the Internet connection, immediately stopping the attack.
Security in the data centers
By choosing a particular hosting provider, the customer fully relies on its expertise. This also affects the equipment and operation of the data centers. The TÜV certification according to ISO 27001 shows that the data centers of Anexia, Claranet, Goneo, Mittwald, PlusServer, Strato and other hosters meet particularly high security standards.
A recognized certificate proves the fulfillment of the requirements of both the legislator and the customer for a modern information and security management. The customer, who has personal data processed by third parties, is obliged under §11 BDSG to “regularly verify compliance with the contractor’s technical and organizational measures.” Thanks to ISO 27001, the customer is spared these elaborate controls.
But what makes a data center secure? The first priority is building security. Secure data centers are structurally designed to withstand as many unpredictable events as possible. This applies, for example, to acts of God due to severe weather, water or fire, but also intentional acts such as unauthorized intrusion into the building, theft, vandalism or terrorist attacks.
As a result, secure data centers not only have sophisticated fire protection systems, mostly nitrogen-based or argon-based gas extinguishing systems, but also door-locking systems with recorded door closures, various (video) surveillance devices and alarm systems. Most systems are two or more times available, so that in case of failure of a protective mechanism automatically the replacement mechanism comes into force.