EN
EN
Login mini-cart 0
EN
EN
BlogKnowledge BaseDeveloper APIStatusCustomer Portal

You can present our certification to your auditors to verify quickly and easily that the services provided by Leaseweb meet the very latest requirements.

How the Leaseweb Trust model works

The Leaseweb Trust model uses our portfolio of services, expectations from external and internal stakeholders, and risk assessment workshops as the foundation and starting point of our compliance approach. Based on these inputs we created one custom framework which is divided into building blocks (right column) and the different industry standards (top row).

 With this multi-audit approach we use the “test-once test-many” principle. It enabled three independent audit firms to work closely and made it location and Leaseweb company independent. But more importantly it provides a completely custom tailored framework that aligns with our services, business needs and risk landscape – as well as with your expectations as a customer. Every building block is now covered and independently audited by at least one certification/assurance report.

Services Covered:

Corporate infrastructure, Bare Metal Services, Virtual Private Server,
Private Cloud, Hybrid Cloud, Co-location, Web Hosting, Domain Name


Certificates
SOC-1ISO 27001HIPAANEN 7510PCI DSS

Customer Service


Service Deployment


Incident Management


Change Management


Logical Security


Physical Security

Operational Resilience


* Full documentation can be read on https://kb.leaseweb.com

The building blocks of the Leaseweb Trust Model

Normally, SOC1 is associated with financial controls but, given the type of our business we broadened the remit of our assurance reports to reflect our close connection with IT issues. This also enhances their relevance to our customers and their operations.

OBJECTIVE AREAOBJECTIVE DESCRIPTION
Logical securityControls provide reasonable assurance that logical security is appropriately implemented, administered and logged to safeguard against unauthorized access to or modifications of the customer portal that our clients are using to administer their infrastructure and administration.
Physical securityControls provide reasonable assurance that physical access to the data centers is restricted to authorized individuals to prevent unauthorized use, disclosure, modification, damage or loss of data.
Service deploymentControls provide reasonable assurance that services to clients are appropriately deployed and managed to ensure a timely and standardized delivery.
Customer supportControls provide reasonable assurance that the customer support teams timely and effectively act on client’s infrastructure problems to minimize service disruptions.
Incident managementControls provide reasonable assurance that incidents on the shared infrastructure are appropriately managed, resolved and analyzed to minimize disruption and impact of the services.
Change managementControls provide reasonable assurance that changes on the shared infrastructure are appropriately managed to minimize the disruption and impact of the services.
Operational resilienceOperations are appropriately managed to safeguard the data center facilities to avoid and minimize service disruptions. 

Scroll to top