Policies

Cloud Resource policy

CPU For Central Processing Unit configuration in our cloud platform we use at least Dual AMD Epyc 7352 or Dual Intel Xeon E5-2680 v4 or an equivalent CPU configuration for each host node The major difference between v(irtual)CPU and d(edicated)CPU is in the core usage guarantee. For vCPU the guarantee is floating and closely represented by the following formula: vCPU maximum usage is 100% of 1x hostCPU Core and minimum usage is 25% of 1x hostCPU core: vCPU := 100% >= (1 x hostCPU) >= 25% dCPU maximu[...]

Tor exit-node policy

If you are using our services to provide an Tor exit node please be advised that only the following exit policies are permitted to use on our premises. Any exits using other policies will be suspended as Terms of Service violators. Reduced Exit policy ExitPolicy accept *:20-21 # FTP - File Transfer Protocol (data / control) ExitPolicy accept *:43 # WHOIS - who is query and response protocol ExitPolicy accept *:53 # DNS - Domain Name System ExitPolicy accept *:79 # finger - Name/Fin[...]

Vulnerability Reporting

1. Introduction: This policy outlines the process for third-party hackers, security researchers, and the general public to responsibly disclose vulnerabilities they discover in our systems, software, or services. We value the contributions of the security community and recognize the importance of their role in maintaining the highest security standards. 2. Scope: This policy applies to any digital assets owned, operated, or maintained by ServerAstra. This includes websites, applications, servers, and other [...]

Network Security policy

At ServerAstra, we take the security of our customers' data and network very seriously. To ensure the highest level of protection, we employ several measures, including blocking outgoing Simple Mail Transfer Protocol (SMTP) port 25 and automated abuse monitoring. This page provides detailed information on our policies and the reasons behind them. Table of Contents SMTP Port 25 Blocking Policy Firewall Protection Automated Abuse monitoring Benefits of Our Network Security Measures FAQs SMTP Port 25 Block[...]

ServerAstra Peering policy

ServerAstra AS56322 has an open peering policy and will peer with networks at mutual exchange points in accordance with the policies described below Please read these policy carefully and thoroughly. Requirements ServerAstra uses PeeringDB as a single authoritative source of truth. This means peering partners must have an up-to-date PeeringDB entry before a bilateral peering session can be established. ServerAstra will use industry standards to secure the peering sessions. This includes industry standard pr[...]