Certifications
Certification | Region | Details |
---|---|---|
PCI DSS v4 | nz-hlz-1 (physical security) | Available upon request |
PCI DSS v4 | nz-por-1 & nz_wlg_2 (physical security) | Certificate below |
ISO 27001:2013 | nz-hlz-1 (physical security) | Available upon request |
ISO 27001:2022 | Catalyst Cloud Ltd, including all regions | Certificate below |
ISO 27017:2015 | Catalyst Cloud Ltd, including all regions | Certificate below |
Catalyst Cloud Ltd - ISO 27001 - IS 745798.pdf
Catalyst Cloud Ltd - ISO 27017 - CLOUD 745805.pdf
Catalyst Cloud Ltd - ISO 27001 - Statement of Applicability (covering both ISO 27001 and ISO 27017) is available upon request.
New Zealand Government
Catalyst Cloud is the first cloud provider to address NZ Government requirements for cloud security. Catalyst Cloud also has a Cloud Framework Agreement in place with the Crown, more information is available on our Public Sector page.
The Government Chief Information Officer (GCIO) provides guidance to New Zealand Government agencies on how to assess the information security and privacy risks of cloud computing. Catalyst Cloud has published a spreadsheet that provides answers for the 105 Questions. Once a suitable template is available for the new assessment tool, we will provide that as well.
Cloud Code of Practice
The CloudCode was developed by the New Zealand Cloud Computing industry, facilitated by the Institute of IT Professionals NZ and ensures that:
- Service providers will not call a service "Cloud Computing" unless it really is; and
- Service providers will disclose important details about their Cloud products and services, enabling customers to make informed decisions about the use of the services.
Catalyst is a signatory of the CloudCode and discloses information about Catalyst Cloud as required.
DDoS Mitigation
Catalyst Cloud provides Distributed Denial of Service (DDoS) protection to all our customers as part of our Ingress Protection service. The following paper describes some of the controls in place to mitigate the risk of DDoS attacks and provide additional information on what you can do to further protect your cloud applications.