You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/account_and_service_management/reversibility/24-bm-pod-snc-reversbility/guide.en-gb.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,48 +3,49 @@ title: "Reversibility Policy for the Dedicated PoD-SecNumCloud product"
3
3
updated: 2025-08-06
4
4
---
5
5
6
-
##Objective
6
+
##Objective
7
7
8
8
This document describes the reversibility policy for the Dedicated PoD-SecNumCloud product covering the OVHcloud offer Bare Metal PoD qualified SecNumCloud.
9
9
10
10
This policy aims to implement the general reversibility principles and our compliance with the SWIPO IAAS Code of Conduct for cloud providers.
11
11
12
-
##List of features
12
+
##List of features
13
13
14
14
Features of the product line fall into three categories:
15
15
16
16
1.**Core features** for which we guarantee migration capacity.
17
17
2.**OVHcloud implementations** that require adaptation to a new migration environment.
18
18
3.**Specific features** that cannot be guaranteed for migration as they are related to the OVHcloud environment or involve custom developments.
| Bare Metal Provisioning | Direct deployment of operating systems via Ironic (openstack open-source component) on physical servers | JSON, Rest API |**Inbound**: import configurations via CLI / API <br>**Outbound**: export configuration via CLI / API |[Getting started with a dedicated server ](/pages/bare_metal_cloud/dedicated_servers/getting-started-with-dedicated-server)|
25
-
| Dedicated hardware and network isolation | Exclusive access to the physical infrastructure (servers, network, racks) without shared hosting, compatible with several bare metal offers | Any type of data format |**Inbound**: OS installation, backup recovery, workload migration via standard tools (PXE, rsync, etc.). <br>**Outbound**: data export, images, VMs, via standard tools, migration to any other dedicated environment |[How to secure a dedicated server](/pages/bare_metal_cloud/dedicated_servers/securing-a-dedicated-server)|
26
-
| Network configuration | Network management via Neutron (OpenStack) | JSON, Rest API |**Inbound**: definition and import of network configurations, subnets, security groups <br>**Outbound**: export of reusable network configurations to any other cloud compatible with OpenStack technology |[How to secure a dedicated server](/pages/bare_metal_cloud/dedicated_servers/securing-a-dedicated-server)|
25
+
| Dedicated hardware and network isolation | Exclusive access to the physical infrastructure (servers, network, racks) without shared hosting, compatible with several bare metal offers | Any type of data format |**Inbound**: OS installation, backup recovery, workload migration via standard tools (PXE, rsync, etc.). <br>**Outbound**: data export, images, VMs via standard tools, migration to any other dedicated environment |[How to secure a dedicated server](/pages/bare_metal_cloud/dedicated_servers/securing-a-dedicated-server)|
26
+
| Network configuration | Network management via Neutron (OpenStack) | JSON, Rest API |**Inbound**: definition and import of network configurations, subnets, security groups <br>**Outbound**: export of reusable network configurations to any other cloud compatible with OpenStack technology |[How to secure a dedicated server](/pages/bare_metal_cloud/dedicated_servers/securing-a-dedicated-server)|
|Identity and Access Management | Identity and access management via Keycloak, roles, policies, audit logs | JSON, YAML (policies) |**Inbound**: manual rols and policy adaptation during the import <br>**Outbound**: export configurations and required adaptation depending on the target's IAM model (OpenStack Keystone or other). Provision of logs following request|[Configuring Keycloak for production](https://www.keycloak.org/server/configuration-production).{external}|
34
-
|VPN Gateway|An IPsec VPN gateway that connects external networks to the SecNumCloud infrastructure through an encrypted funnel |N/A|**Inbound**: Subscribe to and use the VPN Gateway service included in the qualified scope. <br><br>**Outbound**: Use the vRack service included with other OVHcloud services, or take note of the network architecture and replicate it with VLANs and another encrypted funnel.|[Introduction to SecNumCloud Connectivity](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-overview)<br><br>[VPN-SPN concept overview](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-vpn-spn)<br><br>[Personalized VPN via NSX](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/nsx_configurer_un_vpn_via_une_gateway_edge)|
35
-
|SPN|A private network that connects the resources and services available in the SecNumCloud infrastructure to one or more sites in the SecNumCloud zone. You can also use it to connect other OVHcloud services, or services hosted with a third party via the VPN Gateway.|N/A|**Inbound**: Subscribe to and use the SPN service included in the qualified scope.<br><br>**Outbound**: Take note of the network architecture and replicate it with the concepts of subnets and routing.|[SPN introduction and concepts](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-spn)<br><br>[SPN connector](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-spn-connector)|
36
-
|SPN Inter-DC|An encrypted link between two sites hosting the SecNumcloud infrastructure, enabling SPNs to be connected.|N/A|**Incoming**: Subscribe to and use the Inter-DC SPN service included in the qualified scope.<br><br>**Outbound**: Configure your IP routing between two sites hosting the SecNumcloud infrastructure outside of OVHcloud.|[SPN InterDC option](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-spn)|
33
+
|Identity and Access Management | Identity and access management via Keycloak, roles, policies, audit logs | JSON, YAML (policies) |**Inbound**: manual roles and policy adaptation during the import <br>**Outbound**: export configurations and required adaptation depending on the target's IAM model (OpenStack Keystone or other). Provision of logs following request|[Configuring Keycloak for production](https://www.keycloak.org/server/configuration-production). |
34
+
|VPN Gateway|An IPsec VPN gateway that connects external networks to the SecNumCloud infrastructure through an encrypted funnel |N/A|**Inbound**: subscribe to and use the VPN Gateway service included in the qualified scope. <br><br>**Outbound**: use the vRack service included with other OVHcloud services, or take note of the network architecture and replicate it with VLANs and another encrypted funnel.|[Introduction to SecNumCloud Connectivity](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-overview)<br><br>[VPN-SPN concept overview](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-vpn-spn)<br><br>[Personalized VPN via NSX](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/nsx_configurer_un_vpn_via_une_gateway_edge)|
35
+
|SPN|A private network that connects the resources and services available in the SecNumCloud infrastructure to one or more sites in the SecNumCloud zone. You can also use it to connect other OVHcloud services or services hosted with a third party via the VPN Gateway.|N/A|**Inbound**: subscribe to and use the SPN service included in the qualified scope.<br><br>**Outbound**: take note of the network architecture and replicate it with the concepts of subnets and routing.|[SPN introduction and concepts](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-spn)<br><br>[SPN connector](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-spn-connector)|
36
+
|SPN Inter-DC|An encrypted link between two sites hosting the SecNumcloud infrastructure, enabling SPNs to be connected.|N/A|**Incoming**: subscribe to and use the Inter-DC SPN service included in the qualified scope.<br><br>**Outbound**: configure your IP routing between two sites hosting the SecNumcloud infrastructure outside of OVHcloud.|[SPN InterDC option](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/snc-connectivity-concepts-spn)|
| OpenStack Horizon web interface | Manage an OpenStack infrastructure that provides visual dashboards for interacting with different OpenStack services. | HTML |**Incoming**: NA. User interface available by default. <br>**Outgoing**: No resource to export, dashboards are static |[Introduction to Horizon](/pages/public_cloud/public_cloud_cross_functional/introducing_horizon)|
42
+
| OpenStack Horizon web interface | Manage an OpenStack infrastructure that provides visual dashboards for interacting with different OpenStack services. | HTML |**Incoming**: NA. User interface available by default. <br>**Outgoing**: no resource to export, dashboards are static |[Introduction to Horizon](/pages/public_cloud/public_cloud_cross_functional/introducing_horizon)|
43
43
44
44
## List of architectures
45
45
46
-
The service offer is based on a sovereign private cloud architecture, deployed in 1, 2 or 3 physically distinct datacentres in France, with physical and logical isolation.
47
-
Each customer has one rack, network and dedicated servers, managed through a proprietary software layer and OpenStack API. The architecture supports compliance with the ANSSI SecNumCloud framework. The product requires public connectivity to enable migration of incoming or outgoing data.
46
+
The service offer is based on a sovereign private cloud architecture, deployed in 1, 2 or 3 physically distinct datacentres in France with physical and logical isolation.
47
+
Each customer has one rack, network and dedicated servers, managed through a proprietary software layer and OpenStack API. The architecture supports compliance with the ANSSI SecNumCloud framework. The product requires public connectivity to enable migration of incoming or outgoing data.
48
+
48
49
Today, public connectivity is made through an additional Managed Dedicated Cloud - SecNumCloud which is a temporary solution while dedicated public connectivity will be in place.
49
50
50
51
## Partner services
@@ -56,6 +57,7 @@ OVHcloud also has a dedicated service: [OVHcloud Professional Services](/links/p
56
57
## Cost and fees
57
58
58
59
No specific cancelation fees applied: deleting the service will stop the billing immediately. Any associated OVHcloud credits cannot be transferred. It is the customer’s responsibility to export their data, images, configurations and logs before deletion, as deletion is irreversible.
60
+
59
61
The default subscription period for the service is 12 months. Data can be exported before the end of this period.
0 commit comments