<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - OVHcloud Blog</title>
	<atom:link href="https://blog.ovhcloud.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.ovhcloud.com/tag/security/</link>
	<description>Innovation for Freedom</description>
	<lastBuildDate>Mon, 09 Mar 2026 09:45:58 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.ovhcloud.com/wp-content/uploads/2019/07/cropped-cropped-nouveau-logo-ovh-rebranding-32x32.gif</url>
	<title>Security Archives - OVHcloud Blog</title>
	<link>https://blog.ovhcloud.com/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Startup Success highlight: Azursafe</title>
		<link>https://blog.ovhcloud.com/startup-success-highlight-azursafe/</link>
		
		<dc:creator><![CDATA[Philip Marais]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 09:45:27 +0000</pubDate>
				<category><![CDATA[Ecosystem]]></category>
		<category><![CDATA[OVHcloud Startup Program]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Data Sovereignty]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[OVHcloud]]></category>
		<category><![CDATA[Public Cloud]]></category>
		<category><![CDATA[SecNumCloud]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Startup Program]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=30696</guid>

					<description><![CDATA[Startup highlight: Interview with Sam Dabiri, CEO at Azursafe Can you introduce Azursafe, its industry, mission and values? The blockchain sector has been growing steadily for several years, bringing both new opportunities and complex challenges, including stricter regulations in Europe and beyond. In this evolving landscape, AzurSafe was founded with a clear mission to support [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fstartup-success-highlight-azursafe%2F&amp;action_name=Startup%20Success%20highlight%3A%20Azursafe&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<h5 class="wp-block-heading"><strong><em>Startup highlight:</em> Interview with Sam Dabiri, CEO at Azursafe</strong></h5>



<p><strong>Can you introduce Azursafe, its industry, mission and values?</strong></p>



<p>The blockchain sector has been growing steadily for several years, bringing both new opportunities and complex challenges, including stricter regulations in Europe and beyond. In this evolving landscape, <a href="https://azursafe.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">AzurSafe</a> was founded with a clear mission to support blockchain companies, financial institutions, fraud victims, analytics partners, security researchers, and law enforcement agencies in one shared goal: <strong>Making Blockchain Safer.</strong></p>



<p>We develop and offer <strong>transaction analysis and monitoring solutions</strong>, to identify malicious activity using intelligent and innovative technologies.</p>



<p>Quickly gaining the support of the French government and several key partners, <a href="https://azursafe.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">AzurSafe</a> has established itself as a trusted player in the sector, earning recognition from private and public financial institutions for its innovative solutions which bring a real added value both in operational and regulatory terms.</p>



<figure class="wp-block-image aligncenter size-full"><img fetchpriority="high" decoding="async" width="580" height="248" src="https://blog.ovhcloud.com/wp-content/uploads/2026/02/Azursafe-1.png" alt="" class="wp-image-30699" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/02/Azursafe-1.png 580w, https://blog.ovhcloud.com/wp-content/uploads/2026/02/Azursafe-1-300x128.png 300w" sizes="(max-width: 580px) 100vw, 580px" /></figure>



<p><strong>What were specific challenges you faced before joining <a href="https://blog.ovhcloud.com/ovhcloud-startup-program-fast-forward-blockchain-and-web3-accelerator-a-resounding-success/" data-wpel-link="internal">OVHcloud’s Blockchain Accelerator</a>?</strong></p>



<p>Deploying such complex and advanced solutions requires significant logistics in all areas, whether technical or business. Like any ambitious start-up, AzurSafe needs to respond to these challenges as part of its development.</p>



<p>On the technical side, we have to manage and orchestrate dozens of services, from massive data flows to the various characteristics that define each blockchain, then process and analyze all of this while offering a near-instantaneous service, because on the blockchain, every second counts when it comes to preventing fraud.</p>



<p><strong>Why did you decide to explore cloud solutions to overcome these obstacles?</strong></p>



<p>As our solution progressed, we realized that we needed to manage more and more features, then orient the infrastructure so it’s modular as we went along, while maintaining high availability, security standards, and data management without blowing our budget, inevitably linked to our business challenges.</p>



<p>After using other cloud services, we immediately understood the relevance of OVHcloud&#8217;s offering. What&#8217;s more, we offer a <strong>sovereign solution</strong> to those who want it (<strong>SecNumCloud</strong>), so the choice was easy.</p>



<p><strong>How did OVHcloud and the <a href="https://startup.ovhcloud.com/en/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">Startup Program</a> help you overcome these challenges?</strong></p>



<p>After two years of intense R&amp;D, we were reassured after benchmarking against the current state of the art and quickly realized that our technology had the same technical capabilities, and even better ones. But that wasn&#8217;t all it took to deploy a solution of this kind on the market.</p>



<p>We needed to dig deeper and better understand our environment and the distribution of our solutions and technologies in an ecosystem that was already formed with established players requiring equally established solutions. Participating in inspiring industry exchanges and receiving support throughout our deployment greatly contributed to our success.</p>



<p><strong>Which OVHcloud services or features do you use, and how do they stand out from other solutions?</strong></p>



<p>For our part, we use almost all (or nearly all) <a href="https://www.ovhcloud.com/en/public-cloud/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Public Cloud services</a>, which stand out from other solutions thanks to their simplicity, performance, and competitive pricing.</p>



<p><strong>How has OVHcloud&#8217;s support helped you evolve your infrastructure to meet the demands of your business?</strong></p>



<p>Their support has been very useful in various cases, thanks to the organization of workshops, mentoring, and infrastructure support.</p>



<p><strong>What tangible results have you achieved since collaborating with OVHcloud? How have these results helped to accelerate your growth or improve your product/service offering?</strong></p>



<p>Not to mention the <strong>ease of use</strong>, which saves time, the <strong>costs</strong> are at least half those of well-known American providers.</p>



<p><strong>How have these results helped to accelerate your growth or improve your product/service offering?</strong></p>



<p>The program has enabled us to better understand our environment and the industry in which we operate, by combining technical and business support.</p>



<p><strong>Future Vision: What are your ambitions for the future of your startup, and how do you see it evolving within the cloud ecosystem?</strong></p>



<p>Current technologies, as well as the various legal and illegal activities involving blockchain, are still in their infancy. It is easy to predict that they will evolve in the coming years, creating new opportunities but also complex challenges. <strong>We do not operate directly on the blockchain, but we must monitor it and evolve with it. </strong>Our infrastructure and services must be <strong>resilient</strong>, and the cloud remains the best alternative for our customers who do not want on-premise software.</p>



<p><strong>What future challenges do you foresee, and how do you see the cloud playing a role in solving them?</strong></p>



<p>The volume of data and the number of protocols and services built on decentralized technologies continue to grow rapidly. Yet, they still rely on essential solutions such as RPC nodes, interface hosting, and advanced platforms like ours to operate safely.</p>



<p>The risks are real and can affect everyone. Security is no longer an option in today&#8217;s digital age, and increasingly secure solutions will be necessary. The cloud is an excellent candidate for the coming years, provided it is used correctly.</p>



<p><strong>What advice would you give to other growth-stage startups considering the cloud or joining a support program?</strong></p>



<p>Go for it, you have so much to gain!</p>



<p><strong>Conclusions</strong></p>



<p>AzurSafe has recently reached a new milestone, <strong>surpassing $90 billion in transaction value monitored across more than 30 blockchains</strong>, highlighting emerging fraud trends and providing real-time insights using advanced AI and ML technologies that demonstrate unrivalled accuracy.</p>



<p>The precision of our fraud detection tools has been approved, audited, battle-tested and endorsed by experts in the financial and investigative industries. But this is only the beginning, and we are preparing huge projects that will completely redefine the landscape on an international scale.</p>



<p>We are surpassing ourselves at every stage to create a more secure blockchain and we would like to thank <a href="https://www.ovhcloud.com/en/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OVHcloud</a>, our webhost for several years, for this great opportunity and for joining us in revolutionising this industry. We invite anyone who wants to contribute to join us as well.</p>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-image"><img decoding="async" width="970" height="250" src="https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1.jpg" alt="" class="wp-image-29639" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1.jpg 970w, https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1-300x77.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1-768x198.jpg 768w" sizes="(max-width: 970px) 100vw, 970px" /></figure>



<p>If you’re a startup looking to transform your business, we encourage you to join the <strong><a href="https://startup.ovhcloud.com/en/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">OVHcloud Startup Program</a></strong> or contact OVHcloud to discover how our solutions can support your journey!</p>
<img decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fstartup-success-highlight-azursafe%2F&amp;action_name=Startup%20Success%20highlight%3A%20Azursafe&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Secure your Software Supply Chain with OVHcloud Managed Private Registry (MPR)</title>
		<link>https://blog.ovhcloud.com/secure-your-software-supply-chain-with-ovhcloud-managed-private-registry-mpr/</link>
		
		<dc:creator><![CDATA[Aurélie Vache]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 16:40:51 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[Tranches de Tech & co]]></category>
		<category><![CDATA[OVHcloud Managed Private Registry]]></category>
		<category><![CDATA[Public Cloud]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=30357</guid>

					<description><![CDATA[Before an application go to production, it passes through several stages: source code, build, packaging and distribution. But Malicious code &#8211; such as a compromised dependency, breached CI pipeline, or modified package in a registry &#8211; can be introduced at any point in the development cycle, potentially impacting thousands of projects This is precisely where [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fsecure-your-software-supply-chain-with-ovhcloud-managed-private-registry-mpr%2F&amp;action_name=Secure%20your%20Software%20Supply%20Chain%20with%20OVHcloud%20Managed%20Private%20Registry%20%28MPR%29&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1012" height="1011" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Gribouillis-2026-01-30-13.25.17.911.png" alt="" class="wp-image-30442" style="aspect-ratio:1.0009787401988517;width:437px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Gribouillis-2026-01-30-13.25.17.911.png 1012w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Gribouillis-2026-01-30-13.25.17.911-300x300.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Gribouillis-2026-01-30-13.25.17.911-150x150.png 150w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Gribouillis-2026-01-30-13.25.17.911-768x767.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Gribouillis-2026-01-30-13.25.17.911-70x70.png 70w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></figure>



<p>Before an application go to production, it passes through several stages: source code, build, packaging and distribution. But Malicious code &#8211; such as a compromised dependency, breached CI pipeline, or modified package in a registry &#8211; can be introduced at any point in the development cycle, potentially impacting thousands of projects</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="581" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-13-1024x581.png" alt="" class="wp-image-30358" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-13-1024x581.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-13-300x170.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-13-768x436.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-13.png 1292w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>This is precisely where <strong>Software Supply Chain Security </strong>(SSCS) comes in: to protect not just the code itself, but also how it’s built, delivered, and utilised.</p>



<p>Attacks like SolarWinds and Log4Shell aren’t isolated incidents, but rather subtle indicators that have escalated in severity.</p>



<figure class="wp-block-image aligncenter is-resized"><img loading="lazy" decoding="async" width="800" height="800" src="https://blog.ovhcloud.com/wp-content/uploads/2025/04/managed_private_registry.png" alt="" class="wp-image-28658" style="width:145px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/04/managed_private_registry.png 800w, https://blog.ovhcloud.com/wp-content/uploads/2025/04/managed_private_registry-300x300.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/04/managed_private_registry-150x150.png 150w, https://blog.ovhcloud.com/wp-content/uploads/2025/04/managed_private_registry-768x768.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/04/managed_private_registry-70x70.png 70w" sizes="auto, (max-width: 800px) 100vw, 800px" /></figure>



<p>This blog post explores recommended solutions and best practices for <a href="https://www.ovhcloud.com/en/public-cloud/managed-rancher-service/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>OVHcloud Managed</u></a> <a href="https://www.ovhcloud.com/en/public-cloud/managed-rancher-service/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>Private Registry</u></a> (MPR), an OCI-compliant artifact registry, to help you enhance your Software Supply Chain Security.</p>



<h3 class="wp-block-heading">Generate a Software Bill Of Materials (SBOM)</h3>



<p>SBOMs provides a list of all the ingredients (OS, libraries, code) and anything that composes the images that will run on your Kubernetes cluster. </p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="383" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-14-1024x383.png" alt="" class="wp-image-30360" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-14-1024x383.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-14-300x112.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-14-768x287.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-14.png 1256w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>From that list, you can find out more about the image, its vulnerabilities, and licenses.</p>



<h4 class="wp-block-heading">Generate an SBOM manually</h4>



<p>To manually generate an SBOM from your image, click the <strong>‘<strong>GENERATE</strong> SBOM’ </strong>button:</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="280" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.28.13-1024x280.png" alt="" class="wp-image-30361" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.28.13-1024x280.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.28.13-300x82.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.28.13-768x210.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.28.13-1536x420.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.28.13-2048x560.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Within seconds, the <em>SBOM </em>column for your image will display <em>“Queued”</em>, then change to <em>“Generating”</em>, and a <em>“SBOM details”</em> link will appear.</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="226" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-31-1024x226.png" alt="" class="wp-image-30393" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-31-1024x226.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-31-300x66.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-31-768x170.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-31-1536x340.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-31-2048x453.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Click the &#8216;<strong>SBOM details&#8217;</strong> link to view the SBOM:</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="557" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.26.38-1024x557.png" alt="" class="wp-image-30367" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.26.38-1024x557.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.26.38-300x163.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.26.38-768x418.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.26.38-1536x835.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.26.38-2048x1114.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Your application’s SBOM is generated by <strong>Trivy </strong>in <strong>SPDX </strong>format. This item is then listed as an accessory for your image in the registry.</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="130" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-17-1024x130.png" alt="" class="wp-image-30371" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-17-1024x130.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-17-300x38.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-17-768x98.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-17-1536x195.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-17-2048x260.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Click the <strong>&#8216;sbom.harbor&#8217;</strong> accessory type for more details:</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="629" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-25-1024x629.png" alt="" class="wp-image-30379" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-25-1024x629.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-25-300x184.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-25-768x472.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-25-1536x944.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-25-2048x1259.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h4 class="wp-block-heading">Generate an SBOM automatically</h4>



<p>Manually generating an SBOM is a good practice, but automating the process is even better. The private registry can automatically generates the SBOM for you once an image is pushed to the desired project.</p>



<p>Click the project your image is part of, navigate to the <em>‘Configuration’</em> tab, then tick the <strong>SBOM generation </strong>checkbox:</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="538" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-15-1024x538.png" alt="" class="wp-image-30365" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-15-1024x538.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-15-300x158.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-15-768x403.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-15-1536x806.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-15-2048x1075.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h3 class="wp-block-heading">Vulnerabilities scanning</h3>



<p>We recommend running vulnerability scans on the images to confirm that:</p>



<ul class="wp-block-list">
<li>the images provided are free of any known vulnerabilities (CVEs);</li>



<li>security patches are well integrated before deployment;</li>



<li>the images used in production comply with security and compliance policies.</li>
</ul>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="406" height="232" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-32.png" alt="" class="wp-image-30395" style="width:329px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-32.png 406w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-32-300x171.png 300w" sizes="auto, (max-width: 406px) 100vw, 406px" /></figure>



<p>There are several vulnerability scanners available, like <a href="https://trivy.dev/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>Trivy</u></a>, <a href="https://docs.docker.com/scout/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>Docker Scout</u></a>, and <a href="https://github.com/anchore/grype" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>Grype</u></a>.</p>



<p>The OVHcloud Managed Private Registry uses Trivy as its default vulnerability scanner, but you can add more scanners if needed. Go to the <em>Administration</em> panel, click <em>‘<strong>Interrogation Services</strong>’</em>, then navigate to the <em>‘<strong>Scanners</strong>’</em> tab:</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="437" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-33-1024x437.png" alt="" class="wp-image-30400" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-33-1024x437.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-33-300x128.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-33-768x328.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-33-1536x655.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-33-2048x873.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h4 class="wp-block-heading">Scan your image manually</h4>



<p>To manually run a vulnerability scan on your image, go to your project and click the <strong>SCAN VULNERABILITIES</strong> button:</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="186" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-35-1024x186.png" alt="" class="wp-image-30406" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-35-1024x186.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-35-300x55.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-35-768x140.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-35-1536x279.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-35-2048x372.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Within a few seconds, a scan will run and reveal any vulnerabilities detected in your image.</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="442" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.21-1024x442.png" alt="" class="wp-image-30404" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.21-1024x442.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.21-300x129.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.21-768x331.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.21-1536x662.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.21-2048x883.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Click your image to take a look at the CVEs list:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="557" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.39-1-1024x557.png" alt="" class="wp-image-30414" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.39-1-1024x557.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.39-1-300x163.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.39-1-768x418.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.39-1-1536x835.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/Capture-decran-2026-01-29-a-14.25.39-1-2048x1114.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h4 class="wp-block-heading">Scan your image automatically</h4>



<p>To automatically scan images on push, click the project your image is part of, then the <em>‘Configuration’ </em>tab, and tick the <strong>‘Vulnerabilities scanning’</strong> checkbox:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="390" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-36-1024x390.png" alt="" class="wp-image-30408" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-36-1024x390.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-36-300x114.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-36-768x293.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-36-1536x585.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-36-2048x781.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h4 class="wp-block-heading">Schedule vulnerability scans</h4>



<p>Another way to stay informed is by configuring your vulnerability scanner to run scans every day. Go in the <em>Administration </em>panel, click <em>‘<strong>Interrogation</strong> <strong>Services</strong>’</em>, then the <em>‘<strong>Vulnerability</strong>’</em> tab:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="264" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-34-1024x264.png" alt="" class="wp-image-30401" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-34-1024x264.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-34-300x77.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-34-768x198.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-34-1536x396.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-34-2048x528.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>You can choose to schedule the scan Hourly, Daily, Weekly or you can customize when the scan will be triggered.</p>



<p>Scheduled scans ensure that existing images are regularly/periodically analyzed for newly discovered vulnerabilities (CVEs).</p>



<h4 class="wp-block-heading">Prevent vulnerable images from running</h4>



<p>You can also configure a project to prevent vulnerable images from being pulled. In order to do that, check the <strong>Prevent vulnerable images from running</strong> checkbox.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="206" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-40-1024x206.png" alt="" class="wp-image-30430" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-40-1024x206.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-40-300x60.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-40-768x154.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-40.png 1424w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Select the severity level of vulnerabilities to prevent images from running, from None to Critical.</p>



<p>With this configuration, images cannot be pulled if their level is equal to or higher than the selected level of severity.</p>



<h3 class="wp-block-heading">Exploitable vulnerabilities</h3>



<p>When a scanner found vulnerabilities for your images, it is not necessary that they are exploitable in your application/in your image.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="170" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-41-1024x170.png" alt="" class="wp-image-30433" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-41-1024x170.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-41-300x50.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-41-768x128.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-41-1536x255.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-41.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this example, my application is build with golang 1.25-alpine, but Trivy found several CVEs that are only exploitable in golang 1.19.1 or less.</p>



<p>In order to remove/skip the &#8220;false positive&#8221;, a solution exists.</p>



<p>VEX (Vulnerability Exploitability eXchange) is a <strong>standard “format”</strong> to state whether a vulnerability is <strong>exploitable</strong> or not in a specific context.</p>



<figure class="wp-block-image aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="609" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-43-1024x609.png" alt="" class="wp-image-30435" style="aspect-ratio:1.6814258951355643;width:452px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-43-1024x609.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-43-300x178.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-43-768x456.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-43-1536x913.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-43.png 1681w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>You can generate a VEX file with <a href="https://github.com/openvex/vexctl" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">vexctl</a> or <a href="https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">govulncheck</a> tools.</p>



<p>Example:</p>



<pre class="wp-block-code"><code class=""># With vexctl<br>$ VULN_ID="CVE-2022-27664"<br>$ PRODUCT="pkg:golang/golang.org/x/net@v0.0.0-20220127200216-cd36cc0744dd"<br>$ vexctl create --file vex.json --author 'Aurélie Vache' --product "pkg:oci/demo@sha256:$HASH?repository_url=$REGISTRY/$HARBOR_PROJECT/demo" --vuln "$VULN_ID" --status 'not_affected' --justification 'vulnerable_code_not_present' --impact-statement "HTTP/2 vulnerability $VULN_ID is not exploitable because the image is compiled with Go 1.20, which contains the patched library."<br><br># With govulncheck (for Go apps)<br>$ govulncheck -format openvex ./... &gt; ../demo.vex.json</code></pre>



<p>For the moment, OVHcloud MPR (managed Harbor) does not support VEX files (and the OpenVEX format) <a href="https://github.com/goharbor/harbor/issues/22720" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">but it is planned in the future</a>.</p>



<p>💡But the good news is that you can configure a CVEs whitelist with the list of not exploitable CVEs to ignore them during vulnerability scanning:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="522" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-42-1024x522.png" alt="" class="wp-image-30434" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-42-1024x522.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-42-300x153.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-42-768x391.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-42-1536x782.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-42.png 1814w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>You can optionally uncheck the <strong>Never expires</strong> checkbox and use the calendar selector to set an expiry date for the allowlist.</p>



<h3 class="wp-block-heading">Sign your images</h3>



<p>It’s recommended to sign your images to ensure they haven’t been modified and originate from your pipeline (CI/CD).</p>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="278" height="282" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-38.png" alt="" class="wp-image-30412" style="width:128px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-38.png 278w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-38-70x70.png 70w" sizes="auto, (max-width: 278px) 100vw, 278px" /></figure>



<p>Signing your images is crucial for protecting them against compromised registries and unauthorised image replacements.</p>



<p><strong>Without a signature, there’s no guarantee the deployed image is the one you originally built!</strong></p>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="818" height="302" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-37.png" alt="" class="wp-image-30410" style="aspect-ratio:2.708559106290115;width:482px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-37.png 818w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-37-300x111.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-37-768x284.png 768w" sizes="auto, (max-width: 818px) 100vw, 818px" /></figure>



<p>You can sign your images with <a href="https://github.com/sigstore/cosign" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>Sigstore Cosign</u></a> or <a href="https://github.com/notaryproject/notation" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>Notation</u></a> tools:</p>



<pre class="wp-block-code"><code class="">$ export HARBOR_PROJECT=supply-chain<br>$ export IMAGE=xxxxxx.c1.de1.container-registry.ovh.net/$HARBOR_PROJECT/demo<br>$ export HASH=$(skopeo inspect docker://${IMAGE}:latest | jq -r .Digest | sed "s/^sha256://")<br><br># Sign with Cosign<br>## Generate a private and a public key<br>$ cosign generate-key-pair<br>## Sign the image with the OCI 1.1 Referrers API<br>$ cosign sign -y --key cosign.key $IMAGE@sha256:$HASH <br><br># Sign with Notation<br>## Generate a RSA key &amp; a self-signed X.509 test certificate<br>$ notation cert generate-test --default "test"<br><br>## Sign the image with the OCI 1.1 Refferrers API<br>$ export NOTATION_EXPERIMENTAL=1 ; notation sign -d --allow-referrers-api ${IMAGE}@sha256:${HASH}</code></pre>



<p>You can use Cosign or Notation to sign your images, OVHcloud MPR supports both.</p>



<p>Your signature will appear beside your image as an accessory, plus a green checkmark ✅ in your column:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="227" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-26-1024x227.png" alt="" class="wp-image-30382" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-26-1024x227.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-26-300x67.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-26-768x170.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-26-1536x341.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-26-2048x455.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>⚠️ Keep in mind, MPR (Harbor) doesn’t support signatures generated by Cosign v3 (the signature will upload and appear as an accessory, but the mark will stay red instead of turning green). This bug should <a href="https://github.com/goharbor/harbor/issues/22401" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><u>be fixed in Harbor 2.15</u></a> 💪.</p>



<p>Signing your OCI artifacts and linking them to your images is recommended, and you can do this using Cosign:</p>



<pre class="wp-block-code"><code class="">$ cosign attest -y --predicate sbom.spdx.json --key cosign.key $IMAGE@sha256:$HASH</code></pre>



<p>They will be uploaded to the OVHcloud private registry and listed as accessories.</p>



<h4 class="wp-block-heading">Ensure only verified images are pushed to your registry’s projects</h4>



<p>To allow only verified/signed images to be deployed on a project, click the project your image is part of, navigate to the <em>‘<strong>Configuration</strong>’</em> tab, and tick the <strong>Cosign</strong> and/or <strong>Notation </strong>checkbox:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="191" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-39-1024x191.png" alt="" class="wp-image-30418" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-39-1024x191.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-39-300x56.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-39-768x143.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-39.png 1406w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>When checked, the registry will only allow verified images to be pulled from the project. Verified images are determined by <strong>Cosign</strong> or <strong>Notation</strong>, depending on the policy you have checked. Note that if you have both Cosign and Notation policies enforced, then images will need to be signed by both Cosign and Notation to be pulled.</p>



<h3 class="wp-block-heading">Tag immutability</h3>



<p>By default, tags are mutables, it means that you can push an image demo with the tag 1.0.0, do a modification in the code and push again to this same tag.</p>



<p>It could be useful to fix a bug but in term of security a mutable tag does not guarantee that the image you&#8217;ve built and pushed for the 1.0.0 version is the same image that exists now in the registry.</p>



<p>Moreover, on Harbor (so on OVHcloud MPR), due to limitations in the upstream OCI Distribution specification, the registry does not enforce a strict link between a tag and an image digest.</p>



<p>As a result, a tag can be reassigned to a different artifact. And it causes a side effect on the registry, this causes the tag to migrate across the artifacts and every artifact that has its tag taken away becomes tagless.</p>



<p>To prevent this situation, you can configure tag immutability rules. Tag immutability guarantees that an immutable tagged artifact cannot be deleted, and also cannot be altered in any way such as through re-pushing, re-tagging, or replication from another target registry.</p>



<p>To do that, click on your project and on the <strong>Policy</strong> tab and select <strong>TAG IMMUTABILITY</strong>:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="469" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-44-1024x469.png" alt="" class="wp-image-30438" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-44-1024x469.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-44-300x137.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-44-768x352.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-44-1536x704.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-44.png 2030w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>And then click the <strong>ADD RULE</strong> button.</p>



<p>Fill the repositories and tags list according to your needs.</p>



<p>Example:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="522" src="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-45-1024x522.png" alt="" class="wp-image-30439" srcset="https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-45-1024x522.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-45-300x153.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-45-768x392.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-45-1536x783.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2026/01/image-45-2048x1044.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>⚠️ You can add a maximum of 15 immutability rules per project.</p>



<h3 class="wp-block-heading">To wrap thing up</h3>



<p>Software supply chain security is super important these days. Everything is changing quickly &#8211; the concept, standards, and tools. So, leveraging useful tools like OVHcloud MPR and knowing how to set them up can boost your Software Supply Chain Security efforts.</p>



<p>To learn more about how to use and configure <a href="https://help.ovhcloud.com/csm/fr-documentation-public-cloud-containers-orchestration-managed-private-registry?id=kb_browse_cat&amp;kb_id=574a8325551974502d4c6e78b7421938&amp;kb_category=7939e6a464282d10476b3689cb0d0ed7&amp;spa=1" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">OVHcloud private registries</a>, don’t hesitate to follow our guides.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fsecure-your-software-supply-chain-with-ovhcloud-managed-private-registry-mpr%2F&amp;action_name=Secure%20your%20Software%20Supply%20Chain%20with%20OVHcloud%20Managed%20Private%20Registry%20%28MPR%29&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Agentic AI from a security perspective</title>
		<link>https://blog.ovhcloud.com/agentic-ai-from-a-security-perspective/</link>
		
		<dc:creator><![CDATA[Julien Levrard]]></dc:creator>
		<pubDate>Thu, 08 Jan 2026 14:58:33 +0000</pubDate>
				<category><![CDATA[Deploy & Scale]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=30148</guid>

					<description><![CDATA[Large Language Models (LLMs) and generative AI technologies are everywhere, infiltrating both our personal and professional daily lives. Well-known services are already diverting most internet users away from their old browsing habits, and online information consumption is being profoundly transformed, most likely with no possible return to past behaviours. Issues related to intellectual property laws [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fagentic-ai-from-a-security-perspective%2F&amp;action_name=Agentic%20AI%20from%20a%20security%20perspective&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>Large Language Models (LLMs) and generative AI technologies are everywhere, infiltrating both our personal and professional daily lives. Well-known services are already diverting most internet users away from their old browsing habits, and online information consumption is being profoundly transformed, most likely with no possible return to past behaviours.</p>



<p>Issues related to intellectual property laws and the source of data used to train LLMs, which is sometimes confidential or personal, as well as potential biases in the data, intentional or otherwise, are regularly debated in the press and within technology communities. However, the current focus is on the race between LLM providers, who are competing to develop faster, more efficient models, in search of the ‘wow’ factor that will temporarily propel them to the rank of global AI leader.</p>



<p>Meanwhile, organisations are integrating these technologies into their daily activities at their own pace. Implementation is driven both by employees keen to improve their individual productivity, often based on their experience using AI tools in their personal life, and by business leaders and managers, who see an opportunity to optimise efficiency of low-value-added tasks.</p>



<p>At OVHcloud, we have launched an ‘AI Labs’ initiative, which is responsible for centralising projects and experiments using LLM tools. This team now supervises over a hundred projects, and new ones are added every week. The approach aims to catalyse ideas and provide a framework for efficiently implementing effective production tools.</p>



<p>From a data security perspective, the proliferation of experimentation and proof-of-concept (POC) projects creates numerous additional risks that need consideration. Modelling interactions between each component is necessary to understand these risks, as many configurations are possible.</p>



<p>In this article we will take a look at some example use cases, identify the main risks and provide suggestions for how to address them using a risk reduction logic model. We will focus on simple use cases where a user accesses an application for their work. These applications are accessible from their work context, and each have access management mechanisms that verify the user and grant them access to the relevant data and functions associated with their business profile.</p>



<figure class="wp-block-image aligncenter size-medium"><img loading="lazy" decoding="async" width="270" height="300" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917-270x300.png" alt="" class="wp-image-30150" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917-270x300.png 270w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917-768x854.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664917.png 921w" sizes="auto, (max-width: 270px) 100vw, 270px" /></figure>



<p>The introduction of LLM technologies fits into the usual operating mode of an information system to enrich the user experience and offer additional features. Let’s take a look at the examples.</p>



<h1 class="wp-block-heading">Conversational agents (without third-party integration)</h1>



<p>Most professionals working on a computer regularly use conversational agents to ‘enhance’ their work, often without acknowledging it, for example when writing an email, summarising a document, finding a complex Excel formula, answering a legal or technical question, etc.). As these agents are not connected to the company’s information system,  the risks are limited and depend on the attitude and practices of the user, for example with regards to uploading data, copying and pasting confidential data into the agent, etc.</p>



<p><a id="_msocom_1"></a></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="529" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926.png" alt="" class="wp-image-30151" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926-300x155.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664926-768x397.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this context, the user is the go-between managing the information transfer between the company application and the third-party agent. The agent only has access to information voluntarily sent by the user, typically via the service interface that allows prompts to be entered. These services are rapidly extending their capabilities, allowing file upload, and microphone or camera access, but we remain in a classic responsibility framework in terms of security, with the human in the loop by design.</p>



<h2 class="wp-block-heading" id="examples">Examples</h2>



<ul class="wp-block-list">
<li>Public AI services (Mistral, Openai, Grok, Omissimo, etc.)</li>



<li>AI services contracted by the company from public service publishers or specialised players</li>



<li>Internal chatbot</li>
</ul>



<h2 class="wp-block-heading" id="associated-security-risks">Associated security risks</h2>



<ul class="wp-block-list">
<li>Sending sensitive data (documents, confidential data, personal data, etc.) to the AI service and losing control over this data.</li>



<li>Training models on confidential data sent by users, which can lead to leaking this data to a user who should not have access to it.</li>
</ul>



<h2 class="wp-block-heading" id="possible-security-measures">Measures to implement</h2>



<ul class="wp-block-list">
<li>User awareness</li>



<li>AI charter</li>



<li>Blocking services accessible from the company&#8217;s information system</li>



<li>Contract with suppliers including security and confidentiality clauses for user-transmitted information</li>



<li>Traffic inspection and identification of confidential data using regular expressions</li>



<li>Dedicated instance for the company, fine-tuned or enriched by a RAG with company data (not very sensitive), allowing the LLM to be contextualised to the user’s context.</li>
</ul>



<h1 class="wp-block-heading" id="ia-augmented-application">&#8220;AI Augmented&#8221; Application</h1>



<p>The various editor solutions, in SaaS or deployed internally, are gradually enriched with functions based on LLMs, i.e. an agent on the application side that consumes an LLM with prompts designed by the editor on the data processed by the application. The editor enriches its solution within its own security model. On the user side, there is no change in usage, the application is simply enriched with new functions, for example synthesis, intelligent suggestions, translation, etc.). LLM processing can be done locally or consumed on external services.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="191" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934.png" alt="" class="wp-image-30152" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934-300x56.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664934-768x143.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this use case, the publisher or application manager is responsible for data security and processing via the LLM; the user has no control and the use of these features is integrated into their usual usage. We remain in a classic security management framework, the application manager (internal or external) is the guarantor of the security of the data they process in the application. The application is enriched with new features and complexity increases, but the security model is preserved.</p>



<h2 class="wp-block-heading" id="examples-2">Examples</h2>



<ul class="wp-block-list">
<li>Messaging and video conferencing service with AI features, for example real-time translation, discussion synthesis, automatic meeting minutes etc.</li>



<li>Any ‘AI wizards’  in SaaS application</li>
</ul>



<h2 class="wp-block-heading" id="associated-risks">Associated security risks</h2>



<ul class="wp-block-list">
<li>Insufficient segmentation of access rights to data in the application, allowing bypassing of usual application access controls. This is the case when the agent has a high-privilege account (to simplify and accelerate the development of features) or when access restriction is not implemented at data level.</li>



<li>Prompt injection into the application</li>



<li>Dependence on an uncontrolled supply chain</li>



<li>Data leakage to a subcontractor</li>
</ul>



<h2 class="wp-block-heading" id="measures-to-be-implemented">Measures to implement</h2>



<ul class="wp-block-list">
<li>Security clauses in contracts</li>



<li>Security insurance plan for application provider</li>



<li>Review of subcontractor dependency chains</li>



<li>Disabling unnecessary AI functions</li>



<li>Deep isolation of sensitive applications</li>
</ul>



<h1 class="wp-block-heading">Agentic IA</h1>



<p>We will now look at actual ‘Agentic AI’. In these cases, the agent is at the centre of the workflow. The agent becomes an orchestrator of resources. It has several roles, in particular:</p>



<ul class="wp-block-list">
<li>Capturing user expectations and triggering the sequence of actions</li>



<li>Retrieving the necessary data to contextualise and process the request</li>



<li>Sending data and instructions to a LLM to find the sequence of actions to be performed</li>



<li>Managing iterations with available services and LLMs to best handle the request</li>



<li>Triggering actions on accessible services</li>



<li>Obtaining (eventually) user validation to validate actions</li>



<li>Providing visibility to the user on actions performed and results obtained</li>
</ul>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="632" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941.png" alt="" class="wp-image-30153" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941-300x185.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664941-768x474.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>To properly understand the risks, it is necessary to look at different types of agent implementations.</p>



<h2 class="wp-block-heading">Agents integrated into local applications</h2>



<p>Applications are gradually being enriched with the ability to connect to an LLM service. Generally, this is done via APIs to LLM services or locally on the machine. In this case, the application will integrate an agent and incorporate its use into the usual application experience. The framework is equivalent to that of an enriched SaaS application, but the configuration and calls to the LLM are made from the user’s workstation. The functionality can be native or installed in the form of a plugin.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="436" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949.png" alt="" class="wp-image-30154" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949-300x128.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664949-768x327.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h3 class="wp-block-heading" id="examples-3">Examples</h3>



<ul class="wp-block-list">
<li>Microsoft Copilot AI agent</li>



<li>AI function in office applications (OnlyOffice, Joplin, email client, etc.)</li>



<li>Apple intelligence</li>
</ul>



<h3 class="wp-block-heading" id="risks">Associated security risks</h3>



<ul class="wp-block-list">
<li>Loss of control over data processed by adding connectivity functions to third-party services (be careful with default tool configurations)</li>



<li>Risks are similar to “cloud” functions in applications, allowing cloud storage or sharing, often configured by default</li>



<li>Leakage of LLM authentication secrets (Bearer Token)</li>
</ul>



<h3 class="wp-block-heading" id="measures-to-implement">Measures to implement</h3>



<ul class="wp-block-list">
<li>User awareness</li>



<li>Application configuration controls</li>



<li>Validation of applications on workstations and smartphones</li>



<li>Monitoring and inspection of network and application flows</li>



<li>Local management of secrets</li>
</ul>



<h2 class="wp-block-heading" id="generalist-or-specialized-local-agents">Generalist or Specialized Local Agents</h2>



<p>Unlike the previous use case where the application is simply enriched with LLM functions, agents are applications whose primary goal is to integrate LLM functions into a workflow. The risk model is similar, but by nature, the functionalities are much richer and focused on optimising the consumption of LLM services. For example:</p>



<ul class="wp-block-list">
<li>Configuration of multiple LLM services in parallel</li>



<li>Personalisation of system and user prompt templates by the user</li>



<li>Integration of local or remote MCP services to enrich the data accessible to the agent</li>



<li>Cost control function</li>



<li>Optimisation of requests and context management</li>
</ul>



<p>These agents can be generalist or specialised. In particular, this type of agent is widely used by developers within their IDE . In this context, security management relies on the user and the local configuration of tools. Capabilities may be extended with marketplace, like plugins to add connectors to external services or capabilities. The complexity of configurations, the lack of proven and hardened standards due to the relative novelty of these tools generates many risks, on an application directly run on user workstation, with all their rights.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="826" height="1024" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957.png" alt="" class="wp-image-30155" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957.png 826w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957-242x300.png 242w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664957-768x952.png 768w" sizes="auto, (max-width: 826px) 100vw, 826px" /></figure>



<h3 class="wp-block-heading" id="examples-4">Examples</h3>



<ul class="wp-block-list">
<li>Generalist agents: Goose</li>



<li>Specialised agents: Claude desktop, Cursor, Shai, Github Copilot, Continue, Kilo Code</li>
</ul>



<h3 class="wp-block-heading" id="risks-2">Associated security risks</h3>



<ul class="wp-block-list">
<li>Connection to third-party services without controls via marketplace (MCP connector for third-party services)</li>



<li>Uncontrolled access to local file system</li>



<li>Sending confidential data to third-party services (business data, secrets, .env file, etc.)</li>



<li>Management of local secrets (Bearer token)</li>



<li>Sharing credentials with third-party services (via OAuth mandate, etc.)</li>
</ul>



<h3 class="wp-block-heading" id="measures-to-be-implemented-2">Measures to implement</h3>



<ul class="wp-block-list">
<li>User awareness</li>



<li>Application configuration controls</li>



<li>Software testing and validation</li>



<li>Sandboxing of agents</li>



<li>Protection of secrets (environment file in development directories)</li>
</ul>



<h2 class="wp-block-heading">Remote Agents</h2>



<p>Remote agents, like local agents, are applications that connect different resources (LLM, RAG, third-party services), packaged within a web application, accessible to the user through their browser. All chatbot services are gradually integrating these capabilities to enrich their service by connecting to third-party services. The operation is similar to local agents, but outside the user’s workstation.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="756" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972.png" alt="" class="wp-image-30156" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972-300x221.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664972-768x567.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this case, the main challenge is managing access to third-party services and the resulting secrets. Since the agent is the focal point of the architecture, entrusting its management to a third party requires granting them access rights to third-party services to capitalise on the agent’s functionality.</p>



<p>In the example above, the user must grant the agent an access mandate to consume the MCPs that allow access to application services. Today, most of these mandates are managed by OAuth2 delegations, with the user authorising the agent to use these technical delegations to access applications.</p>



<h3 class="wp-block-heading">Examples</h3>



<ul class="wp-block-list">
<li>ChatGPT, MistralAI</li>



<li>Agents deployed internally</li>
</ul>



<h3 class="wp-block-heading">Associated security risks</h3>



<ul class="wp-block-list">
<li>Leakage of authentication secrets to sensitive applications of data</li>



<li>Centralisation of secrets to access remote services</li>



<li>Opening of network flows between sensitive applications and agent services</li>
</ul>



<h3 class="wp-block-heading">Measures to implement</h3>



<ul class="wp-block-list">
<li>Architecture to limit network exposure</li>



<li>Network inspection</li>



<li>Application monitoring</li>



<li>Authorisation and access control management</li>



<li>Restriction of access rights to need-to-know for each task</li>
</ul>



<h2 class="wp-block-heading">Workflow agents</h2>



<p>Workflow agent tools are designed to build AI workflows. They may be local or remote. While all wrong behaviours listed above remain possible in this model, the workflow structure  splits the workflow into small manageable parts, allowing:</p>



<ul class="wp-block-list">
<li>Limit of each agent’s access rights to the required sub-set of data for performing its tasks</li>



<li>More deterministic approach for human control over the process</li>



<li>Unitary testing for each parts</li>



<li>Repeatability of the process (workflows are defined ‘as code’)</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="368" src="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986.png" alt="" class="wp-image-30157" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986-300x108.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/12/mermaid-1767008664986-768x276.png 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this case, the workflow is built and operates as an automation under the control of a project team in charge of aligning the workflow with business processes. The configuration of the workflow management tools is the key to controlling the process. The orchestration platform manages the secrets and flow to resources, so it need to be managed with proper attention as any orchestration platform.</p>



<h3 class="wp-block-heading" id="examples-6">Examples</h3>



<ul class="wp-block-list">
<li>N8N, Langchain, Zapier, Flowise AI</li>
</ul>



<h3 class="wp-block-heading" id="risks-4">Associated security risks</h3>



<ul class="wp-block-list">
<li>Increase in complexity of the workflows and interconnection</li>



<li>Configuration issues</li>



<li>Leak of access token</li>



<li>Exposure of sensitive resources</li>



<li>Shadow orchestration platforms deployed by users</li>



<li>Access to temporary artifacts by platform administrators</li>
</ul>



<h3 class="wp-block-heading" id="measures-to-be-implemented-4">Measures to be implemented</h3>



<ul class="wp-block-list">
<li>Architecture to limit network exposure</li>



<li>Network inspection</li>



<li>Application monitoring</li>



<li>Authorisation and access control management</li>



<li>Secrets management</li>



<li>Restriction of access rights to need-to-know for each task</li>
</ul>



<h1 class="wp-block-heading" id="perspectives-and-problems-to-be-solved">Perspectives and problems to be solved</h1>



<h2 class="wp-block-heading" id="mcp-and-secret-management">MCP and secret management</h2>



<p>Secret management is at the heart of the problem of deploying agent-based AI. Since LLMs are not deterministic, it is necessary to constrain access rights in terms of scope and duration for LLMs, in order to limit their access to only the data and functions required to perform tasks. It is essential to identify the reliable blocks that will act as intermediaries to grant access, particularly for MCP servers. One of the challenges is to rely on existing access rights matrices without re-implementing an additional layer of rights management for MCP servers and agents, but instead implementing mechanisms to limit access dynamically as needed.</p>



<p>Existing or emerging standards (OAuth2, JWT, SAML, SPIFFE/SPIRE, OPA, Cedar, etc.) partially address some of these challenges, but at the cost of high management complexity, without a reference implementation compatible with all current solutions, and in a rapidly evolving market.</p>



<h2 class="wp-block-heading" id="human-in-the-loop">Human in the loop</h2>



<p>Beyond secret management, LLMs are unpredictable because they are non-deterministic. One of the questions to be resolved is how to include humans in the decision-making chain of an agent-based process to ensure that this inherently unpredictable behaviour does not generate risks for organisations. Today, this control, known as ‘human in the loop’, is based on the agent’s internal mechanisms and the limitation of secrets shared with it by the user. Obviously, this mode of operation is not compatible with sensitive processing.</p>



<p>In the future, it will be necessary to build agents that offer a high level of trust, provided by trusted editors or communities, auditable and audited, ideally open-source, to entrust these agents with performing operations on a company’s information system. In parallel, it will be necessary to develop independent agent control mechanisms that ensure sandboxing, filtering, access management, and traceability functions, allowing the responsible user to master their interaction with the information system.</p>



<h2 class="wp-block-heading" id="towards-the-end-of-the-web-browser-as-a-access-vector-to-the-information-system">Towards the end of the web browser as a access vector to the information system</h2>



<p>For about 15 years, the web browser has been the user’s entry point to information systems. While the functional richness of browsers is immense, the attack surface they expose is just as great. Browser security, even if it is perfectible, is one of the pillars of modern security, and browser editors and communities devote a significant part of their development and maintenance efforts to maintaining the level of security and managing threats.</p>



<p>AI agents are changing this access paradigm to the information system by providing users with dynamic and adaptive interfaces, enriched with high-value contextual functions, which is already causing a revolution in usage and the daily lives of users. It is likely that tomorrow’s browser will be an AI agent, and even more likely that current browsers will gradually become AI agents, integrating all identity and authorisation management standards under user control.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fagentic-ai-from-a-security-perspective%2F&amp;action_name=Agentic%20AI%20from%20a%20security%20perspective&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OVHcloud Startup Program Fast Forward Blockchain and Web3 Accelerator: A Resounding Success</title>
		<link>https://blog.ovhcloud.com/ovhcloud-startup-program-fast-forward-blockchain-and-web3-accelerator-a-resounding-success/</link>
		
		<dc:creator><![CDATA[Philip Marais]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 03:39:12 +0000</pubDate>
				<category><![CDATA[Ecosystem]]></category>
		<category><![CDATA[OVHcloud Startup Program]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[OVHcloud]]></category>
		<category><![CDATA[Public Cloud]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Startup Program]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=30132</guid>

					<description><![CDATA[We are thrilled to announce the successful completion of the OVHcloud Startup Program Fast Forward Blockchain and Web3 accelerator, a 10-week program designed to equip founders with the go-to-market, technical guidance, business strategy, mentoring, and investor readiness support needed to thrive in the blockchain and Web3 ecosystem. It culminated in fine style at a Showcase [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fovhcloud-startup-program-fast-forward-blockchain-and-web3-accelerator-a-resounding-success%2F&amp;action_name=OVHcloud%20Startup%20Program%20Fast%20Forward%20Blockchain%20and%20Web3%20Accelerator%3A%20A%20Resounding%20Success&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>We are thrilled to announce the successful completion of the <a href="https://blog.ovhcloud.com/blockchain-accelerator-launch/" data-wpel-link="internal">OVHcloud Startup Program Fast Forward Blockchain and Web3 accelerator</a>, a 10-week program designed to equip founders with the go-to-market, technical guidance, business strategy, mentoring, and investor readiness support needed to thrive in the blockchain and Web3 ecosystem. It culminated in fine style at a Showcase event with live pitches from participants in Paris on 20 November at the <a href="https://summit.ovhcloud.com/en-ca/partner-network/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OVHcloud Partner Network Summit</a>.</p>



<p>This accelerator has been a game-changer for the <a href="https://blog.ovhcloud.com/ovhcloud-launches-blockchain-accelerator-with-16-selected-startups/" data-wpel-link="internal">16 startups that participated</a>. The program&#8217;s focus on technical guidance, business strategy, and mentoring has yielded impressive results, with participants such as <a href="https://linktr.ee/cryptomate" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CryptoMate</a> and <a href="https://azursafe.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">AzurSafe</a> achieving significant milestones and successes.</p>



<p><em>&#8220;OVHcloud was the direct solution to our <strong>scalability, cost, and performance </strong>crises. Bare Metal servers are our key differentiator, giving us the raw, dedicated processing power needed for our financial engine and AI agents,&#8221;</em> said Alan Boryszanski, co-Founder of CryptoMate. <em>&#8220;The Startup Program&#8217;s support and credits were vital, giving us the financial breathing room to migrate and optimize our complex architecture <strong>without disrupting our 10x growth</strong>.&#8221;</em></p>



<p>Similarly, AzurSafe has surpassed $90 billion in transaction value monitored across more than 30 blockchains, highlighting emerging fraud trends and providing real-time insights using advanced AI and ML technologies. <em>&#8220;The precision of our fraud detection tools has been approved, audited, battle-tested, and endorsed by experts in the financial and investigative industries,&#8221;</em> said Sam Dabiri, Founder and CEO of AzurSafe. <em>&#8220;We are preparing huge projects that will completely redefine the landscape on an international scale.&#8221;</em></p>



<p><a href="https://kavodax.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Kavodax</a>, another participant, has launched in 30 countries and is in discussions with VCs involved with the Accelerator.</p>



<p>We would like to extend our gratitude to our partners who made this program possible, including <a href="https://www.alchemy.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Alchemy</a>, <a href="https://www.degen.house/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Degen House</a>, <a href="https://www.cryptomondays.io/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Crypto Mondays</a> London, Super Team Solana, Fintech District, and <a href="https://dysnix.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Dysnix</a> as well as the delivery partners Link Innovations and Empact Ventures. Their expertise and support have been invaluable to the success of our participants.</p>



<p>In fact, Dysnix has already been able to deliver tangible value to Mira Network, another participant. Dysnix is providing DevOps services to <a href="https://www.miranetwork.io/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Mira Network </a>to aid their migration from another hyperscaler in a short timeframe, following an infrastructure audit. The outcome of this collaboration has been better infrastructure scalability and significant cost optimisation.</p>



<p><em>&#8220;The OVHcloud Startup Program Fast Forward Blockchain and Web3 accelerator has been a resounding success, and we are proud to have played a role in the growth and development of these innovative startups,&#8221;</em> said Philip Marais, Global Startup Program Director at OVHcloud. <em>&#8220;Our program is designed to provide founders with the acceleration they need through <strong>unique go-to-market support</strong> to allow them to <strong>thrive in the blockchain and Web3 ecosystem</strong>, and we are thrilled to see the impact it has had on our participants.&#8221;</em></p>



<p><em>&#8220;The blockchain and Web3 ecosystem is rapidly evolving, and it&#8217;s essential for startups to have the right support and resources to succeed,&#8221;</em> said Omar Abi Issa, Global Sales Director for Blockchain, Web3 and AI at OVHcloud. <em>&#8220;Our program is committed to providing the necessary tools and expertise to help startups overcome the complex challenges of this landscape and achieve their full potential.&#8221;</em></p>



<p>As we look to the future, we are excited to continue supporting the growth and development of blockchain and Web3 startups through our <a href="https://startup.ovhcloud.com/en/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OVHcloud Startup Program</a>. With our expertise, resources, and network of partners, we are confident that we can help these innovative companies achieve their full potential and make a lasting impact on the industry.</p>



<p>Look out for future blog articles covering interviews with our Blockchain and Web3 Accelerator participants or find out more about the Startup Program below.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="970" height="250" src="https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1.jpg" alt="" class="wp-image-29639" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1.jpg 970w, https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1-300x77.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/09/Email-Signature-–-1-768x198.jpg 768w" sizes="auto, (max-width: 970px) 100vw, 970px" /></figure>



<p>If you’re a startup looking to transform your business, we encourage you to join the <strong><a href="https://startup.ovhcloud.com/en/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">OVHcloud Startup Program</a></strong> or contact OVHcloud to discover how our solutions can support your journey!<a id="_msocom_1"></a></p>



<p></p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fovhcloud-startup-program-fast-forward-blockchain-and-web3-accelerator-a-resounding-success%2F&amp;action_name=OVHcloud%20Startup%20Program%20Fast%20Forward%20Blockchain%20and%20Web3%20Accelerator%3A%20A%20Resounding%20Success&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Celebrating 10 Years of Impact: Looking Forward to 2035</title>
		<link>https://blog.ovhcloud.com/celebrating-10-years-of-impact-looking-forward-to-2035/</link>
		
		<dc:creator><![CDATA[Philip Marais]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 10:40:26 +0000</pubDate>
				<category><![CDATA[OVHcloud Startup Program]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[OVHcloud]]></category>
		<category><![CDATA[Public Cloud]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Startup Program]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=29047</guid>

					<description><![CDATA[The Startup Program is 10 years old this year! As we mark our 10th anniversary, we are not just reflecting on the past decade – we are looking ahead to the future and the impact we can have by 2035. The key to achieving this vision lies with YOU, our valued members of OVHcloud’s unique [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fcelebrating-10-years-of-impact-looking-forward-to-2035%2F&amp;action_name=Celebrating%2010%20Years%20of%20Impact%3A%20Looking%20Forward%20to%202035&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p>The <a href="https://startup.ovhcloud.com" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Startup Program</a> is 10 years old this year! As we mark our 10th anniversary, we are not just reflecting on the past decade – we are looking ahead to the future and the impact we can have by 2035. </p>



<p>The key to achieving this vision lies with YOU, our valued members of OVHcloud’s unique data sovereign ecosystem, including startups, scaleups, incubators, accelerators, venture capital companies, government agencies, technology partners, and other enablers. Together, we are united around a common vision of data freedom, innovation, and mutual growth.</p>



<h4 class="wp-block-heading">Global Report 2025: 10 Years of Impact</h4>



<p>To capture the essence of our unique ecosystem, we have compiled a comprehensive report, <strong>&#8220;Global Report 2025 &#8211; 10 Years of Impact&#8221;</strong>. This report showcases key stories from our ecosystem, including:</p>



<ul class="wp-block-list">
<li>Our support for <a href="https://harfanglab.io/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Harfanglab</a>, a French scaleup that&#8217;s developed cutting-edge technologies to anticipate and neutralise cyberattacks, raising almost €30m and leveraging OVHcloud and the Startup Program to drive innovation, data sovereignty, and cybersecurity excellence.</li>



<li>The success of <a href="https://internxt.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Internxt</a>, a Southern Europe scaleup alumni, which has become a recognized privacy-first alternative to mainstream cloud providers, offering secure, user-centric, and environmentally sustainable file-sharing and storage solutions that protect user privacy and data sovereignty.</li>



<li>The journey of female founders Jeanne Le Peillet and Cecile Doan, who developed a collaborative design SaaS solution, <a href="https://www.beink.fr/en/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Beink Dream</a>, selected for the France 2030 initiative.</li>



<li>The acquisition of Startup Program alumnus <a href="https://github.com/open-io" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OpenIO</a> by OVHcloud, which has become our high-performance object storage solution.</li>
</ul>



<p><em>“OVHcloud is a great partner if you are looking for a long-term, reliable, affordable and robust provider. The synergy between Internxt&#8217;s mission to protect user privacy and OVHcloud&#8217;s commitment to data sovereignty has been pivotal.”</em></p>



<p><em>Fran Villalba Segarra Founder &amp; CEO at Internxt</em></p>



<h4 class="wp-block-heading">The Startup Program: A Decade of Growth</h4>



<p>The report also highlights the Startup Program&#8217;s journey over the last decade, including how we operate, our partnerships with incubators, accelerators, venture capital companies, and other enablers, what sets us apart, and how we have successfully supported over 5,000 members to date.</p>



<h4 class="wp-block-heading">Key Statistics</h4>



<figure class="wp-block-table aligncenter"><table><tbody><tr><td class="has-text-align-center" data-align="center"><strong>5000+</strong> <br>Startups have joined our program</td><td class="has-text-align-center" data-align="center"><strong>100+</strong> <br>Ecosystem enablers (Accelerators etc.)</td><td class="has-text-align-center" data-align="center"><strong>Thousands</strong> <br>of hours of free mentorship and support</td><td class="has-text-align-center" data-align="center"><strong>€ Millions</strong> <br>in free cloud credits given</td></tr></tbody></table></figure>



<h4 class="wp-block-heading">Personalised Support</h4>



<p>What sets our Startup Program apart is our personal touch. As <a href="https://www.linkedin.com/in/philip-marais/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Philip Marais</a>, Global Startup Program Director at OVHcloud, explains: <em>&#8220;You&#8217;re personally onboarded by a manager in your region, have free support from our engineers to solve technical and migration issues, and access to our unique ecosystem to grow your business.&#8221;</em></p>



<h4 class="wp-block-heading">Download the Report</h4>



<p>To learn more about our ecosystem, our plans for the future, and the impact we can have by 2035, download the <strong><a href="https://startup.ovhcloud.com/en/globalreport2025/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">&#8220;Global Report 2025 &#8211; 10 Years of Impact&#8221;</a></strong> now.</p>



<figure class="wp-block-image aligncenter size-full is-resized"><a href="https://startup.ovhcloud.com/en/globalreport2025/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><img loading="lazy" decoding="async" width="512" height="512" src="https://blog.ovhcloud.com/wp-content/uploads/2025/06/download.png" alt="" class="wp-image-29049" style="width:118px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/06/download.png 512w, https://blog.ovhcloud.com/wp-content/uploads/2025/06/download-300x300.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/06/download-150x150.png 150w, https://blog.ovhcloud.com/wp-content/uploads/2025/06/download-70x70.png 70w" sizes="auto, (max-width: 512px) 100vw, 512px" /></a></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="970" height="250" src="https://blog.ovhcloud.com/wp-content/uploads/2025/06/Email-Signature-–-1.jpg" alt="" class="wp-image-29054" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/06/Email-Signature-–-1.jpg 970w, https://blog.ovhcloud.com/wp-content/uploads/2025/06/Email-Signature-–-1-300x77.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/06/Email-Signature-–-1-768x198.jpg 768w" sizes="auto, (max-width: 970px) 100vw, 970px" /></figure>



<p>Our 5000+ startups&#8217; journey with OVHcloud highlights how the right cloud partnership can help overcome challenges, achieve sustainable growth, and scale globally. If you’re a startup looking to transform your business, we encourage you to join the <strong><a href="https://startup.ovhcloud.com/en/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">OVHcloud Startup Program</a></strong> or contact OVHcloud to discover how our solutions can support your journey!</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fcelebrating-10-years-of-impact-looking-forward-to-2035%2F&amp;action_name=Celebrating%2010%20Years%20of%20Impact%3A%20Looking%20Forward%20to%202035&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security of Exchange services: TLS update and best practices</title>
		<link>https://blog.ovhcloud.com/security-of-exchange-services-tls-update-and-best-practices/</link>
		
		<dc:creator><![CDATA[Fabien Bouvet]]></dc:creator>
		<pubDate>Wed, 14 May 2025 14:28:19 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Web Cloud]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[mail server]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TLS]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=28806</guid>

					<description><![CDATA[Introduction We at OVHcloud are committed to providing secure and professional email services that meet the latest industry standards. To boost security, we’re disabling TLS 1.0 and 1.1 protocols on our Exchange solutions, in line with international standards. Are you using a recent and updated email client? You don’t need to do anything; all email [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fsecurity-of-exchange-services-tls-update-and-best-practices%2F&amp;action_name=Security%20of%20Exchange%20services%3A%20TLS%20update%20and%20best%20practices&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Introduction</h2>



<p>We at OVHcloud are committed to providing secure and professional email services that meet the latest industry standards. To boost security, we’re disabling TLS 1.0 and 1.1 protocols on our Exchange solutions, in line with international standards.</p>



<p>Are you using a recent and updated email client? <strong>You don’t need to do anything</strong>; all email clients have already been updated and support the latest TLS (1.2). Action is needed only if you’re running a very old version.</p>



<p>We’re ditching older TLS versions and stepping up security across OVHcloud Exchange services. This blog will cover what’s changing and the measures we’re taking to keep your data safe.&nbsp;</p>



<h2 class="wp-block-heading">TLS 1.0 and 1.1 deprecations</h2>



<p>To improve security and service quality, we’re disabling TLS 1.0 and 1.1 on all our OVHcloud Exchange solutions.<br>While some Microsoft systems may still use them, these TLS versions have security holes and were officially deprecated in 2021. Plus, they are already disabled on most Microsoft services, including several Exchange options.</p>



<ul class="wp-block-list"></ul>



<h2 class="wp-block-heading">Single-standard supported protocols</h2>



<p>Our goal is to apply the same configuration across all infrastructure. Since these protocols are already inactive on most of our servers, updating will standardise our setups and elevate security.</p>



<p><strong>Supported ciphers</strong></p>



<p>We’re also making adjustments to ciphers, so only the following will be supported:</p>



<ul class="wp-block-list">
<li><a href="https://ciphersuite.info/cs/TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">&#8220;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</a>&#8220;</li>



<li>&#8220;<a href="https://ciphersuite.info/cs/TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</a>&#8220;</li>



<li><a href="https://ciphersuite.info/cs/TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">&#8220;TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384</a>&#8220;</li>



<li>&#8220;<a href="https://ciphersuite.info/cs/TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</a>&#8220;</li>
</ul>



<p>Keep in mind, only older operating systems (outdated printers or unsupported systems) might have issues.</p>



<p>Customers can use the <a href="https://clienttest.ssllabs.com:8443/ssltest/viewMyClient.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">SSL Labs tool</a> to see which encryption protocols their machine supports.</p>



<p>We use the best practices from the 2020 version 1.6 guides, see <a href="https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices#version-16-15-january-2020" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">here</a>.</p>



<ul class="wp-block-list"></ul>



<h2 class="wp-block-heading">HSTS protocol activation</h2>



<p>We also use the HTTP Strict Transport Security (HSTS) protocol to keep connections between customers and OVHcloud Exchange servers secure.</p>



<p>This protocol helps to:</p>



<ul class="wp-block-list">
<li>enforce TLS usage by blocking unencrypted connections;</li>



<li>protect against Man-in-the-Middle (MITM) attacks and block redirects/downgrades to unsecured HTTPS connections;</li>



<li>automatically switch from HTTP to HTTPS for higher user security.</li>
</ul>



<p>OVHcloud customers won’t notice this update, which will be automatic—no action needed.</p>



<ul class="wp-block-list"></ul>



<h2 class="wp-block-heading">Exchange update management</h2>



<p><strong>Monthly update process</strong></p>



<p>Microsoft releases security updates for Microsoft Exchange Server every Patch Tuesday. OVHcloud applies these patches every month to bolster security for its Exchange solutions.</p>



<p><strong>Our update process</strong></p>



<ul class="wp-block-list">
<li><strong>The 2<sup>nd</sup> Tuesday of each month:</strong> Microsoft update release.</li>



<li><strong>Microsoft partnership:</strong> Thanks to our strong partnership, we have access to detailed information on patches and product releases. This gives us a better idea of how much work the next update will involve, so we can plan ahead.</li>



<li><strong>Vulnerability severity analysis:</strong>
<ul class="wp-block-list">
<li><strong>Moderate risk</strong> → Maintenance is planned and staggered to minimise service disruptions.</li>



<li><strong>High risk</strong> → A dedicated team starts maintenance right after the patches are released.</li>
</ul>
</li>
</ul>



<p><strong>Update notifications</strong></p>



<ul class="wp-block-list">
<li>PRIVATE solution customers are notified at the start and end of updates.</li>



<li>RESELLER, HOSTED, MXPLAN, TRUSTED, and EMAILPRO customers can use Exchange’ clustering to track maintenance progress on the <a href="https://web-cloud.status-ovhcloud.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OVHcloud status page</a>.</li>
</ul>



<figure class="wp-block-image aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="399" src="https://blog.ovhcloud.com/wp-content/uploads/2025/05/vulnerability-management-of-PU.MS_-1024x399.png" alt="" class="wp-image-28861" style="width:828px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/05/vulnerability-management-of-PU.MS_-1024x399.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/05/vulnerability-management-of-PU.MS_-300x117.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/05/vulnerability-management-of-PU.MS_-768x299.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/05/vulnerability-management-of-PU.MS_-1536x599.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/05/vulnerability-management-of-PU.MS_.png 1639w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading">Real-Time monitoring and protection</h2>



<p>We use several monitoring tools, developed in-house or provided by third-party vendors, to:</p>



<ul class="wp-block-list">
<li>monitor the exposure of OVHcloud Exchange services on the internet;</li>



<li>detect vulnerabilities and unusual activity in real time;</li>



<li>generate alerts and reports for instant analysis and troubleshooting.</li>
</ul>



<h2 class="wp-block-heading">Advanced spam protection</h2>



<p>Our OVHcloud Exchange solutions include a European anti-spam system that filters messages before they reach your inbox.</p>



<p>Benefits of spam filtering:</p>



<ul class="wp-block-list">
<li>advanced detection of fraudulent and phishing emails;</li>



<li>smart filtering based on machine learning;</li>



<li>significant decrease in spam and malicious emails.</li>
</ul>



<h2 class="wp-block-heading">HTTP request management update</h2>



<p><strong>Host Header Removal</strong></p>



<p>We’re currently fixing a server issue related to incorrect HTTP Host header usage. An invalid HTTP host header in a web request causes the server to immediately abort the request—this is specific to HTTP 1.0.</p>



<p><strong>Server Header Removal</strong></p>



<p>The HTTP server stops sending the header.</p>



<h2 class="wp-block-heading">To recap…</h2>



<p>We’re upgrading OVHcloud Exchange security by phasing out less secure TLS 1.0/1.1 protocols, bringing it in line with internationals security standards.<br>Regular updates, HSTS activation, continuous monitoring, and advanced anti-spam protection guarantee a secure, high-performance Exchange environment for all our customers.</p>



<p>Got questions about this update? Reach out to our <a href="https://www.ovhcloud.com/en-gb/contact/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">technical support</a> team.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="371" height="353" src="https://blog.ovhcloud.com/wp-content/uploads/2025/05/image-2.png" alt="" class="wp-image-28811" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/05/image-2.png 371w, https://blog.ovhcloud.com/wp-content/uploads/2025/05/image-2-300x285.png 300w" sizes="auto, (max-width: 371px) 100vw, 371px" /></figure>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fsecurity-of-exchange-services-tls-update-and-best-practices%2F&amp;action_name=Security%20of%20Exchange%20services%3A%20TLS%20update%20and%20best%20practices&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A brief retrospective of network-layer DDoS attacks in 2024 at OVHcloud</title>
		<link>https://blog.ovhcloud.com/a-brief-retrospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud/</link>
		
		<dc:creator><![CDATA[Christophe Bacara]]></dc:creator>
		<pubDate>Wed, 02 Apr 2025 08:16:31 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=28376</guid>

					<description><![CDATA[[15 min read] This article is primarily intended for an international audience of networks professionals, information security specialists, security researchers and technical stakeholders. Whether or not you belong to the target audience, but particularly if you do not, please be mindful of your conclusions. Table of Contents 1. Introduction Welcome to this brief retrospective about [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fa-brief-retrospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud%2F&amp;action_name=A%20brief%20retrospective%20of%20network-layer%20DDoS%20attacks%20in%202024%20at%20OVHcloud&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p><em>[15 min read]</em></p>



<p class="has-text-align-left"><em>This article is primarily intended for an international audience of networks</em> <em>professionals, information security specialists, security researchers and</em> <em>technical stakeholders. Whether or not you belong to the target audience, but</em> <em>particularly if you do not, please be mindful of your conclusions.</em></p>



<h2 class="wp-block-heading">Table of Contents</h2>



<ul class="wp-block-list">
<li>1. <a href="#org3aa88af">Introduction</a></li>



<li>2. <a href="#carpetbombing">Carpet-bombing is more popular than ever</a></li>



<li>3. <a href="#orgef485c3">The rise of packet rate attacks: billion(s) of packets per second</a></li>



<li>4. <a href="#org9acd697">Ever-growing hyper-volumetric attacks: 4 Tbps reached</a></li>



<li>5. <a href="#orga8961f4">Institutional and residential ISPs spoofing</a></li>



<li>6. <a href="#orge720bcc">Operation PowerOFF and consequences</a></li>



<li>7. <a href="#org940b1ab">Conclusion and closing words</a></li>
</ul>



<h2 class="wp-block-heading" id="org3aa88af">1. Introduction</h2>



<p>Welcome to this brief retrospective about the DDoS attack landscape in 2024, as seen from OVHcloud&#8217;s vantage point.</p>



<p class="has-text-align-left">Like any other cloud provider, we deal with DDoS attacks on a daily basis, automatically detecting and mitigating hundreds of attacks each and every day. We operate our own worldwide anti-DDoS infrastructure, built from systems designed and developped internally. To date, we have more than 50 Tbps of total mitigation capacity, located at the edge of our network as well as in dedicated scrubbing centers, for which we keep adding more capacity each year to keep up the pace.</p>



<p>Thanks to our global backbone and numerous points of presence, we do have a sensible view of Internet traffic and trends, especially when speaking about network-layer DDoS attacks. That&#8217;s why we wanted to expose and discuss several topics we encountered during the year, in the hope you may learn something or find it useful for your own sake.</p>



<p>Context aside, let&#8217;s dive into this retrospective: what a year! 2024 was definitely an important turning point in DDoS history, at least from our point of view. From good&#8217;ol DDoS techniques coming back at scale, to several record-breaking attacks, we&#8217;ve seen quite a lot, and no one doubts that 2024 events will be the main driving factor for anti-DDoS infrastructure planning in the coming years.</p>



<h2 class="wp-block-heading" id="carpetbombing">2. Carpet-bombing is more popular than ever</h2>



<p>During the year 2024, we observed a sudden increase of attacks leveraging a technique known as &#8220;carpet-bombing&#8221;. This attack technique is named after a brutal warfare method which consists in methodically bombing every bit of surface of a large area. Similarly, &#8220;carpet-bombing&#8221; in our context refers to attacks targeting many more IP addresses than those servicing the actual target.</p>



<p>Carpet-bomb attacks are used in an attempt to evade anti-DDoS systems. This is because they are much harder to detect and mitigate automatically: by sending a few hundreds megabits per second per IP, attacker can reach huge volumes while evading (at least partially) detection heuristics and possible mitigation actions. Simply put, instead of trying hard to bomb a target, just bomb the whole area around it.</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="280" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-1024x280.png" alt="" class="wp-image-28497" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-1024x280.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-300x82.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-768x210.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks.png 1519w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Figure 1: <em>Carpet-bomb attacks spread traffic over many IPs by virtually targeting a larger prefix</em></figcaption></figure>



<p>By targeting a large number of closely-related IPs (<em>e.g.</em>, belonging to a larger prefix), attackers rely on common design characteristics of many networking infrastructures: you generally want to assign an address range to a physical or logical part of your infrastructure for several reasons. Briefly, this is often required because of technical limitations on networking devices and appliances, as well as what is humanly possible to understand and manage: whether for hardware or humans, you cannot store millions to billions entries in routing table, access control lists, etc. At some point, you must aggregate your resources.</p>



<p>Back to the main topic, carpet-bomb attacks are a double-edged sword: the part of the attack possibly reaching your final target will probably not be powerful enough to take it down, but you take a better chance at evading defenses. This is because it&#8217;s much more difficult to identify with confidence what is legitimate from what is not, but also to scrub traffic without impacting legitimate users. In the end, the total attack traffic leaking defenses may impact a significant chunk of the hosting infrastructure, even if traffic to any single destination IP would not have been enough to take it down.</p>



<p>2024 has been a turning point in carpet-bomb trends from our point of view. Attackers started to leverage this technique more and more often, with mixed results, and led us to rethink how to deal with such attacks. For some times now, we are testing and calibrating our solution to the issue, but need to treat carefully: facing such a radical threat may lead to actions which could be impactful for other customers. There&#8217;s a difficult balance between sensitivity (<em>i.e.</em>, make sure you don&#8217;t detect or mitigate too much) versus specificity (<em>i.e.</em>, make sure you don&#8217;t miss anything notable). We will keep working hard to address the matter and minimize disruption.</p>



<h2 class="wp-block-heading" id="orgef485c3">3. The rise of packet rate attacks: billion(s) of packets per second</h2>



<p>In June 2024, we published a blog article titled <em>&#8220;The Rise of Packet Rate Attacks: When Core Routers Turn Evil&#8221;</em>.<sup data-fn="956b42b5-26ed-4005-aace-cb55eb1d842f" class="fn"><a href="#956b42b5-26ed-4005-aace-cb55eb1d842f" id="956b42b5-26ed-4005-aace-cb55eb1d842f-link">1</a></sup> This article was presenting our findings related to small core routers participating in DDoS attacks, and was a byproduct of our investigations about a concerning trend with packet rate attacks. Readers should refer to the cited article to have a detailed explanation of how they work, and why these attacks remain a longstanding threat.</p>



<p>Since the end of 2023 and beginning of 2024, we noticed a large increase of packet rate attacks both in frequency and intensity, with intensity reaching an all-time high at the end of summer.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="1019" height="465" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24.png" alt="" class="wp-image-28413" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24.png 1019w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24-300x137.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24-768x350.png 768w" sizes="auto, (max-width: 1019px) 100vw, 1019px" /><figcaption class="wp-element-caption">Figure 2: <em>Steadily growing trend of packet rate attacks frequency and intensity</em></figcaption></figure>



<p>During August, we dealt with more than 50 packet-rate attacks rating over one billion packets per second. Note that the highest publicly known packet rate attack at this time was the 840 Mpps attack we mitigated in April of the same year.</p>



<p>However, this attack campaign not only reached the billion packets per second milestone, but actually went much higher with packet rates up to 1.9 billions packets per second. Such a rate was mind-blowing for our teams, and rightly so! A symbolic threshold was not only reached, but largely exceeded. Since then, several organizations reported observing 1+ Gpps attacks and more: for instance, Cloudflare reported rates greater than 2 billions packets per second <sup data-fn="6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d" class="fn"><a href="#6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d" id="6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d-link">2</a></sup> in an attack campaign which occurred just a few days after the attack campaign targeting OVHcloud and its customers, while Global Secure Layer reported a single 3.15 billions packets per second attack at the same time.<sup data-fn="8c211be4-e789-4c4d-8eec-4c6deb922374" class="fn"><a href="#8c211be4-e789-4c4d-8eec-4c6deb922374" id="8c211be4-e789-4c4d-8eec-4c6deb922374-link">3</a></sup></p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="826" height="268" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps.png" alt="" class="wp-image-28501" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps.png 826w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps-300x97.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps-768x249.png 768w" sizes="auto, (max-width: 826px) 100vw, 826px" /><figcaption class="wp-element-caption">Figure 3: <em>Biggest packet-rate attack observed in 2024 (up to 1.9 Gpps at peak, attacks in red)</em></figcaption></figure>



<p>Before moving on to the next topic, a notable fact related to this attack campaign is that it was heavily leveraging carpet-bombing techniques targeting up to thousands of IPs over hundreds of customers. Attackers are definitely not scared about trying to impact a lot of people in an attempt to take down a specific service, despite the increased attention this kind of attack generates.</p>



<h2 class="wp-block-heading" id="org9acd697">4. Ever-growing hyper-volumetric attacks: 4 Tbps reached</h2>



<p>During the month of September, we were thrilled to mitigate our very first 3+ Tbps attack ever. However, it was just a warning shot for what was to come: another massive attack campaign during October. Although we had only seen a handful of 2+ Tbps attacks in OVHcloud history, this two weeks campaign led to more than 40 attacks ranging from 2 Tbps up to a record-breaking (at the time) 4.2 Tbps attack.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="832" height="267" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps.png" alt="" class="wp-image-28503" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps.png 832w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps-300x96.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps-768x246.png 768w" sizes="auto, (max-width: 832px) 100vw, 832px" /><figcaption class="wp-element-caption">Figure 4: <em>Biggest bit-rate attack observed in 2024 (up to 4.2 Tbps at peak, attack in red)</em></figcaption></figure>



<p>Since most attacks exhibited similar characteristics, we will focus on the biggest one. At the time it happened, this attack was the largest bit rate attack ever (compared to previous publicly known records). It leveraged multiple attack vectors at once : TCP ACK flood accounted for ~60% of the total traffic, direct-path UDP flood accounted for 20%, while the remaining 20% was performed with various UDP reflections (mostly DNS).</p>



<p>We identified approximately 150,000 source IPs, mostly owned by residential ISPs from Europe and North America. For the most part, attackers did not seem to leverage source spoofing, since our data shows that traffic from IPs belonging to an ISP came from direct peering with said ISP or a related exchange/transit provider. However, the surprising amount of unique source IPs and the significant volume going through exchange/transit suggest there is possibly some undetected spoofing. Total count of unique source IPs should thus be considered with a lot of salt.</p>



<p>One notable thing also is that few tens of attacking IPs were sending 1+ Gbps each, which suggests high-grade residential connections with lot of upload bandwidth. Moreover, according to our analysis, all the direct-path attack traffic (approximately 80% of total) was originating from a Mirai-based botnet.</p>



<p>All these findings are in-line with conclusions from various cloud providers and analysts, showing the continuously growing threat of compromised IoT devices and home routers. 8 years after the initial release of Mirai code, this botnet family is still actively used to attempt disrupting the online economy.</p>



<p>Readers should note that since the 4.2 Tbps attack we just discussed, several actors reported even higher rates such as the 5.6 Tbps at Cloudflare in late 2024 <sup data-fn="3dbbae49-e228-4557-aeca-54ff02145c05" class="fn"><a href="#3dbbae49-e228-4557-aeca-54ff02145c05" id="3dbbae49-e228-4557-aeca-54ff02145c05-link">4</a></sup>, or the more recent 6.5 Tbps attack reported by Nokia in February 2025.<sup data-fn="3e7cf4bd-8aeb-4595-88d4-105c5ececa9f" class="fn"><a href="#3e7cf4bd-8aeb-4595-88d4-105c5ececa9f" id="3e7cf4bd-8aeb-4595-88d4-105c5ececa9f-link">5</a></sup></p>



<h2 class="wp-block-heading" id="orga8961f4">5. Institutional and residential ISPs spoofing</h2>



<p>Last but not least, we also observed another growing trend during the year: the large-scale spoofing of major residential ISPs.</p>



<p>We are used seeing many IPs belonging to residential ISPs participating in attacks, as a lot of compromised devices are located within those networks (&#8220;<em>I see you.. Internet of Things!</em>&#8220;). However we observed a growing number of attacks using those IPs, but originating from far abroad: for instance, we found traffic using IPs of major French ISPs (Orange, SFR, Bouygues, Free) but originating from the US west coast or Asia-Pacific, and coming through unrelated peering partners (despite us directly peering with said ISPs!). In this situation, source IPs are obviously spoofed.</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="593" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-1024x593.png" alt="" class="wp-image-28416" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-1024x593.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-300x174.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-768x445.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS.png 1437w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Figure 5: <em>Typical entry distribution of an attack with spoofed sources</em></figcaption></figure>



<p>We also observed the same technique being used by spoofing large institutional actors, such as state actors or government-backed organizations which own several Internet prefixes.</p>



<p>An explanation about these attacks is that attackers are trying to leverage hypothetical bypasses in defense layers such as lax rate control, allow/forward rules, and others. This makes sense because, as a major european actor based in France (with a significant business in France), we could have considered being less strict with French IPs. It&#8217;s also much harder to react against an attack that could lead to actions shutting down legitimate traffic as well, which will be the case if one decides to deny entire ranges against such attacks (we don&#8217;t do that!).</p>



<p>Moreover, we sometimes have customers asking us to disable any DDoS protections for their IPs, because &#8220;we can trust them&#8221;. But that&#8217;s not how the Internet works. As a provider, protecting yourself against external spoofing is maybe doable on paper, but in reality, it&#8217;s close to impossible. That&#8217;s why we have security measures, and bypassing them even with the best intent will often prove itself as a bad decision, not only for the requesting customers but also for any other services which could be impacted because of this.</p>



<p>Finally, this issue highlights a crucial need for DDoS attacks remediation: all network operators have a part to play in preventing IP spoofing. This shall be done at two levels: at server/switch level by locally preventing IP spoofing from a specific host, and at the network level by preventing outbound traffic with source IPs not owned by the network operator.</p>



<h2 class="wp-block-heading" id="orge720bcc">6. Operation PowerOFF and consequences</h2>



<p>Operation PowerOFF is an ongoing joint operation by several law enforcement agencies around the world, specifically aimed at shutting down DDoS-for-hire operations. At the beginning of November 2024, they closed the infamous dstatc.cc platform, which provided means for attackers to benchmark the capabilities and effectiveness of DDoS attacks. Along with this closure, multiple DDoS-for-hire websites were closed, botnets dismantled, and cybercriminals arrested.<sup data-fn="02fba98e-e0ee-46dc-9581-322c4edc37d5" class="fn"><a href="#02fba98e-e0ee-46dc-9581-322c4edc37d5" id="02fba98e-e0ee-46dc-9581-322c4edc37d5-link">6</a></sup></p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="550" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-1024x550.png" alt="" class="wp-image-28417" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-1024x550.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-300x161.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-768x412.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-1536x825.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage.png 1706w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Figure 6: <em>Homepage of dstat.cc since November 2024</em></figcaption></figure>



<p>This event led to a huge decline in frequency and intensity of network-layer DDoS attacks targeting OVHcloud infrastructures and customers. For some time, our attack statistics were quite below their usual levels of the past two years. This fact proves the effectiveness of global coordinated actions to take down botnets, and should call for more.</p>



<h2 class="wp-block-heading" id="org940b1ab">7. Conclusion and closing words</h2>



<p>In the past, network-layer DDoS attacks were often dismissed as a minor inconvenience, or even a solved problem. However, as year 2024 proved, they still represent a growing and longstanding threat which must be addressed seriously. That&#8217;s one reason why DDoS attacks are often stated in threat reports emanating from various actors, such as a recent threat report published by the French national information security agency (ANSSI) in February 2025.<sup data-fn="20e08343-9d6a-4511-a7a7-5578007f1bec" class="fn"><a href="#20e08343-9d6a-4511-a7a7-5578007f1bec" id="20e08343-9d6a-4511-a7a7-5578007f1bec-link">7</a></sup></p>



<p>Although application-layer attacks (especially HTTPS) are more popular nowadays for several reasons, no one should dismiss network-layer attacks as an unsignificant risk. If dealing successfully with billions of packets per second or several terabits of traffic may seem like an achievement for a few of us, it is a very difficult challenge for many. Be prepared!</p>



<p>Fighting against these threats must be done at both an individual and a global level. Coordinated efforts are a necessity in today&#8217;s DDoS landscape and will probably be even more important in years to come. It may sound scary, but remember it actually has a positive impact as demonstrated once again by Operation PowerOFF.</p>



<p>Thanks for reading.</p>


<ol class="wp-block-footnotes"><li id="956b42b5-26ed-4005-aace-cb55eb1d842f"><a href="https://blog.ovhcloud.com/the-rise-of-packet-rate-attacks-when-core-routers-turn-evil/" data-wpel-link="internal">https://blog.ovhcloud.com/the-rise-of-packet-rate-attacks-when-core-routers-turn-evil/</a> <a href="#956b42b5-26ed-4005-aace-cb55eb1d842f-link" aria-label="Jump to footnote reference 1">↩︎</a></li><li id="6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d"><a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/</a> <a href="#6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d-link" aria-label="Jump to footnote reference 2">↩︎</a></li><li id="8c211be4-e789-4c4d-8eec-4c6deb922374"><a href="https://globalsecurelayer.com/blog/unprecedented-3-15-billion-packet-rate-ddos-attack" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://globalsecurelayer.com/blog/unprecedented-3-15-billion-packet-rate-ddos-attack</a> <a href="#8c211be4-e789-4c4d-8eec-4c6deb922374-link" aria-label="Jump to footnote reference 3">↩︎</a></li><li id="3dbbae49-e228-4557-aeca-54ff02145c05"><a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/</a> <a href="#3dbbae49-e228-4557-aeca-54ff02145c05-link" aria-label="Jump to footnote reference 4">↩︎</a></li><li id="3e7cf4bd-8aeb-4595-88d4-105c5ececa9f"><a href="https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</a> <a href="#3e7cf4bd-8aeb-4595-88d4-105c5ececa9f-link" aria-label="Jump to footnote reference 5">↩︎</a></li><li id="02fba98e-e0ee-46dc-9581-322c4edc37d5"><a href="https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-shuts-down-27-ddos-booters-ahead-of-annual-christmas-attacks" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-shuts-down-27-ddos-booters-ahead-of-annual-christmas-attacks</a> <a href="#02fba98e-e0ee-46dc-9581-322c4edc37d5-link" aria-label="Jump to footnote reference 6">↩︎</a></li><li id="20e08343-9d6a-4511-a7a7-5578007f1bec"><a href="https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-001/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-001/</a> <a href="#20e08343-9d6a-4511-a7a7-5578007f1bec-link" aria-label="Jump to footnote reference 7">↩︎</a></li></ol><img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fa-brief-retrospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud%2F&amp;action_name=A%20brief%20retrospective%20of%20network-layer%20DDoS%20attacks%20in%202024%20at%20OVHcloud&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bare Metal Pod: Genesis</title>
		<link>https://blog.ovhcloud.com/bare-metal-pod-genesis/</link>
		
		<dc:creator><![CDATA[David Mondon]]></dc:creator>
		<pubDate>Tue, 01 Apr 2025 07:10:26 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[bare metal]]></category>
		<category><![CDATA[engineering]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=28439</guid>

					<description><![CDATA[Today, we&#8217;re going to embark on a journey of discovery, and unveil our latest product: Bare Metal Pod. You know us for the services we provide: bare metal servers, managed and unmanaged virtualisation platform, our 40+ public cloud services, domain names and telco. This is just the tip of the iceberg, and to understand why [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fbare-metal-pod-genesis%2F&amp;action_name=Bare%20Metal%20Pod%3A%20Genesis&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="683" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/Copy-of-Blog-post-1200x8001-1-1024x683.png" alt="" class="wp-image-28486" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/Copy-of-Blog-post-1200x8001-1-1024x683.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Copy-of-Blog-post-1200x8001-1-300x200.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Copy-of-Blog-post-1200x8001-1-768x512.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Copy-of-Blog-post-1200x8001-1.png 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Today, we&#8217;re going to embark on a journey of discovery, and unveil our latest product: <a href="https://www.ovhcloud.com/en-ie/bare-metal/secnumcloud/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Bare Metal Pod</a>.</p>



<p>You know us for the services we provide: bare metal servers, managed and unmanaged virtualisation platform, our 40+ public cloud services, domain names and telco.</p>



<p>This is just the tip of the iceberg, and to understand why we built and now offer Bare Metal Pod, we have to dig deeper.</p>



<p>So let’s begin this journey exploring the origins of Bare Metal Pod, and in later articles we’ll cover the more technical details—there’s a lot to touch on.</p>



<h3 class="wp-block-heading"><strong>The OVHcloud way: more than just servers</strong></h3>



<p>As a cloud services provider, we supply the different platforms mentioned above. But most importantly, we have to take care of the infrastructure dedicated to these services, from the buildings, power and cooling to the software stack and automation required.</p>



<p>And we’ve been doing just this since 2001. It all started with the opening of our first datacentre in Paris, then building our own servers the next year, and our proprietary water-cooling solution the year after that.</p>



<p>At the core, we are all about <strong>efficiency, automation, and sustainability</strong>:</p>



<ul class="wp-block-list">
<li><strong>Repurposing buildings</strong> as datacentres</li>



<li><strong>Designing our own servers</strong> to optimise performance and cost</li>



<li><strong>Maximising cooling efficiency</strong> to cut waste</li>



<li><strong>Automating everything</strong> to reduce errors and delays</li>
</ul>



<p>And, in all modesty&#8230;. we&#8217;re pretty good at these.</p>



<h3 class="wp-block-heading"><strong>Optimising datacentres like a pro</strong></h3>



<p>Basically, building our own servers in our Croix (FR) and Beauharnois (CA) plants means packing <strong>a ton of servers into a square metre. </strong>We’re talking about 4 custom racks, each hosting 48 servers, all in just 3 sq.m and using up to 160kW of 12V DC power. This gives us a server density of about 5000W per sq/ft, which beats out 90% of the industry.</p>



<p>And on top of that, we’ve got our proprietary water-cooling system—we save energy by not using AC for our servers. To further optimise air cooling, each of our rack is equipped with a large condenser (we call it a <strong>chilled door</strong>) at the rear of the rack, dissipating regular server heat in our water system. This keeps the datacentre comfortably warm for our staff and the network equipment, and extends hardware lifespan (less maintenance, fewer replacements, fewer outages….so <strong>more savings</strong>).</p>



<p>In addition to the physical optimisations we’ve just mentioned is our <strong>automation system</strong>. When a server or a cluster of servers have been assembled and tested in our plant, it’s sent to the datacentre, racked and connected to power, network, and water-cooling systems by our DC staff.</p>



<p>And from there, everything is automated. From server power management, discovery, testing, and readiness checks, to the moment it’s selected by a customer using their Control Panel, and then configured. No human interaction is required, meaning no delay and no error.</p>



<p>And these operations have been optimised and refined for over 20 years.</p>



<h3 class="wp-block-heading"><strong>Enter Project Gold-o-rack</strong></h3>



<p>So in June 2023, a small team was assembled to review, analyse and build a new version of this system. We had 3 goals:</p>



<ul class="wp-block-list">
<li>Provide customers with dedicated <strong>on-premises autonomous racks</strong></li>



<li>Offer custom-built, plug-and-play <strong>Bare Metal Pods</strong></li>



<li>Upgrade the automation and security of our <strong>own datacentres</strong></li>
</ul>



<p>And that’s how <strong>Project Gold-o-rack</strong> came to be—a tribute to <strong>Goldorak (Grendizer)</strong>, the legendary <strong>70s anime mecha</strong> that crushed its enemies with style. Like its namesake, our system is <strong>powerful, autonomous, and unstoppable</strong>.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="1024" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/Final.png" alt="" class="wp-image-28440" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/Final.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Final-300x300.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Final-150x150.png 150w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Final-768x768.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Final-70x70.png 70w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Using opensource technology was a must, as we absolutely can’t do without transparency and community support. So we went for <strong>OpenStack</strong>, <strong>Netbox</strong>, <strong>Grafana</strong>, and developed our own network management and automation system, and much more.</p>



<p>By <strong>September 2023</strong>—just <strong>three months later</strong>—we had a fully functional <strong>24U rack</strong>, deployable and operational in <strong>25 minutes</strong>. That’s not just fast—that’s <strong>insanely fast</strong>.</p>



<p>Security was a top priority since these racks would be installed in <strong>third-party datacentres</strong>. We quickly applied for <strong>SecNumCloud qualification</strong>, leveraging our existing compliance expertise.</p>



<p>Then, it hit us: <strong>why not offer this as a full-fledged product?</strong> And that’s how <strong>Bare Metal Pod</strong> came to be—dedicated, secure, and fully automated.</p>



<p>We structured the product into <strong>three key components</strong>:</p>



<ol class="wp-block-list" start="1">
<li><strong>On-Prem Cloud Platform (OPCP):</strong> The autonomous rack, with its own <strong>KMS and encryption mechanisms</strong></li>



<li><strong>Bare Metal Pod:</strong> Built on <strong>OPCP</strong>, hosted in <strong>our datacentres</strong>, and <strong>SecNumCloud-compliant</strong></li>



<li><strong>Cloud Store:</strong> A software catalogue enabling automated deployment within the rack</li>
</ol>



<p>In June 2024, OPCP was ready, just 12 months after the 1st meeting… and shortly after we got the “green light” from the ANSSI, allowing us to pursue the SecNumCloud qualification process.</p>



<p>And if you were at, or watched our Summit Keynote in November 2024, you definitely saw it live…</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="576" height="577" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/Capture-decran-2025-03-28-094957.png" alt="BM POD Summit 2024" class="wp-image-28470" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/Capture-decran-2025-03-28-094957.png 576w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Capture-decran-2025-03-28-094957-300x300.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Capture-decran-2025-03-28-094957-150x150.png 150w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/Capture-decran-2025-03-28-094957-70x70.png 70w" sizes="auto, (max-width: 576px) 100vw, 576px" /></figure>



<p></p>



<h3 class="wp-block-heading"><strong>What’s under the hood?</strong></h3>



<p>As an autonomous rack, it contains:</p>



<ul class="wp-block-list">
<li> Power Distribution Units</li>



<li> Network equipment for internal and external connectivity</li>



<li> Servers, including a <strong>Pod Controller</strong></li>
</ul>



<p>There are <strong>9 Bare Metal server models</strong> available, from 16 to <strong>256 cores</strong>, from 128 GB to <strong>2.5 TB of memory</strong>, up to 792 TB NVMe SSD (RAW),<strong> Nvidia L4 and L40s GPU</strong> depending on your needs.</p>



<p>And the best part is that you can mix and match them, to build and manage the perfect autonomous rack, while keeping <strong>full control on security and resources</strong>.</p>



<p>We’ve got a total of 607 models in Bare Metal Pod, enough for nearly any configuration and need. And with up to 1500 servers in a single Pod, the possibilities are endless.</p>



<p>And on top of these servers, we are building an automated software library: <strong>the Cloud Store</strong>. Enclosed in the Bare Metal Pod, the Cloud Store will offer the Pod admin a selection of OS, virtualisation platforms and various software that can be <strong>pushed, installed, configured automatically on the servers</strong> in the Pod. This includes built-in <strong>security, monitoring, and logging</strong> integrated in the Pod monitoring tools.</p>



<p>And herein<sup data-fn="116cf438-18fd-4e6b-9424-87a974fecaf9" class="fn"><a href="#116cf438-18fd-4e6b-9424-87a974fecaf9" id="116cf438-18fd-4e6b-9424-87a974fecaf9-link">1</a></sup> lies the main challenge: making sure an entire collection of software from various editors can cohabit and interact with a single, opensource monitoring platform, a KMS, and an IAM without breaking anything…</p>



<h3 class="wp-block-heading"><strong>Coming up next…</strong></h3>



<p>That’s a wrap for now! In the next article, we’ll deep-dive into <strong>hardware, networking, and security</strong>. Stay tuned!</p>



<h3 class="wp-block-heading">Some of the Bare Metal servers options:</h3>



<ul class="wp-block-list">
<li><strong>Scale A1 &#8211; A8</strong>: Equipped with 4th Gen Intel Xeon Gold or AMD EPYC 9004 series processors, these servers provide between 16 to 256 cores and 128 GB to 1 TB of DDR5 ECC RAM. They are suitable for:
<ul class="wp-block-list">
<li>Hosting SaaS and PaaS solutions</li>



<li>Virtualisation</li>



<li>Database hosting</li>



<li>Containerisation and orchestration</li>



<li>Confidential computing</li>



<li>High-performance computing</li>
</ul>
</li>



<li><strong>Scale-GPU 1 &#8211; 3</strong>: Featuring NVIDIA L4 GPU cards (x2 or x4) and up to 1.2 TB of DDR5 ECC RAM, these servers are ideal for:
<ul class="wp-block-list">
<li>3D modelling</li>



<li>Media streaming</li>



<li>Virtual Desktop Infrastructure (VDI)</li>



<li>Data inference</li>
</ul>
</li>
</ul>



<ul class="wp-block-list">
<li><strong>HGR-HCI I1 &#8211; I4</strong>: With dual 5th Gen Intel Xeon Gold or 4th Gen AMD EPYC 9004 series processors, these servers provide between 16 to 72 cores and up to 2.5 TB of DDR5 ECC RAM. They are suitable for:
<ul class="wp-block-list">
<li>Hyperconverged infrastructure</li>



<li>Virtualisation</li>



<li>Database hosting</li>



<li>Containerisation and orchestration</li>



<li>Confidential computing</li>



<li>High-performance computing</li>
</ul>
</li>



<li><strong>HGR-SDS 1 &#8211; 2</strong>: Equipped with dual 5th Gen Intel Xeon Gold processors, these servers offer between 16 to 48 cores and up to 1.5 TB of DDR5 ECC RAM. They are ideal for:
<ul class="wp-block-list">
<li>Software-defined storage solutions</li>



<li>Object storage solutions</li>



<li>Big data</li>



<li>Database hosting</li>
</ul>
</li>



<li><strong>HGR-STOR 1 &#8211; 2</strong>: Featuring a 5th Gen Intel Xeon Gold processor with 36 cores and up to 512 GB of DDR5 ECC RAM, these servers are designed for:
<ul class="wp-block-list">
<li>Archiving</li>



<li>Database hosting</li>



<li>Backup and disaster recovery plans</li>
</ul>
</li>



<li><strong>HGR-AI-2</strong>: Equipped with NVIDIA L40s GPU cards (x2 or x4) and up to 2.3 TB of DDR5 ECC RAM, these servers are optimized for:
<ul class="wp-block-list">
<li>Machine learning</li>



<li>Deep learning</li>
</ul>
</li>
</ul>



<p>(And many other options… you get the idea.)</p>


<ol class="wp-block-footnotes"><li id="116cf438-18fd-4e6b-9424-87a974fecaf9"><a href="https://www.collinsdictionary.com/dictionary/english/herein" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external"> </a>My editor liked the word and I found it cool too. <a href="https://www.collinsdictionary.com/dictionary/english/herein" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">https://www.collinsdictionary.com/dictionary/english/herein</a> <a href="#116cf438-18fd-4e6b-9424-87a974fecaf9-link" aria-label="Jump to footnote reference 1">↩︎</a></li></ol><img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fbare-metal-pod-genesis%2F&amp;action_name=Bare%20Metal%20Pod%3A%20Genesis&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enabling Healthcare Awareness and Access</title>
		<link>https://blog.ovhcloud.com/enabling-healthcare-awareness-and-access/</link>
		
		<dc:creator><![CDATA[Satyam Santosh]]></dc:creator>
		<pubDate>Thu, 20 Mar 2025 13:14:13 +0000</pubDate>
				<category><![CDATA[OVHcloud Startup Program]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[OVHcloud]]></category>
		<category><![CDATA[Public Cloud]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Startup Program]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=28139</guid>

					<description><![CDATA[Startup highlight: Interview with Rajat Garg, CEO at myUpchar.com myUpchar.com&#8216;s mission is to enable healthcare awareness and access for India. They have been in OVHcloud&#8217;s Startup Program since July 2024 and are currently serving 100M patients every month. Can you introduce myUpchar.com and its mission? myUpchar.com is an innovative healthcare platform that aims to bridge [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fenabling-healthcare-awareness-and-access%2F&amp;action_name=Enabling%20Healthcare%20Awareness%20and%20Access&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<h4 class="wp-block-heading"><strong><em>Startup highlight:</em></strong> <strong>Interview with Rajat Garg, CEO at myUpchar.com</strong></h4>



<p><a href="http://www.myupchar.com" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">myUpchar.com</a>&#8216;s mission is to enable healthcare awareness and access for India. They have been in <a href="https://startup.ovhcloud.com/en/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OVHcloud&#8217;s Startup Program</a> since July 2024 and are currently serving 100M patients every month.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>Can you introduce myUpchar.com and its mission?</strong></p>



<p><a href="http://www.myupchar.com" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">myUpchar.com</a> is an innovative healthcare platform that aims to bridge the gap between healthcare providers and patients by delivering accessible and affordable medical advice. Our mission is to empower individuals in India to take charge of their health with expert, reliable, and timely support, particularly for those who may not have easy access to traditional healthcare services. Our core values center around <strong>trust, transparency</strong>, and making healthcare as <strong>accessible</strong> as possible for everyone.</p>



<figure class="wp-block-image aligncenter size-full is-resized"><a href="http://www.myupchar.com" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><img loading="lazy" decoding="async" width="1000" height="200" src="https://blog.ovhcloud.com/wp-content/uploads/2025/02/myUpchar-logo-v1.jpg" alt="" class="wp-image-28144" style="width:360px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/02/myUpchar-logo-v1.jpg 1000w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/myUpchar-logo-v1-300x60.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/myUpchar-logo-v1-768x154.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></a></figure>



<p></p>



<p><strong>What challenges did myUpchar.com face before partnering with OVHcloud?</strong></p>



<p>Initially, scalability was a major challenge as we grew, especially with managing high traffic spikes during certain periods. Security concerns around sensitive patient data were also at the forefront, along with the cost of infrastructure. The biggest technical hurdle was ensuring that our platform could handle an increasing number of users without compromising on performance.</p>



<p><strong><strong>How did OVHcloud help you address these challenges?</strong></strong></p>



<p>With our growing user base and the increasing complexity of handling large volumes of sensitive data, we needed a cloud solution that could offer the <strong>scalability, security, and cost efficiency </strong>we were seeking. OVHcloud presented the right combination of features to meet these demands.</p>



<p>We are using OVHcloud’s scalable compute instances and their <a href="https://www.ovhcloud.com/en-in/public-cloud/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">public cloud solutions</a> to ensure both performance and security. The flexibility in resource allocation and pricing structure has been a major differentiator for us, as it aligns well with our cost-conscious growth strategy.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="500" height="644" src="https://blog.ovhcloud.com/wp-content/uploads/2025/02/diagram.png" alt="" class="wp-image-28140" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/02/diagram.png 500w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/diagram-233x300.png 233w" sizes="auto, (max-width: 500px) 100vw, 500px" /></figure>



<p></p>



<p><strong>How did you leverage OVHcloud&#8217;s Startup Program?</strong></p>



<p>OVHcloud provided us with a flexible, secure, and scalable infrastructure, which allowed us to seamlessly scale our platform while reducing operational complexity. The support from <a href="https://ovh.commander1.com/c3/?tcs=3810&amp;chn=organicsocial&amp;src=other&amp;cty_ads=in&amp;lang_ads=en&amp;cty=IN&amp;unvrse=programs&amp;pcat=startup&amp;subtpc=PrivateCloud&amp;tactic=awrns&amp;objv=traffic&amp;site_domain=https://startup.ovhcloud.com&amp;cmp=organicsocial_EC_in_en_IN_programs_startup_PrivateCloud_awrns_traffic&amp;crtive=dimg_image_728x90_unfilled&amp;url=https%3A%2F%2Fstartup.ovhcloud.com%2Fen-in%2F%3Fat_medium%3DOrganic%20Social%26at_campaign%3DOther%26at_creation%3Dorganicsocial_EC_in_en_IN_programs_startup_PrivateCloud_awrns_traffic%26at_variant%3Ddimg_image_728x90_unfilled" data-wpel-link="exclude">OVHcloud’s Startup Program</a> was instrumental in helping us navigate these challenges effectively.</p>



<p>OVHcloud’s <a href="https://www.ovhcloud.com/en-in/professional-services/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">professional services</a> team has been excellent in helping us set up our infrastructure and optimize it as our needs evolved. Their guidance in scaling our resources and their proactive approach has helped us avoid many potential bottlenecks.</p>



<p><strong>What tangible results has myUpchar.com achieved through this partnership?</strong></p>



<p>Since moving to OVHcloud, we’ve seen a significant improvement in platform performance, especially during high-traffic periods. Our infrastructure is more cost-efficient, and we’ve been able to reinvest those savings into other areas like user experience improvements. Additionally, with OVHcloud’s security features, we’ve been able to enhance user trust, which has boosted our retention rates.</p>



<p>These improvements in performance and cost-efficiency have directly contributed to our ability to scale quickly while keeping our operations lean. The enhanced security has also improved user satisfaction and encouraged more people to use our platform.</p>



<p><strong>What’s next for myUpchar.com?</strong></p>



<p>Our goal is to continue growing myUpchar into a leading healthcare platform in India, expanding both our service offerings and our user base. We envision leveraging the cloud ecosystem to provide even more personalized and scalable healthcare solutions in the future.</p>



<p>As we grow, we foresee challenges around maintaining service quality at scale, especially with a larger user base. <a href="https://ovh.commander1.com/c3/?tcs=3810&amp;chn=organicsocial&amp;src=other&amp;cty_ads=in&amp;lang_ads=en&amp;cty=IN&amp;unvrse=multi&amp;pcat=multi&amp;subtpc=PrivateCloud&amp;tactic=awrns&amp;objv=traffic&amp;site_domain=https://www.ovhcloud.com&amp;cmp=organicsocial_EC_in_en_IN_multi_multi_PrivateCloud_awrns_traffic&amp;crtive=dimg_image_728x90_unfilled&amp;url=https%3A%2F%2Fwww.ovhcloud.com%2Fen-in%2Fhosted-private-cloud%2F%3Fat_medium%3DOrganic%20Social%26at_campaign%3DOther%26at_creation%3Dorganicsocial_EC_in_en_IN_multi_multi_PrivateCloud_awrns_traffic%26at_variant%3Ddimg_image_728x90_unfilled" data-wpel-link="exclude">Cloud technologies</a> will be essential in helping us maintain flexibility, optimize resource usage, and continue to enhance security as we expand.</p>



<p><strong>What advice can you give to fellow start-ups?</strong></p>



<p>My advice would be to invest in a flexible, scalable cloud infrastructure early on, and don’t hesitate to leverage startup programs that offer tailored support. Cloud solutions can save you a lot of headaches down the road, particularly around scalability and security. Finding a provider with strong support and customizable pricing structures can make a huge difference in managing costs and growing efficiently.</p>



<p>Our collaboration with OVHcloud has been crucial in overcoming many of the challenges we faced as we scaled <a href="https://www.myupchar.com/en" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">myUpchar.com</a>. With their support, we have been able to improve platform performance, reduce costs, and enhance security, all of which have contributed to our success.</p>



<p>I encourage other startups to explore the <a href="https://startup.ovhcloud.com/en/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">OVHcloud Startup Program</a>—it offers great tools and support to help startups grow efficiently and securely.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<figure class="wp-block-image size-large"><a href="https://ovh.commander1.com/c3/?tcs=3810&amp;chn=organicsocial&amp;src=other&amp;cty_ads=in&amp;lang_ads=en&amp;cty=IN&amp;unvrse=programs&amp;pcat=startup&amp;subtpc=FastForward&amp;tactic=awrns&amp;objv=traffic&amp;site_domain=https://startup.ovhcloud.com&amp;cmp=organicsocial_EC_in_en_IN_programs_startup_FastForward_awrns_traffic&amp;crtive=dimg_image_728x90_unfilled&amp;url=https%3A%2F%2Fstartup.ovhcloud.com%2Fen-in%2Faccelerator%2F%3Fat_medium%3DOrganic%20Social%26at_campaign%3DOther%26at_creation%3Dorganicsocial_EC_in_en_IN_programs_startup_FastForward_awrns_traffic%26at_variant%3Ddimg_image_728x90_unfilled" data-wpel-link="exclude"><img loading="lazy" decoding="async" width="1024" height="253" src="https://blog.ovhcloud.com/wp-content/uploads/2025/02/FF-banner-1024x253.png" alt="" class="wp-image-28141" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/02/FF-banner-1024x253.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/FF-banner-300x74.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/FF-banner-768x190.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/FF-banner-1536x379.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/FF-banner.png 1870w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></a></figure>



<p></p>



<p><strong>Join the OVHcloud Startup Program</strong></p>



<p>myUpchar.com&#8217;s success highlights the transformative power of leveraging OVHcloud’s Startup Program. Are you ready to take your startup to the next level? Join a growing community of innovators and benefit from tailored cloud solutions, expert guidance, and a global ecosystem.<br>Learn more about <a href="https://startup.ovhcloud.com/en-ie/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external"><strong>OVHcloud’s Startup Program</strong></a> and get started on your journey today!</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fenabling-healthcare-awareness-and-access%2F&amp;action_name=Enabling%20Healthcare%20Awareness%20and%20Access&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enhancing Kubernetes Security: Detecting Threats in OVHcloud Managed Kubernetes cluster (MKS) Audit Logs with Falco</title>
		<link>https://blog.ovhcloud.com/enhancing-kubernetes-security-detecting-threats-in-ovhcloud-managed-kubernetes-cluster-mks-audit-logs-with-falco/</link>
		
		<dc:creator><![CDATA[Aurélie Vache]]></dc:creator>
		<pubDate>Tue, 11 Feb 2025 08:58:40 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[Tranches de Tech & co]]></category>
		<category><![CDATA[Kubernetes]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[OVHcloud]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=27886</guid>

					<description><![CDATA[Several month ago we discovered Falco, a Cloud Native near real-time threats detection tool, and we saw how to install it on an OVHcloud MKS cluster. Today we will connect our Falco instance to a MKS cluster in order to retrieve Kubernetes Audit Logs events and watch if everything is OK in our cluster. Concretely, [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fenhancing-kubernetes-security-detecting-threats-in-ovhcloud-managed-kubernetes-cluster-mks-audit-logs-with-falco%2F&amp;action_name=Enhancing%20Kubernetes%20Security%3A%20Detecting%20Threats%20in%20OVHcloud%20Managed%20Kubernetes%20cluster%20%28MKS%29%20Audit%20Logs%20with%20Falco&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="484" src="https://blog.ovhcloud.com/wp-content/uploads/2025/02/falco-blogpost-plugin-mks-1-1024x484.jpg" alt="" class="wp-image-28194" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/02/falco-blogpost-plugin-mks-1-1024x484.jpg 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/falco-blogpost-plugin-mks-1-300x142.jpg 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/falco-blogpost-plugin-mks-1-768x363.jpg 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/falco-blogpost-plugin-mks-1-1536x725.jpg 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/falco-blogpost-plugin-mks-1.jpg 1749w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Several month ago we discovered <a href="https://falco.org/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Falco</a>, a Cloud Native near real-time threats detection tool, and we saw <a href="https://blog.ovhcloud.com/near-real-time-threats-detection-with-falco-on-ovhcloud-managed-kubernetes/" data-wpel-link="internal">how to install it on an OVHcloud MKS cluster</a>.</p>



<p>Today we will connect our Falco instance to a MKS cluster in order to retrieve <strong>Kubernetes Audit Logs</strong> events and watch if everything is OK in our cluster.</p>



<p>Concretely, in this blog post we will:</p>



<ul class="wp-block-list">
<li>deploy an OVHcloud LDP (Logs Data Platform)</li>



<li>create a data stream into this LDP</li>



<li>connect an OVHcloud MKS cluster to the data stream (to send Audit Logs into it)</li>



<li>use the <strong>k8saudit-ovh</strong> Falco plugin to retrieve in realtime the Audit Logs of a MKS cluster</li>



<li>test a rule and detect security events based on MKS audit logs activity</li>
</ul>



<h2 class="wp-block-heading">Prerequisites</h2>



<p>This blog post presupposes that you already have a working&nbsp;<a href="https://www.ovhcloud.com/fr/public-cloud/kubernetes/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">OVHcloud Managed Kubernetes</a>&nbsp;(MKS) cluster, and a running instance of Falco.</p>



<p>If it is not the case, follow the <a href="https://blog.ovhcloud.com/near-real-time-threats-detection-with-falco-on-ovhcloud-managed-kubernetes/" data-wpel-link="internal">Near real-time threats detection with Falco on OVHcloud Managed Kubernetes</a> blog post.</p>



<h2 class="wp-block-heading">Deploying a Logs Data Platform (LDP)</h2>



<p>LDP is the managed platform for collecting, processing, analyzing and storing your logs of the OVHcloud products. To be able to access to our Kubernetes clusters Audit Logs we need to deploy a LDP.</p>



<p>Find more information on our&nbsp;dedicated<a href="https://www.ovhcloud.com/en/identity-security-operations/logs-data-platform/" target="_blank" rel="noreferrer noopener nofollow external" data-wpel-link="external">&nbsp;LDP page</a>.</p>



<p>We can deploy a LDP through the OVHcloud Control Panel and the API. In this blog post, we will deploy it through the Control Panel.</p>



<p>First, you have to log in to the&nbsp;<a href="https://www.ovh.com/manager/#/dedicated/dbaas/logs/order" target="_blank" rel="noreferrer noopener" data-wpel-link="exclude">OVHcloud Control Panel</a>, click on the <strong>Bare Metal Cloud</strong> section located at the top in the header and then click on the <strong>Logs Data Platform</strong> in the sidebar.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="529" src="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-1-1024x529.png" alt="" class="wp-image-27901" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-1-1024x529.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-1-300x155.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-1-768x396.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-1-1536x793.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-1-2048x1057.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Choose the LDP plan you want: <em>Standard</em> (free) or <em>Enterprise</em> one, depending on your needs.</p>



<p>Select a <strong>region</strong> (<em>North America</em> or <em>Europe</em>). We will choose &#8220;<strong>GRA</strong>&#8221; for this blog post, click on <strong>Order</strong> button and follow the instructions.</p>



<p>After several minutes your LDP will be created. </p>



<p>Refresh the page, click on the new deployed LDP, then enter a password and click on the <strong>Save</strong> button.</p>



<h2 class="wp-block-heading">Creating a Data stream and retrieving the Websocket URL</h2>



<p>Our Kubernetes Audit Logs will be stored in a data stream so click on the <strong>Data stream</strong> tab and then click on the <strong>Add data stream</strong> button.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="466" src="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-3-1024x466.png" alt="" class="wp-image-27905" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-3-1024x466.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-3-300x137.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-3-768x350.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-3-1536x700.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-3-2048x933.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Choose a name of the data stream. On my side I like to call it with the name of my MKS cluster following by &#8220;-audit-logs&#8221; to know easily what it is this data stream for. My MKS cluster&#8217;s name is &#8220;my-rancher-mks-cluster&#8221; so let&#8217;s name it &#8220;my-rancher-mks-cluster-audit-logs&#8221;. Fill the description (mandatory).</p>



<p>The OVHcloud Audit Logs Falco plugin you will use receive the audit logs through Websocket so you need to enable <strong>Websocket broadcasting</strong> then click on the <strong>Save</strong> button.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="730" src="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-5-1024x730.png" alt="" class="wp-image-27909" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-5-1024x730.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-5-300x214.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-5-768x548.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-5-1536x1095.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-5-2048x1460.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Now, to retrieve the Websocket URL of your data stream, click on the<strong> Data stream</strong> tab, then click on the<strong> &#8230;</strong> button (located at the right in the line of your data stream), and click on <strong>Monitor in real time</strong> action.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="674" src="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-6-1024x674.png" alt="" class="wp-image-27913" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-6-1024x674.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-6-300x197.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-6-768x505.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-6-1536x1011.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-6-2048x1347.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Finally, click on the <strong>Action</strong> button and in the <strong>Copy Websocket address</strong>, then save the LDP Websocket URL somewhere ;-).</p>



<p>Note that the Websocket address have this kind of format: <code>w<em>ss://&lt;region&gt;.logs.ovh.com/tail/?tk=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxx</em></code></p>



<h2 class="wp-block-heading">Connect a MKS cluster to a LDP data stream</h2>



<p>Now we need to send the Kubernetes Audit Logs of our MKS cluster in the data stream. </p>



<p>For that, in the OVHcloud Control Panel, click on the <strong>Public Cloud</strong> section in the header and then in <strong>Managed Kubernetes Service</strong> in the sidebar.</p>



<p>Click on your Kubernetes cluster (my-rancher-mks-cluster for example), then in the <strong>Logs</strong> tab and click on the <strong>Subscribe</strong> button.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="500" src="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-7-1024x500.png" alt="" class="wp-image-27917" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-7-1024x500.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-7-300x146.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-7-768x375.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-7-1536x750.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-7.png 2040w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Click on the <strong>Add data stream</strong> button to visualize in real time the Audit Logs of your cluster. Then select the LDP instance and click on the <strong>Subscribe</strong> button for the data stream your created:</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="544" src="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-8-1024x544.png" alt="" class="wp-image-27918" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-8-1024x544.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-8-300x159.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-8-768x408.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-8-1536x815.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/01/image-8.png 2046w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading">Retrieve the MKS Audit Logs with Falco</h2>



<p>Falco can receive <strong>Events</strong>, compare them to a set of <strong>Rules</strong> to determine the actions to perform and generate <strong>Alerts</strong> to different endpoints. </p>



<p>Thanks to the <strong>k8saudit-ovh</strong> plugin, Falco can receive a new sort of <strong>Events</strong>: the Audit Logs of your MKS cluster. These events have also some <a href="https://github.com/falcosecurity/plugins/blob/main/plugins/k8saudit/rules/k8s_audit_rules.yaml" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">rules to follow</a>.</p>



<p>Concretely, when an user will execute some <strong>kubectl</strong> commands in an OVHcloud MKS cluster, Audit Logs will be generated. Falco is listening from them and depending on the configured rules, it will generate some alerts.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="961" height="327" src="https://blog.ovhcloud.com/wp-content/uploads/2025/02/image.png" alt="" class="wp-image-28190" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/02/image.png 961w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/image-300x102.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/02/image-768x261.png 768w" sizes="auto, (max-width: 961px) 100vw, 961px" /></figure>



<p>Let&#8217;s install or update a Falco configuration running in a MKS cluster and use this plugin.</p>



<p>Create a <strong>values.yaml</strong> file with the following content:</p>



<pre class="wp-block-code"><code class="">tty: true<br>kubernetes: false<br><br># Just a Deployment with 1 replica (instead of a Daemonset) to have only one Pod that pulls the MKS Audit Logs from a OVHcloud LDP<br>controller:<br>  kind: deployment<br>  deployment:<br>    replicas: 1<br><br>falco:<br>  rule_matching: all<br>  rules_files:<br>    - /etc/falco/k8s_audit_rules.yaml<br>    - /etc/falco/rules.d<br>  plugins:<br>    - name: k8saudit-ovh<br>      library_path: libk8saudit-ovh.so<br>      open_params: "&lt;region&gt;.logs.ovh.com/tail/?tk=&lt;ID&gt;" # Replace with your LDP Websocket URL<br>    - name: json<br>      library_path: libjson.so<br>      init_config: ""<br>  # Plugins that Falco will load. Note: the same plugins are installed by the falcoctl-artifact-install init container.<br>  load_plugins: [k8saudit-ovh, json]<br><br>driver:<br>  enabled: false<br>collectors:<br>  enabled: false<br><br># use falcoctl to install automatically the plugin and the rules<br>falcoctl:<br>  artifact:<br>    install:<br>      enabled: true<br>    follow:<br>      enabled: true<br>  config:<br>    indexes:<br>    - name: falcosecurity<br>      url: https://falcosecurity.github.io/falcoctl/index.yaml<br>    artifact:<br>      allowedTypes:<br>        - plugin<br>        - rulesfile<br>      install:<br>        resolveDeps: false<br>        refs: [k8saudit-rules:0, k8saudit-ovh:0.1, json:0]<br>      follow:<br>        refs: [k8saudit-rules:0]</code></pre>



<p>This <strong>values.yaml </strong>file will install Falco with the <strong>k8saudit-ovh</strong> and the <strong>json</strong> plugins. </p>



<p>Install the latest version of Falco with&nbsp;<code>helm install</code>&nbsp;command:</p>



<pre class="wp-block-code"><code class="">$ helm install falco --create-namespace --namespace falco --values=values.yaml falcosecurity/falco</code></pre>



<p>This command will install the latest version of Falco, with the k8saudit-ovh and json plugins, and create a new&nbsp;<code>falco</code>&nbsp;namespace:</p>



<pre class="wp-block-code"><code class="">$ helm install falco --create-namespace --namespace falco --values=values.yaml falcosecurity/falco

NAME: falco
LAST DEPLOYED: Mon Feb 10 10:15:20 2025
NAMESPACE: falco
STATUS: deployed
REVISION: 1
NOTES:
No further action should be required.</code></pre>



<p>Or if you already have Falco deployed in a Kubernetes cluster, you can use the <code>helm update</code> command instead:</p>



<pre class="wp-block-code"><code class="">$ helm upgrade falco --create-namespace --namespace falco --values=values.yaml falcosecurity/falco</code></pre>



<p>You can check if the Falco pods are correctly running:</p>



<pre class="wp-block-code"><code class="">$ kubectl get pods -n falco

NAME                                      READY   STATUS    RESTARTS   AGE
falco-6b8bc77d8b-v24jr                    2/2     Running   0          96s
falco-falcosidekick-67877d6946-4hmbn      1/1     Running   0          96s
falco-falcosidekick-67877d6946-tpjk6      1/1     Running   0          96s
falco-falcosidekick-ui-78b96fd57d-4wb6q   1/1     Running   0          96s
falco-falcosidekick-ui-78b96fd57d-v7rnm   1/1     Running   0          96s
falco-falcosidekick-ui-redis-0            1/1     Running   0          96s</code></pre>



<p>Wait and execute the command again if the pods are in “Init” or “ContainerCreating” state.</p>



<p>Once the Falco pod is ready, run the following command to see the logs:</p>



<pre class="wp-block-code"><code class="">kubectl logs -l app.kubernetes.io/name=falco -n falco -c falco</code></pre>



<p>You should see logs like that:</p>



<pre class="wp-block-code"><code class="">$ kubectl logs -l app.kubernetes.io/name=falco -n falco -c falco

Mon Feb 10 09:15:35 2025:    /etc/falco/k8s_audit_rules.yaml | schema validation: ok
Mon Feb 10 09:15:35 2025: Hostname value has been overridden via environment variable to: my-pool-1-node-921b61
Mon Feb 10 09:15:35 2025: The chosen syscall buffer dimension is: 8388608 bytes (8 MBs)
Mon Feb 10 09:15:35 2025: Starting health webserver with threadiness 2, listening on 0.0.0.0:8765
Mon Feb 10 09:15:35 2025: Loaded event sources: syscall, k8s_audit
Mon Feb 10 09:15:35 2025: Enabled event sources: k8s_audit
Mon Feb 10 09:15:35 2025: Opening 'k8s_audit' source with plugin 'k8saudit-ovh'
{"hostname":"my-pool-1-node-921b61","output":"09:15:40.698757000: Warning K8s Operation performed by user not in allowed list of users (user=csi-cinder-controller target=csi-6afb06dce281b86b7bab718b5d966dc261b2b1554941ae449519a128cb2e3fb3/volumeattachments verb=patch uri=/apis/storage.k8s.io/v1/volumeattachments/csi-6afb06dce281b86b7bab718b5d966dc261b2b1554941ae449519a128cb2e3fb3/status resp=200)","output_fields":{"evt.time":1739178940698757000,"ka.response.code":"200","ka.target.name":"csi-6afb06dce281b86b7bab718b5d966dc261b2b1554941ae449519a128cb2e3fb3","ka.target.resource":"volumeattachments","ka.uri":"/apis/storage.k8s.io/v1/volumeattachments/csi-6afb06dce281b86b7bab718b5d966dc261b2b1554941ae449519a128cb2e3fb3/status","ka.user.name":"csi-cinder-controller","ka.verb":"patch"},"priority":"Warning","rule":"Disallowed K8s User","source":"k8s_audit","tags":["k8s"],"time":"2025-02-10T09:15:40.698757000Z"}
{"hostname":"my-pool-1-node-921b61","output":"09:15:57.508657000: Warning K8s Operation performed by user not in allowed list of users (user=yacht target=my-pool-1.18051c0a88716868/events verb=patch uri=/api/v1/namespaces/default/events/my-pool-1.18051c0a88716868 resp=403)","output_fields":{"evt.time":1739178957508657000,"ka.response.code":"403","ka.target.name":"my-pool-1.18051c0a88716868","ka.target.resource":"events","ka.uri":"/api/v1/namespaces/default/events/my-pool-1.18051c0a88716868","ka.user.name":"yacht","ka.verb":"patch"},"priority":"Warning","rule":"Disallowed K8s User","source":"k8s_audit","tags":["k8s"],"time":"2025-02-10T09:15:57.508657000Z"}
{"hostname":"my-pool-1-node-921b61","output":"09:15:57.807013000: Warning K8s Operation performed by user not in allowed list of users (user=yacht target=my-pool-1/nodepools verb=update uri=/apis/kube.cloud.ovh.com/v1alpha1/nodepools/my-pool-1/status resp=200)","output_fields":{"evt.time":1739178957807013000,"ka.response.code":"200","ka.target.name":"my-pool-1","ka.target.resource":"nodepools","ka.uri":"/apis/kube.cloud.ovh.com/v1alpha1/nodepools/my-pool-1/status","ka.user.name":"yacht","ka.verb":"update"},"priority":"Warning","rule":"Disallowed K8s User","source":"k8s_audit","tags":["k8s"],"time":"2025-02-10T09:15:57.807013000Z"}</code></pre>



<p>The logs confirm that Falco <strong>k8saudit-ovh</strong> plugin and the <strong>k8saudit</strong> rules have been loaded correctly 💪.</p>



<h2 class="wp-block-heading"> Testing Falco</h2>



<p>In order to test Falco we need to know which rules are installed by default. In our case, as we defined it in the values.yaml file, the <strong>k8saudit-ovh</strong> plugin follow the <a href="https://github.com/falcosecurity/plugins/blob/main/plugins/k8saudit/rules/k8s_audit_rules.yaml" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">k8s_audit_rules.yaml</a> file. You can take a look at them in order to know them.</p>



<p>In this blog post we will test one of well-known default k8s audit rules:</p>



<pre class="wp-block-code"><code class="">- rule: Attach/Exec Pod
  desc: &gt;
    Detect any attempt to attach/exec to a pod
  condition: kevt_started and pod_subresource and (kcreate or kget) and ka.target.subresource in (exec,attach) and not user_known_exec_pod_activities
  output: Attach/Exec to pod (user=%ka.user.name pod=%ka.target.name resource=%ka.target.resource ns=%ka.target.namespace action=%ka.target.subresource command=%ka.uri.param[command])
  priority: NOTICE
  source: k8s_audit
  tags: [k8s]</code></pre>



<p>This rule is interesting because an event will be generated if/when an user execute commands in a pod.</p>



<p>Let&#8217;s test the rule!</p>



<p>In a tab of your terminal, watch the coming logs:</p>



<pre class="wp-block-code"><code class="">$ kubectl logs -l app.kubernetes.io/name=falco -n falco -c falco -f</code></pre>



<p>In an another tab of your terminal, create a Nginx pod and execute a command into it:</p>



<pre class="wp-block-code"><code class="">$ kubectl run nginx --image=nginx<br><br>$ kubectl exec -it nginx -- cat /etc/shadow</code></pre>



<p>Several seconds later, in the logs you should see this you will see this <strong>Attach/Exec to pod</strong> logs:</p>



<pre class="wp-block-code"><code class="">...
{"hostname":"my-pool-1-node-921b61","output":"09:29:46.302906000: Notice Attach/Exec to pod (user=kubernetes-admin pod=nginx-676b6c5bbc-4xc6t resource=pods ns=hello-app action=exec command=cat)","output_fields":{"evt.time":1739179786302906000,"ka.target.name":"nginx-676b6c5bbc-4xc6t","ka.target.namespace":"hello-app","ka.target.resource":"pods","ka.target.subresource":"exec","ka.uri.param[command]":"cat","ka.user.name":"kubernetes-admin"},"priority":"Notice","rule":"Attach/Exec Pod","source":"k8s_audit","tags":["k8s"],"time":"2025-02-10T09:29:46.302906000Z"}
...</code></pre>



<p>🎉</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Ensuring the security of Kubernetes clusters is important and in general we have a lot of information in the Audit Logs but we don&#8217;t use them so don&#8217;t hesitate to use this new plugin.</p>



<p>We installed the new k8saudit-ovh plugin in an OVHcloud MKS cluster but note that you can deploy it in a Kubernetes cluster in another Cloud provider and even in a Falco instance running locally 💪.</p>



<p>We visualized the logs/the events in the terminal but you can also visualize them in the <a href="https://github.com/falcosecurity/falcosidekick" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">sidekick</a> UI, create a custom rule and even use <a href="https://github.com/falcosecurity/falco-talon" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Talon</a> to execute some actions.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fenhancing-kubernetes-security-detecting-threats-in-ovhcloud-managed-kubernetes-cluster-mks-audit-logs-with-falco%2F&amp;action_name=Enhancing%20Kubernetes%20Security%3A%20Detecting%20Threats%20in%20OVHcloud%20Managed%20Kubernetes%20cluster%20%28MKS%29%20Audit%20Logs%20with%20Falco&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
