Product
SecuStack

The secure cloud solution

For digital sovereignty and transparency in the cloud
SecuStack is a highly secure and turnkey cloud solution that ensures the protection of business-critical applications, sensitive data and confidential information. SecuStack guarantees trustworthiness and digital sovereignty in the cloud. Cloud Security - Made in Germany.

Cloud solution for digital sovereignty and trustworthiness

Sharing infrastructure saves resources and also enables companies with little technical expertise and little effort to drive digitalisation forward. However, security, trustworthiness and transparency are essential to ensure that this does not lead to digital dependency. The SecuStack cloud solution enables companies to retain full control over their processed and stored data.

What is the cloud infrastructure solution SecuStack?

SecuStack is a cloud solution which, as an "Infrastructure as a Service" (IaaS), enables simple and at the same time secure provision of resources for the operation of cloud applications.

As our cloud infrastructure is an extension of OpenStack, it is fully compatible with it. Both the transfer, storage and processing of data and the networking of resources within an OpenStack environment are made consistently secure by means of transparently integrated cryptographic mechanisms. SecuStack thus makes it possible for numerous industries to enter cloud computing and is particularly interesting for companies that have not yet been able or do not want to use a cloud solution due to strict security regulations or a lack of trust.

VS-Cloud for Defense

SecuStack is the core component in the VS-Cloud solution from secunet, IBM & RedHat

SecuStack application areas

Whether utilities (CRITIS), public authorities and ministries, research institutions or industrial companies, SecuStack is suitable for use in various sectors...

The decision for a cloud model or a cloud service is an individual and demand-oriented decision that must be made depending on the industry and regulations. In all cloud models, scalable computing resources are pulled together in a network, bundled and shared. Classic cloud computing.

They allow the execution of workloads in the respective system and consist of a special combination of technologies, locations and ownership rights.

Standards & Regulations for Cloud Computing
SecuStack application areas

We have compiled a list of the requirements and regulations that apply to which industries, especially in the CRITIS environment. SecuStack enables security-compliant and trustworthy cloud computing for a wide range of industries.

Industrial companies
Standards
IEC62443, ISO27001, ISO 27018, ISO 27017, (BSI Standards, BSI-IT Baseline Protection) C5:2020, IDW PS 951, IDW PS880
Regulations
GDPR
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Production (MES - performance analysis, material management, detailed planning/control etc.; automation control system). Office IT, ERP
Automobiles
Standards
ISO27001, ISO 27018, ISO 27017, ISO/SAE 21434, ISO PAS 5112, (BSI Standards, BSI-IT Baseline protection), C5:2020, TISAX, IDW PS 951, IDW PS880
Regulations
GDPR, UNECE R155, UNECE R156, IT Security Act, BSI Act, BSI CritisV
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Connected Car. Production (MES - performance analysis, material management, detailed planning/control etc.; automation control system). Office IT, ERP
State and administration
Standards
BSI Standards, BSI-IT Baseline protection, C5:2020
Regulations
GDPR, VSA, BSI Act, BSI CritisV, specific state legislation
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Local authority application systems. Office IT
Media and culture
Standards
ISO 27001, ISO 27018, ISO 27017, BSI Standards, BSI-IT Baseline protection, C5:2020
Regulations
GDPR, BSI legislation, BSI CritisV
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Broadcasting systems of main news channels. Office IT
IT and TC
Standards
ISO27001, ISO 27018, ISO 27017, BSI Standards, BSI-IT Baseline protection, C5:2020, IDW PS 951, IDW PS880
Regulations
GDPR, IT Security Act, BSI Act, BSI CritisV, TKG, TMG
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Control centres, mobile radio operation, transmission systems, network nodes. Office IT
Finance and insurance
Standards
ISO27001, ISO 27018, ISO 27017, PCI-DSS, C5:2020, (BSI Standards, BSI-IT Baseline protection), IDW PS 951, IDW PS880
Regulations
GDPR, IT Security Act, BSI Act, BSI CritisV, banking legislation (Bafin), VAIT, BAIT, MA Risk, Basel3
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Investment banking. Retail banking and payment. Office IT
Transportation and traffic
Standards
ISO27001, ISO 27018, ISO 27017, BSI Standards, BSI-IT Baseline protection, C5:2020, IDW PS 951, IDW PS880
Regulations
GDPR, IT Security Act, BSI Act, BSI CritisV
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Guidance systems on motorways. Control systems of logistics companies. Office IT
Energy
Standards
IEC62443, ISO27001, ISO 27018, ISO 27017, ISO27019, (BSI Standards, BSI-IT Baseline protection), C5:2020, IDW PS 951, IDW PS880
Regulations
GDPR, IT Security Act, BSI Act, BSI CritisV, EnWG, IT Security Catalogue, GDEW
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Control systems and automation systems for grid and system management, grid status recording and evaluation, grid protection. Systems for feed-in management (forecasting), schedule management, load forecasting, procurement. Office IT
Nutrition
Standards
ISO27001, ISO 27018, ISO 27017, (BSI Standards, BSI-IT Baseline protection), C5:2020, IDW PS 951, IDW PS880
Regulations
GDPR, IT Security Act, BSI Act, BSI CritisV
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Production (MES - performance analysis, material management, detailed planning/control etc.; automation control system). Office IT, ERP
Water
Standards
ISO27001, ISO 27018, ISO 27017, BSI Standards, BSI-IT Baseline protection, C5:2020, IDW PS 951, IDW PS880, DVGW W 1060
Regulations
GDPR, IT Security Act, BSI Act, BSI CritisV
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Control and automation systems. Systems for forecasting, operational planning, simulation/optimisation, asset mgmt, laboratory, diagnostics/analytics. Office IT
Health
Standards
ISO27001, ISO 27018, ISO 27017, DIN EN-80001, BSI Standards, BSI-IT Baseline protection, C5:2020, IDW PS 951, IDW PS880
Regulations
GDPR, SGB X, IT Security Act, BSI Act, BSI CritisV, Hospital Future Act, Patient Data Protection Act, MPG, MDR
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Hospital IT (operating theatre, emergency medicine). Hospital IT (radiology, ultrasound, endoscopy, laboratory, pharmacy, archive, reporting, etc.). Office IT, research etc.
School and education
Standards
ISO27001, BSI Standards, BSI-IT Baseline protection, C5:2020
Regulations
GDPR
Standards RZ
ISO/IEC 27001, EN 50600, TSI.Standard, DCSA eco
Typical Use Cases
Educational portals
Big Data, AI, ML
Standards
ISO27001
Regulations
GDPR
Standards RZ
ISO 27001
Typical Use Cases
Predictive Maintenance, Fraud detection, Robotic Process Automatisation, Datamining, OT, IOT

Use Cases

Thanks to the flexible structure of the overall solution, many areas of application are possible, including those that may only take off in the near future. SecuStack is flexible in the breadth of application areas and at the same time can be specifically aligned to concrete industry use cases - as the following examples from practice show:

Use Case #1
Use Case #1
Use Case #2
Use Case #2
Use Case #3
Use Case #3
Use Case #4
Use Case #4
Use Case #5
Use Case #5
Use Case #6
Use Case #6

All benefits of SecuStack at a glance

Solid infrastructures

With the provision of virtualized infrastructures, SecuStack enables the setup of cloud computing environments while taking over the complete lifecycle management.

Secure container orchestration

SecuStack helps control and automate isolated computing tasks - especially in large, dynamic environments.

Encryption Block Storage

SecuStack secures user data and access restrictions through block-storage encryption

Cryptographic control

Due to the cryptographic mechanisms used by SecuStack, control over all keys is always guaranteed

Downloads
You want to know more?
Brochure
SecuStack Broschure

Contact request
Do you still have questions about SecuStack?
Do you still have questions about SecuStack?

Send us an inquiry via the contact form. We are happy to help.

Site 1
captcha