The Leaseweb Trust Model

The compliance framework developed with EY places Leaseweb at the forefront of the industry and provides a solid foundation on which you can build on. By clearly outlining the areas that are covered and by transparently sharing that information, it removes a major headache for customers.

You can present our certification to your auditors to verify quickly and easily that the services provided by Leaseweb meet the very latest requirements.

How the Leaseweb Trust model works

The Leaseweb Trust model uses our portfolio of services, expectations from external and internal stakeholders, and risk assessment workshops as the foundation and starting point of our compliance approach. Based on these inputs we created one custom framework which is divided into building blocks and the different industry standards.

With this multi-audit approach, we use the “test-once test-many” principle. It enables three independent audit firms to work closely with us and makes the Leaseweb trust model location and Leaseweb company independent. But more importantly it provides a completely custom-tailored framework that aligns with our services, business needs and risk landscape, as well as with your expectations as a customer. Every building block is now covered and independently audited by at least one certification or assurance report.


Services Covered:

Corporate infrastructure, Bare Metal Services, Virtual Private Server,
Private Cloud, Hybrid Cloud, Co-location, Web Hosting, Domain Name



Customer Service

Service Deployment

Incident Management

Change Management

Logical Security

Physical Security

Operational Resilience

* Full documentation can be read on

The building blocks of the Leaseweb Trust Model

Normally, SOC1 is associated with financial controls but, given the type of our business we broadened the remit of our assurance reports to reflect our close connection with IT issues. This also enhances their relevance to our customers and their operations.


Objective areaObjective description
Logical securityControls provide reasonable assurance that logical security is appropriately implemented, administered and logged to safeguard against unauthorized access to or modifications of the customer portal that our clients are using to administer their infrastructure and administration.
Physical securityControls provide reasonable assurance that physical access to the data centers is restricted to authorized individuals to prevent unauthorized use, disclosure, modification, damage or loss of data.
Service deploymentControls provide reasonable assurance that services to clients are appropriately deployed and managed to ensure a timely and standardized delivery.
Customer supportControls provide reasonable assurance that the customer support teams timely and effectively act on client’s infrastructure problems to minimize service disruptions.
Incident managementControls provide reasonable assurance that incidents on the shared infrastructure are appropriately managed, resolved and analyzed to minimize disruption and impact of the services.
Change managementControls provide reasonable assurance that changes on the shared infrastructure are appropriately managed to minimize the disruption and impact of the services.
Operational resilienceOperations are appropriately managed to safeguard the data center facilities to avoid and minimize service disruptions. 



The International site provides access to our global portfolio of products.
For hosting exclusively in the United States, visit the US site.