# HG changeset patch # User Alain Mazy # Date 1593774341 -7200 # Node ID d44d61bdcd09daaae732a94dc0c9f5c94cf89feb # Parent aef5c8b743819742ca75a6075b3a5f0433f68981 fix diff -r aef5c8b74381 -r d44d61bdcd09 Sphinx/source/plugins/object-storage.rst --- a/Sphinx/source/plugins/object-storage.rst Fri Jul 03 13:02:29 2020 +0200 +++ b/Sphinx/source/plugins/object-storage.rst Fri Jul 03 13:05:41 2020 +0200 @@ -165,8 +165,6 @@ However, note that, if you're running entirely in a cloud environment, your decryption keys will still be stored on the cloud infrastructure (VM disks - process RAM) and an attacker could still eventually gain access to this keys. -Furthermore, in the scope of the `Cloud Act `__ , the cloud provider might still have -the possibility to retrieve your data and encryption key (while it will still be more complex than with standard encryption at rest). If Orthanc is running in your infrastructure with the Index DB on your infrastructure, and files are store in the cloud, the master keys will remain on your infrastructure only and there's no way the data stored in the cloud could be decrypted outside your infrastructure.