Frequently Asked Questions (FAQ)
1. Infrastructure as a Service (IaaS)
1.1 What does Leonardo’s IaaS offer?
You can consult the list of services in the dedicated section Infrastructure as a Service (IaaS).
1.2 What is “Confidential Private IaaS”?
A highly secure environment that uses confidential computing to isolate and protect virtual machines.
You can consult the details here Confidental Private IaaS.
1.3 Does the IaaS support hybrid scenarios?
Yes, resources can be distributed across cloud and Edge Location nodes.
You can consult the details here Edge Location - Pool Small (Confidential).
2. Container as a Service (CaaS)
2.1 Which orchestration platform is used?
A fully managed Kubernetes environment.
You can consult the details here Kubernetes Confidential Computing.
2.2 Is confidential computing supported for containers?
Yes, workloads can run in isolated and secure environments.
3. Platform as a Service (PaaS)
3.1 Which database services are available?
You can consult the complete list here Database Services.
3.2 What does the Middleware PaaS include?
You can consult the complete list here Middleware Services.
3.3 Are ETL or Data Lake services available?
Yes, Data Lakes, ETL Pipelines, and governance tools are included.
You can consult the complete list here Big Data Services.
3.4 Which DevSecOps services are included? You can consult the complete list here DevSecOps Services
3.5 Which Big Data services are available? You can consult the complete list here Big Data Services.
3.6 Which AI services are available? You can consult the complete list here Artificial Intelligence Services.
3.7 Which Networking PaaS services are included? You can consult the complete list here Networking Services.
4. Artificial Intelligence services
4.1 Which AI services are available?
OCR, NLP, translation, speech-to-text, vector search, LLMs, workflow AI.
You can consult the complete list here Artificial Intelligence Services.
4.2 Can I integrate custom models?
Yes, depending on the specific service selected.
4.3 Are AI document-processing services available?
Yes — including OCR, text extraction, and semantic analysis.
You can consult the complete list here Artificial Intelligence Services.
5. Networking
5.1 Which network features are included?
IP, DNS, load balancers, CDN, advanced connectivity are some network services available.
You can consult the complete list here Networking Services.
5.2 Is centralized traffic management supported?
Yes, via load balancing and DNS services.
You can consult the detail here Networking Services.
5.3 Are hybrid and edge scenarios supported?
Yes, with integration across cloud, edge, and data centers.
6. Storage & Data Protection
6.1 What storage options are available?
Block storage, high-performance storage, archiving are some storage services available.
You can consult the complete list here Storage Services.
6.2 Is a native backup service available?
Yes, Data Protection provides managed backups.
6.3 Can backup integrate with IaaS and PaaS?
Yes, it is compatible with all service families.
7. Big Data
7.1 Which Big Data services are provided?
Data Lakes, ETL Pipelines, Data Governance, catalogs, analytics are some Big Data services available.
You can consult the complete list here Big Data Services.
7.2 Can external data be imported?
Yes, via ETL pipelines supporting multiple sources.
7.3 Is metadata management included?
Yes, through a built-in data catalog.
8. DevSecOps
8.1 What does the DevSecOps offering include?
CI/CD, automated testing, code analysis, configuration management are some DevSecOps services available.
You can consult the complete list here DevSecOps Services
8.2 Can configurations be centrally managed?
Yes, through Configuration Management services.
8.3 Are code quality and security scans available?
Yes, tools for scanning and verifying code are provided.
9. Collaboration Services
9.1 Which collaboration tools are included?
Cloud-based instant messaging and enterprise communication features.
You can consult the details here Instant Messaging Service.
10. Hybrid & Edge Services
10.1 What are Edge Services?
Edge nodes (“Edge Location – Pool Small”) offering localized cloud capabilities.
You can consult the details here Edge Location - Pool Small (Confidential) Service.
10.2 When are edge services useful?
Low-latency needs, distributed facilities, industrial sites, defense use cases.
You can consult the details here Edge Location - Pool Small (Confidential)
11. Service Management (SLA, Ticketing, Monitoring)
12.1 Where can I find the SLAs?
You can find it on the Service Level Agreement (SLA) section of the documentation.
12.2 How do I activate a new service?
By following instructions in the Service Provisioning section.
12.3 Is a test account available?
Yes — under Test Account Management with access here Test Account Management.
12.4 How can I open a support ticket?
Via the Ticket Management interface. You can consult the process here Service Management.
12. Data Center Description
12.1 Where are Leonardo’s Data Centers located?
In secure, redundant, protected facilities.
You can consult all details and specifications here Data Center Description.
12.2 Which security standards are applied?
Physical and logical protections, monitoring, redundancy, fire suppression, controlled access.
You can consult all security details here Data Center Description.
12.3 What availability level is ensured?
High availability through infrastructure redundancy.
You can consult all details here Data Center Description.
12.4 Are multiple geographic areas supported?
Yes, including Data Centers and Edge nodes.
You can consult all Data Center architecture and interconnectionhere Data Center Description.
12.5 What networking capabilities are included?
Advanced routing, segmentation, load balancing, perimeter security.
You can consult all details here Data Center Description.
13. Provisioning
13.1 How do I request service activation?
By following steps in the Service Provisioning section.
By following instructions in the Service Provisioning section.
13.2 Is manual approval required?
Yes, for selected services.
13.3 How long does provisioning take?
From minutes/hours (IaaS/CaaS) to longer deployments (AI, Big Data).
By following instructions in the Service Provisioning section.
13.4 Can provisioning be automated?
Yes, via APIs, pipelines, and scripts.
By following instructions in the Service Provisioning section.
13.5 Where can I check request status?
In the Service Management dashboard.
14. Certifications
14.1. What certifications does Leonardo have for its services? You can consult all the certifications in the dedicated section Certifications
14.2. What does the ISO/IEC 20000 certification mean for customers? This certification ensures that Leonardo’s IT Service Management processes follow strict international quality standards—providing higher reliability, structured support processes, and strong governance over delivered cloud services.
14.3. Does Leonardo hold certifications related to information security? Yes. Leonardo invests heavily in information security and aligns its practices with global standards. The Cyber & Security division continuously monitors systems and ensures compliance with internationally recognized frameworks.
14.4. Does Leonardo have its own CERT? Yes. Leonardo operates the LDO-CERT (Leonardo Cyber Defence), which functions as both a Security Operation Center (SOC) and a Cyber Emergency Readiness Team, offering threat monitoring, detection, and incident response services.
14.5. How does Leonardo ensure quality and regulatory compliance in Cyber & Security activities? Leonardo implements strict governance policies, risk assessments, continuous audits, and monitoring of critical security processes. Certifications and the presence of an internal CERT reinforce Leonardo’s ability to deliver proactive cybersecurity.
14.6 Is Leonardo compliant with national or international regulatory requirements? Yes. Through Leonardo’s certifications and robust security frameworks, the platform is aligned with key international standards and is designed for regulated sectors such as defense, public administration, and critical infrastructures.
15. Cyber Security specification
15.1 What security measures does Leonardo Cloud Everywhere offer? You can consult the complete list here Cyber Security specifications.
15.2 Does Leonardo supports a Zero Trust security model? Yes. Leonardo is strengthening its cyber portfolio toward a Zero Trust architecture, where access is continuously validated, regardless of the user’s position inside or outside the network.
15.3. How does Leonardo manage cybersecurity emergencies?
Leonardo’s LDO-CERT performs:
- Incident classification and response
- Digital forensics
- Threat analysis
- Operational readiness for critical cyber events
15.4. Does Leonardo provide Cyber Resilience services? Yes. Leonardo provides a comprehensive Cyber Resilience model that includes risk identification, assessment, response, and continuous monitoring to ensure service continuity even during cyberattacks.
15.5. Are the data stored on Leonardo protected and “sovereign”?
Yes:
- Data is encrypted, and encryption keys can be customer-managed.
- Geo-distributed storage enhances sovereignty and reduces single-point risk.
- Security policies include continuous reviews and alignment with global standards.
15.6 Does Leonardo collaborate with partners to enhance cloud security? Yes. The collaboration guarantees national data residency and compliance with rigorous European security standards.
15.7 What international security standards does Leonardo follow? Leonardo follows industry best practices and global standards (including ISO frameworks), adopting modern governance, risk management, and compliance methodologies suitable for the current cybersecurity landscape.