Home > Storage > ObjectScale and ECS > Product Documentation > ECS General Best Practices > Introduction to ECS security
Besides assigning specific roles for certain access and control for users for security, additional measures must be taken to make ECS less vulnerable to unwarranted access, common user mistakes, or security data breach. ECS provides several features to enable security of customers’ data, such as encryption, platform lockdown, retention, and so on. The next sections describe available features and best practices for protecting ECS.