Security Compliance
Work together to build security on the cloud
Security on the cloud is a community of shared future. When enterprises begin to use cloud services, they actually transfer part of their security responsibilities to cloud manufacturers. As a cloud service provider, Alibaba Cloud is mainly responsible for the security compliance of the data center infrastructure and cloud platform, and is responsible for the security of the virtualization layer and cloud product layer running on the Apsara distributed cloud operating system according to the service mode. Customers are mainly responsible for their own data, applications and account security. Security on the cloud is a community of shared future. When enterprises begin to use cloud services, they actually transfer part of their security responsibilities to cloud manufacturers. As a cloud service provider, Alibaba Cloud is mainly responsible for the security compliance of the data center infrastructure and cloud platform, and is responsible for the security of the virtualization layer and cloud product layer running on the Apsara distributed cloud operating system according to the service mode. Customers are mainly responsible for their own data, applications and account security.
Cloud platform security compliance
Cloud platform security
From the physical layer data center and hardware layer chips, to the platform layer storage, network, and computing, and to the upper layer virtual execution environment, Alibaba Cloud is based on TPM vTPM、 The virtualization Enclave technology has built a fully isolated and highly trusted computing environment based on the DPCA security chip, and superimposed the software and hardware encryption computing capabilities to provide customers with a secure and reliable platform environment in a variety of scenarios, such as public cloud, hybrid cloud, and edge cloud. From the physical layer data center and hardware layer chips, to the platform layer storage, network, and computing, and to the upper layer virtual execution environment, Alibaba Cloud is based on TPM vTPM、 The virtualization Enclave technology has built a fully isolated and highly trusted computing environment based on the DPCA security chip, and superimposed the software and hardware encryption computing capabilities to provide customers with a secure and reliable platform environment in a variety of scenarios, such as public cloud, hybrid cloud, and edge cloud.
Default immune protection mechanism of cloud platform
On average, Alibaba Cloud's default immune mechanism for intrusion silently provides more than 6 million automated threat disposal for users deployed on Alibaba Public Cloud every year.
Cloud products have their own security attributes
522 core security capabilities are built into 50+cloud products. When you select Alibaba Cloud's computing, storage and network products, security functions are enabled with one click, without repeated deployment, and the separation of security and business is avoided.
Operation and maintenance security and supply chain security fully integrated into management
Alibaba Cloud's native security capabilities are fully extended to security operations and maintenance, security development, and supply chain security management, helping enterprises build more secure, controllable, advanced, and intelligent business systems.
Global compliance system
Authoritative recognition
The first L4+level in China
Cloud native security maturity assessment
The first batch passed the 2022 cloud native technology architecture maturity assessment of the Chinese Academy of Information and Communications
Gartner Certification
The highest score of global cloud manufacturer's security single item
Gartner AliCloud International IaaS and PaaS Solution Scorecard Report in 2021
Domestic cloud manufacturers
Grand Slam of overall safety ability
Gartner Cloud Native Security Capability Assessment Report, Forrester Global IaaS Platform Native Security Capability Report, IDC MarketScape China Cloud Service Provider Security Capability Vendor Evaluation (2020)
User Security Compliance Guide
Understanding cloud native security panorama
The security experience pavilion interprets the cloud's native security concept, helps you quickly understand the atomization and service-oriented security paradigm, and restores Alibaba Cloud's best security practice architecture from a panoramic perspective. The security experience pavilion interprets the cloud's native security concept, helps you quickly understand the atomization and service-oriented security paradigm, and restores Alibaba Cloud's best security practice architecture from a panoramic perspective.
Select appropriate security services
Cloud application traffic security
The traditional boundary has been broken in the cloud, and malicious traffic may exist in both internal and external networks. It is necessary to filter traffic at each node to control access.
Cloud load security
Virtual machines, containers Serverless and other services can be regarded as workloads in a unified way, facing various security problems and vulnerabilities, which require continuous threat detection and security scanning.
Cloud data security
Customers have the ownership of all their data on the cloud, and are also responsible for their security in the process of storage, use, sharing, updating, etc., including sensitive data identification, data transmission encryption, data access control, etc.
Identity and authority management
Identity management is the cornerstone of cloud security. Build a complete account system, apply the minimum authorization principle, multi factor authentication SSO and other capabilities are also an important part of building a zero trust architecture.
Landing Zone Enterprise Cloud Framework
Before you migrate your business to Alibaba Cloud, you may have concerns about how to ensure the security and compliance of your business on the cloud, while giving consideration to flexible business organization expansion. Based on a large number of customer practices, we found that reasonable planning before cloud deployment can avoid repeated restructuring of management methods and accelerate large-scale cloud deployment of businesses. Therefore, it is recommended that you first plan a complete enterprise cloud framework from the top level, also known as the Landing Zone, before going to the cloud.
Learn more
Architecture Excellence - Security Compliance Pillar
Identify internal and external security requirements and regulatory demands of the enterprise, plan and implement network security, identity security, host security, data security, etc. in a cloud environment in an all-round way, and continue to detect and respond quickly to threats.
Learn more