Learn more about Cloud Security solution
Contact SalesDesign a Secure Cloud Environment for Your Business in Three Steps
Step 1: Assess Security Risks
Assess Security Risks
Security risk assessment is the foundation for building enterprise information systems. Systems without security assessment might contain vulnerabilities that could cause huge losses to your enterprise.
We provide these services:
-
Penetration Test
Simulates full-scale, in-depth attacks to test your system security and proactively identify risks in your business processes
-
Security Center
Detects ransomware, various viruses, and web tampering to protect cloud and on-premises servers, and performs compliance assessment to meet regulatory compliance requirements
-
Online Security Assessment
Provides security consulting service with asset surveys, security baseline scanning, vulnerability scanning, personnel interviews, etc., to evaluate the current status of business system security
Featured Products:
Step 2: Build Security Capabilities
Configure Basic Security Settings
Basic security settings are the first step when you start to build your basic security protection capabilities. You can leverage the default capabilities of security platforms to reduce network attacks and prevent permission abuse.
We provide these services:
-
Resource Access Management
Centrally manages identities and access to your resources using permission levels for your users, systems, and applications
-
ActionTrail
Tracks your Alibaba Cloud account actions and records them as events to perform analysis and compliance auditing
-
Snapshot
Allows you to create crash-consistent snapshots for all disk categories to back up or restore an entire disk for disaster recovery and data leakage tracing
Featured Products:
Configure Basic Security Protection
Proactive measures help your enterprise defend against attacks and enhance your proactive security defense capabilities.
We provide these services:
-
Security Center
Identifies, analyzes, and notifies you of security threats in real time using a unified security management system
-
Cloud Firewall
Centrally manages the policies that control the traffic from the Internet to your business with visualized information
Featured Products:
Enhance Security Protection
With your basic security protection in place, you can now enhance the overall security protection capabilities for your web applications and fulfill your enterprise's security compliance requirements.
We provide these services:
-
Certificate Management Service
Ensures secure data transmission and prevents the tampering, watching, and hijacking of your data
-
Web Application Firewall (WAF)
Provides a real-time defense to ensure the security and availability of your websites and applications
-
Bastionhost
Manages asset O&M permissions in a centralized manner, monitors all O&M operations, and audits your O&M operations in real time
-
Managed Security Service
Identifies vulnerabilities and improves security management of your online business systems with a fully managed security service
Step 3: Manage Business Risks
Manage Business Risks
Enterprises face challenges such as capital risk control, financial-grade identity verification, loan fraud prevention, marketing risk control, content security, and ticket scalping plug-ins, to name a few, and each one requires a set of corresponding prevention and control capabilities. Building security risk management capabilities for the upper level of your business guarantees the stability and availability of your systems against a large amount of complicated security threats.
We provide these services:
-
Anti-DDoS
Intelligently defends against sophisticated DDoS attacks, reduces business loss risks, and mitigates potential security threats
-
Fraud Detection
Identify frauds in core services, such as user registrations, operations, transactions, and credit audits, to reduce potential risks of loss
-
ID Verification
Provides a secure, flexible, and comprehensive digital identity security solution for customers
-
Content Moderation
Provides accurate monitoring of pictures, video, text and other multimedia content to reduce illegal or inappropriate content
-
Anti-Bot Service
Provides a comprehensive bot defense for websites, applications, and APIs to effectively reduce the risks from specific vulnerabilities
Featured Products:
Learn more about Cloud Security solution
Contact SalesLearn more about Cloud Security solution
Contact SalesPartners
Learn more about Cloud Security solution
Contact SalesSecurity and Compliance
-
CSA STAR
-
ISO 27001
-
SOC2 Type II Report
-
C5
-
MLPS 2.0
-
MTCS
Related Resources
Whitepaper
Data Security and Privacy Protection Whitepaper
This whitepaper is a complete guide covering Alibaba Cloud's systematic and comprehensive measures for data and privacy protection.
Whitepaper
Alibaba Cloud Security Whitepaper - International Edition V2.1
This whitepaper introduces the security of the Alibaba Cloud public cloud platform.
Whitepaper
The Eight Stages of Cloud-Based Data Security
This whitepaper explains how Alibaba Cloud can help you build a robust data security framework to safeguard your data assets.
Blog
Cloud Firewall Obtained IPS Certification from ICSA Labs
This short article highlights Alibaba Cloud Firewall's recent achievement from ICSA Labs.
Blog
How Can You Protect Your Business with Security Services from Alibaba Cloud?
This blog explains how our cloud-based security services can help your organization address increasingly sophisticated attacks and minimize risk.
Webinar
Protect your Business with Security Services from Alibaba Cloud
This webinar covers the key security solutions available that allow you to safely deploy your business on Alibaba Cloud.