Security assessment
Security detection and inspection
Security hardening service
Security incident responses
Security escort for major events
Vulnerability management
Security service operations
Security effect analysis
The MSSP team comprehensively assesses the security status quo of your business and provides tailored diagnostic services based on your security requirements. The MSSP team also identifies gaps between the existing security conditions and industry-specific best security practices, and then develops efficient and practical security solutions to enhance cloud security.
Category | Service content | Method |
Network security assessment | Check whether policies for network access control are appropriate. Detect vulnerable ports. Analyze the detected security issues, provide you with fix solutions, and help you fix vulnerabilities.
| Manual inspection and tool-based scan |
Host security assessment | Detect security vulnerabilities in the operating systems of hosts and application software. Detect configuration risks in operating systems and application software. Analyze the detected security issues, provide you with fix solutions, and help you fix vulnerabilities.
| Manual inspection and tool-based scan |
Application security assessment | Detect security vulnerabilities in the business application code. Analyze the detected security issues, provide you with fix solutions, and help you fix vulnerabilities.
| Manual review and tool-based scan |
MSSP provides regular security monitoring and inspection services to help you analyze and manage security attacks on complex systems and application platforms in an efficient manner. MSSP helps you proactively address the challenges of daily security attacks, significantly reduce O&M workloads, and ensure the continuous and stable operation of your business based on real-time monitoring, event analysis, and professional solutions.
The following table describes the content of regular inspections.
Security aspect | Description |
Security service and policy | Enabling status, authorization status, configuration status, and specifications of security services and policies |
Network security layer | |
Operating system layer of Elastic Compute Service (ECS) instances | Vulnerable ports, such as ports 22, 3389, and 3306 Configuration risks, such as weak passwords and root user logons Brute-force attacks on the logon protocol and remote logons Vulnerabilities in middleware, such as Tomcat and JBoss Other server exception events
|
Application security layer | Business availability Webshell events Trojan, hidden links, and tampering of websites Web application security vulnerabilities
|
Data layer | |
MSSP provides security hardening guidance based on security assessment results, and provides professional configuration suggestions for operating systems and network devices based on detected issues, which effectively improves their security and anti-attack capabilities. MSSP ensures that the system maintains a high level of security by applying security configurations and performing regular assessment and maintenance.
Incident Response Service is provided based on years of practical experience and management capabilities in security attack and defense, and strictly conforms to relevant national standards for the response to and handling of information security incidents. If an information security incident occurs, professional responses to the incident is provided on 24/7 basis. The responses are conducted based on prevention, intelligence information collection, mitigation, elimination, and restoration procedures. This helps you efficiently respond to the incidents and restore your workloads.
To provide tailored cloud security management solutions, MSSP implements post-incident design and planning based on incident analysis. This reduces the occurrence of security incidents and their impacts on your business.
Security Escort Service provides professional services and technical support and helps formulate protection solutions for major events based on your business requirements. MSSP provides end-to-end security services that cover pre-event protection, in-event monitoring, and post-event analysis by using advanced security services and expert support. This ensures the security of your business during major events, such as national campaigns and enterprise promotions.
MSSP provides comprehensive management for vulnerabilities, including operating system vulnerabilities, application middleware vulnerabilities, and code vulnerabilities. Security experts can accurately detect vulnerabilities by combining manual analysis with tool-based scans. Security experts guide the entire process of vulnerability management, from detection to resolution, and help you effectively fix vulnerabilities to mitigate potential security risks.
For enterprises that do not have professional security personnel, MSSP provides comprehensive managed security services, including Alibaba Cloud Security products and third-party security products. MSSP can help you implement O&M and manage configurations based on security threats, create custom security policies, ensure efficient operation of security services, and build a solid security defense system in the cloud.
After security services are delivered, MSSP uses the Alibaba Cloud big data platform to build an in-depth analysis model. This model evaluates cloud-based business assets by identifying key systems, analyzing security threats, and comprehensively assessing risks. Based on the threat intelligence analysis, this model accurately detects unresolved business risks, prioritizes risks by severity, and provides a reference for security planning and construction, helping you build a robust business protection system.
The following items describe how to use a service.
Rapid response after purchase: After you purchase a security service of any specifications in the MSSP console, an MSSP expert contacts you within one business day by phone call, DingTalk group, or email.
Information collection and custom solution: Based on the content of the service that you purchase, the MSSP expert needs to analyze information about your business, such as the architecture, O&M status, and security requirements. Based on the collected information, the expert will formulate a security solution and confirm the solution with you.
Solution implementation and outcome delivery: The expert implements the solution that you confirm and delivers tailored results based on different versions to meet your business requirements.
Periodic inspection and effectiveness assurance: The expert performs periodic inspections on your business within the service scope, continuously verifies and optimizes security measures to maintain the effectiveness of security operations.
Regular reporting and troubleshooting: Security service reports are provided on a regular basis. The expert helps you analyze potential issues, formulate solutions, and promote the implementation of the solutions to ensure timely closure of all issues.
End-to-end security services and enhanced security management: The expert provides end-to-end security services that cover pre-event protection, in-event monitoring, and post-event analysis to achieve higher levels of security management and significantly reduce the occurrence of security incidents.