All Products
Search
Document Center

Object Storage Service:Security and compliance overview

Last Updated:Mar 20, 2026

OSS protects your data with encryption, access control, content scanning, and automated threat isolation. It supports server-side encryption, client-based encryption, whitelists for hotlink protection, and fine-grained access control. It also holds compliance certifications to meet various compliance requirements.

FeatureDescription
Data encryptionSupports server-side encryption and client-based encryption. Set the TLS version to control HTTPS transmission security and limit exposure to SSL/TLS vulnerabilities.
Data consistency verificationVerifies data integrity during uploads, downloads, and storage using ETag and cyclic redundancy check (CRC). Detects and prevents data corruption or loss in transit and at rest.
Content moderationScans stored images for prohibited content, including pornography, political content, terrorism, and violence. Also detects malicious files such as web shells, ransomware, and trojans.
OSS sandboxAutomatically moves a bucket into a sandbox if it is attacked or used to share illegal content, preventing the issue from affecting other buckets.
OSS DDoS protectionDefends against DDoS attacks on your object storage by mitigating high-volume malicious attacks to maintain service availability and data security.
Compliance certificationsHolds compliance certifications including the Cohasset Associates audit, FINRA 4511, CFTC 1.31, ISO, BS10012, and CSA STAR.
SDK compliance guideHelps developers protect end-user personal information when integrating the OSS software development kit (SDK). Covers self-assessment and configuration guidance to meet regulatory requirements and avoid violations of end-user rights when using third-party SDKs.