OSS protects your data with encryption, access control, content scanning, and automated threat isolation. It supports server-side encryption, client-based encryption, whitelists for hotlink protection, and fine-grained access control. It also holds compliance certifications to meet various compliance requirements.
| Feature | Description |
|---|---|
| Data encryption | Supports server-side encryption and client-based encryption. Set the TLS version to control HTTPS transmission security and limit exposure to SSL/TLS vulnerabilities. |
| Data consistency verification | Verifies data integrity during uploads, downloads, and storage using ETag and cyclic redundancy check (CRC). Detects and prevents data corruption or loss in transit and at rest. |
| Content moderation | Scans stored images for prohibited content, including pornography, political content, terrorism, and violence. Also detects malicious files such as web shells, ransomware, and trojans. |
| OSS sandbox | Automatically moves a bucket into a sandbox if it is attacked or used to share illegal content, preventing the issue from affecting other buckets. |
| OSS DDoS protection | Defends against DDoS attacks on your object storage by mitigating high-volume malicious attacks to maintain service availability and data security. |
| Compliance certifications | Holds compliance certifications including the Cohasset Associates audit, FINRA 4511, CFTC 1.31, ISO, BS10012, and CSA STAR. |
| SDK compliance guide | Helps developers protect end-user personal information when integrating the OSS software development kit (SDK). Covers self-assessment and configuration guidance to meet regulatory requirements and avoid violations of end-user rights when using third-party SDKs. |