All Products
Search
Document Center

Cloud Config:Best practices for generative AI compliance

Last Updated:Dec 19, 2025

This compliance package helps you detect and manage potential security, stability, and compliance risks in Alibaba Cloud Model Studio, Platform for AI (PAI), and their core dependencies. These dependencies include ACS, Container Registry (ACR), OSS, NAS, Key Management Service (KMS), Simple Log Service (SLS), and MaxCompute. This topic describes the default rules for generative AI compliance best practices.

Rule name

Rule description

Enable the prompt attack security guardrail for input content in Model Studio

Enabling the prompt attack security guardrail for input content in Model Studio is considered compliant.

Enable the security guardrail for input content in Model Studio

Enabling the security guardrail for input content in Model Studio and making at least one call within 7 days is considered compliant.

Enable the prompt attack security guardrail for output content in Model Studio

Enabling the prompt attack security guardrail for output content in Model Studio is considered compliant.

Enable the security guardrail for output content in Model Studio

Enabling the security guardrail for output content in Model Studio and making at least one call within 7 days is considered compliant.

Enable the malicious URL security guardrail for output content in Model Studio

Enabling the malicious URL security guardrail for output content in Model Studio is considered compliant.

Set alerts for Elastic Algorithm Service (EAS)

Setting at least one alert rule for Elastic Algorithm Service (EAS) in CloudMonitor is considered compliant.

Set alerts for Deep Learning Containers (DLC)

Setting at least one alert rule for Deep Learning Containers (DLC) in CloudMonitor is considered compliant.

Use Security Center for security protection

Using a Security Center edition higher than the Basic Edition or activating the pay-as-you-go edition is considered compliant.

ACK clusters do not have public endpoints configured

An ACK cluster is considered compliant if it does not have a public endpoint configured, or if the listener of the associated SLB has an access control list (ACL) enabled.

Install the CloudMonitor agent on running nodes of an ACK cluster

An ACK cluster is considered compliant if the CloudMonitor agent is installed on all running nodes and the monitoring status is Normal.

Install the internal container operation auditing component on ACK clusters to audit executed commands

Installing the internal container operation auditing component on an ACK cluster is considered compliant. This component helps you audit the commands that members of your organization or applications execute after they access a container.

Enable the API Server auditing feature for ACK clusters

Enabling the API Server auditing feature for an ACK cluster is considered compliant. This feature helps cluster administrators record or trace the daily operations of different users.

Use regional multi-zone ACK clusters

Using a regional ACK cluster with nodes distributed across three or more zones is considered compliant.

Enable the RRSA feature for ACK clusters

Enabling the RRSA feature for an ACK cluster is considered compliant. The RRSA feature provides pod-level OpenAPI permission isolation within the cluster. This allows for fine-grained isolation of cloud resource access permissions and reduces security risks.

Configure encryption at rest for Secrets in ACK clusters

Configuring encryption at rest for Secrets in an ACK cluster is considered compliant. This rule is not applicable to ACK basic clusters.

Enable and configure a container security policy for ACK clusters

Enabling and configuring a container security policy for an ACK cluster is considered compliant.

Enable log collection for control plane components in ACK clusters

Enabling log collection for control plane components in an ACK managed cluster is considered compliant. This rule is not applicable to non-managed clusters.

Container Registry instances do not have public network access enabled

A Container Registry instance is considered compliant if public network access is not enabled. This rule applies to Enterprise Edition instances.

Container Registry instances are associated with zone-redundant OSS buckets

A Container Registry instance associated with a zone-redundant OSS bucket is considered compliant.

Set image versions in Container Registry to immutable

Setting image versions in Container Registry to immutable is considered compliant.

Enable encryption for ECS data disks

An ECS data disk with encryption enabled is considered compliant.

Configure an automatic snapshot policy for ECS disks

An ECS disk with an automatic snapshot policy configured is considered compliant. This rule is not applicable to disks that are not in use, disks that do not support automatic snapshot policies, or disks mounted to ACK clusters for non-persistent use. After you enable an automatic snapshot policy, Alibaba Cloud automatically creates snapshots for the disk at specified points in time and intervals. This lets you quickly recover from security events such as virus intrusions or ransomware attacks.

Enable automatic rotation for master keys in Key Management Service

Enabling automatic rotation for a customer master key (CMK) in Key Management Service (KMS) is considered compliant. This rule is not applicable to service keys or keys that you import using Bring Your Own Key (BYOK).

Enable deletion protection for KMS master keys

Enabling deletion protection for a KMS master key is considered compliant. This rule does not apply to disabled keys or service keys, because service keys cannot be deleted.

Enable automatic rotation for credentials in Key Management Service

Enabling automatic rotation for credentials in Key Management Service is considered compliant. This rule is not applicable to generic secrets.

Use a zone-disaster recovery architecture for MaxCompute projects

Using a zone-disaster recovery architecture for a MaxCompute project is considered compliant.

Enable encryption for MaxCompute projects

Enabling encryption for a MaxCompute project is considered compliant. This rule is not applicable to frozen projects.

Enable an IP whitelist for MaxCompute projects

Enabling an IP whitelist for a MaxCompute project is considered compliant.

The permission group used by a NAS file system is not open to all sources

A NAS file system is considered compliant if its permission group does not allow access from all sources. This rule does not apply if the file system has no mount targets or if the associated permission group has no rules.

Create a backup plan for NAS file systems

Creating a backup plan for a NAS file system is considered compliant.

Enable a RAM policy for NAS file storage access points

Enabling a RAM policy for a NAS file storage access point is considered compliant.

NAS file system encryption

Configuring encryption for a NAS file system is considered compliant.

Do not grant public-read-write permissions to OSS buckets using ACLs

An OSS bucket is considered compliant if its access control list (ACL) does not grant public-read-write permissions. If an OSS bucket has public-read-write permissions, any visitor can write data to it, which exposes the bucket to the risk of malicious data injection.

Enable zone-redundant storage for OSS buckets

Enabling zone-redundant storage for an OSS bucket is considered compliant. If zone-redundant storage is not enabled, OSS cannot ensure availability and durability when a data center becomes unavailable, which can affect your data restoration objectives.

Enable server-side KMS encryption for OSS buckets

Enabling server-side KMS encryption for an OSS bucket is considered compliant.

Check the TLS version for OSS buckets

An OSS bucket is considered compliant if TLS is enabled and the TLS version used is one of the versions specified in the parameters. The default TLS versions are TLS 1.2 and TLS 1.3.

Enable cross-region replication for OSS buckets

Enabling cross-region replication for an OSS bucket is considered compliant. This rule depends on the detection results from Backup Disaster Recovery (BDRC). If BDRC is not activated or no detection results are available, this rule is not applicable.

Configure secure access in the permission policy of an OSS bucket

An OSS bucket is considered compliant if its permission policy specifies that read and write operations must use HTTPS, or that access over HTTP is denied. This rule is not applicable to OSS buckets with an empty permission policy.

Distribute PAI Elastic Algorithm Service instances across multiple zones

PAI Elastic Algorithm Service (EAS) instances are compliant when distributed across multiple zones.

Enable computing power health checks for PAI distributed training

Enabling computing power health checks for PAI Deep Learning Containers (DLC) is considered compliant. This rule is not applicable when no training tasks are running.

Enable AIMaster-based fault tolerance monitoring for PAI distributed training

Enabling AIMaster-based fault tolerance monitoring for PAI Deep Learning Containers (DLC) is considered compliant. This rule is not applicable when no training tasks are running.

Configure multiple zones for an endpoint service

Configuring multiple zones for an endpoint service is considered compliant.

Configure data encryption for a Simple Log Service Logstore

Configuring data encryption for a Simple Log Service Logstore is considered compliant.