To build and maintain secure, compliant business systems in a cloud environment, focus on security protection in five core realms.
Solution overview
Basic security solutions: These solutions are recommended for all business scenarios. They meet the basic requirements for securing your cloud assets.
Enhanced security solutions: These solutions are recommended for enterprise-level services that are security-sensitive or have compliance requirements. They provide comprehensive security protection.
Security type | Security child class | Best practices | Basic security solution | Enhanced security solution |
Operating system security | Credential security | Recommended | Recommended | |
Network-based access control | Restrict access to O&M ports of instances by source IP address | Recommended | Recommended | |
Vulnerability management | Recommended | Recommended | ||
Vulnerability management | Recommended | Recommended | ||
Privileged access management | Recommended | |||
Credential security | Recommended | |||
Supply chain security | Recommended | |||
Monitoring and alerts | Recommended | |||
Data security | Data protection | Recommended | Recommended | |
Sensitive information | Recommended | Recommended | ||
Supply chain security | Prevent accidental disclosure of sensitive information from images and snapshots | Recommended | ||
Encryption | Recommended | |||
Encryption | Recommended | |||
Identity and access control | Credential security | Protect your Alibaba Cloud account to prevent credential leaks | Recommended | Recommended |
Privileged access management | Recommended | Recommended | ||
Network-based access control | Restrict the source IP addresses that can be used to call OpenAPI | Recommended | ||
Resource-level access control | Use resource groups to manage permissions by project or department | Recommended | ||
Resource-level access control | Enable fine-grained permission management for resources using tags | Recommended | ||
Compliance constraint configuration | Recommended | |||
Network security | Network-based access control | Recommended | Recommended | |
Network-based access control | Recommended | |||
Network-based access control | Use security groups for internal access control and micro-segmentation | Recommended | ||
Network-based access control | Recommended | |||
Network-based access control | Recommended | |||
Network-based access control | Recommended | |||
Traffic security | Use a DDoS traffic scrubbing service to defend against Internet attacks | Recommended | ||
Traffic security | Recommended | |||
Web traffic security | Recommended | |||
Security audit and O&M | Logs | Recommended | Recommended | |
Privileged access management | Recommended | |||
Logs | Recommended |