All Products
Search
Document Center

Managed Security Service:Security Assessment Service

Last Updated:Dec 05, 2025

The Security Assessment Service provides a comprehensive security assessment for cloud-based information systems. The service identifies and analyzes assets, threats, and vulnerabilities across your cloud infrastructure, security facilities, data, monitoring and auditing measures, and applications to ensure the overall security of your system. By performing comprehensive security assessments or vulnerability scans for hosts and web applications, the service provides solutions such as baseline hardening, vulnerability remediation, and component upgrades.

Service content

The following measures are taken to ensure business reliability and security during the security assessment:

  • Custom inspection plans: We work with you to develop detailed inspection plans based on your network system.

  • Risk prevention strategies: We determine effective risk prevention measures to reduce potential threats.

  • Emergency plans: We prepare emergency plans to ensure a prompt response to any unexpected incidents.

  • Authorization instructions: We clearly define the scope of authorization to ensure all operations are performed within the permitted range.

These measures not only prevent potential issues but also ensure a prompt and effective response to any unexpected incidents. This helps ensure that the entire assessment process runs smoothly.

Service category

Service content

Service method

Network security assessment

  • Check the validity of network access control policies.

  • Detect vulnerable ports.

  • Analyze detected issues, create remediation plans, and guide you to fix vulnerabilities.

Manual inspection and tool-based scan

Host security assessment

  • Detect security vulnerabilities in host operating systems and application software.

  • Find weak configurations in operating systems and application software.

  • Analyze detected issues, create remediation plans, and guide you to fix vulnerabilities.

Manual inspection and tool-based scan

Application security assessment

  • Find security vulnerabilities in the business application code layer.

  • Analyze detected issues, create remediation plans, and guide you to fix vulnerabilities.

Manual discovery and tool-based scan

Service process

The security assessment includes the following phases:

  1. Online assessment.

    • We comprehensively review the current security status of your business systems through asset surveys, security baseline scans, vulnerability scans, and personnel interviews.

    • The goal is to collect the necessary information and data for subsequent risk analysis.

  2. Data analysis.

    • We analyze and organize the data collected during the online assessment phase in detail.

    • This step provides a solid foundation for writing the security assessment report.

  3. Report writing.

    • We write a security assessment report based on the results of the data analysis.

    • The report includes detailed descriptions of the identified security risks and threats, along with remediation suggestions.

    • We communicate with business owners and revise the report based on their feedback to ensure all key points are accurately reflected.

  4. Output results.

    • After all assessments and revisions are complete, Managed Security Service (MSS) provides the final, complete security assessment report.

    • The report provides your business with a specific action guide to enhance system security.

Download a security assessment report

  1. Log on to the MSS console.

  2. In the navigation pane on the left, choose Service Reports > Security Assessment.

  3. On the Security Assessment page, find the target service report, and in the Actions column, click Download.