The Security Assessment Service provides a comprehensive security assessment for cloud-based information systems. The service identifies and analyzes assets, threats, and vulnerabilities across your cloud infrastructure, security facilities, data, monitoring and auditing measures, and applications to ensure the overall security of your system. By performing comprehensive security assessments or vulnerability scans for hosts and web applications, the service provides solutions such as baseline hardening, vulnerability remediation, and component upgrades.
Service content
The following measures are taken to ensure business reliability and security during the security assessment:
Custom inspection plans: We work with you to develop detailed inspection plans based on your network system.
Risk prevention strategies: We determine effective risk prevention measures to reduce potential threats.
Emergency plans: We prepare emergency plans to ensure a prompt response to any unexpected incidents.
Authorization instructions: We clearly define the scope of authorization to ensure all operations are performed within the permitted range.
These measures not only prevent potential issues but also ensure a prompt and effective response to any unexpected incidents. This helps ensure that the entire assessment process runs smoothly.
Service category | Service content | Service method |
Network security assessment |
| Manual inspection and tool-based scan |
Host security assessment |
| Manual inspection and tool-based scan |
Application security assessment |
| Manual discovery and tool-based scan |
Service process
The security assessment includes the following phases:
Online assessment.
We comprehensively review the current security status of your business systems through asset surveys, security baseline scans, vulnerability scans, and personnel interviews.
The goal is to collect the necessary information and data for subsequent risk analysis.
Data analysis.
We analyze and organize the data collected during the online assessment phase in detail.
This step provides a solid foundation for writing the security assessment report.
Report writing.
We write a security assessment report based on the results of the data analysis.
The report includes detailed descriptions of the identified security risks and threats, along with remediation suggestions.
We communicate with business owners and revise the report based on their feedback to ensure all key points are accurately reflected.
Output results.
After all assessments and revisions are complete, Managed Security Service (MSS) provides the final, complete security assessment report.
The report provides your business with a specific action guide to enhance system security.
Download a security assessment report
Log on to the MSS console.
In the navigation pane on the left, choose .
On the Security Assessment page, find the target service report, and in the Actions column, click Download.