The infrastructure security of Elastic Desktop Service (EDS) Enterprise covers both application and system security. Additionally, EDS Enterprise can integrate with the Secure Access Service Edge (SASE) platform to offer complimentary basic security services (free), such as antivirus scanning for cloud computers, as well as premium features (paid) like integrated office security protection and audit capabilities.
01 Application security
1.1 Application sandbox mode
EDS Enterprise of Alibaba Cloud Workspace provides secure software distribution through the Apps page and the built-in Application Center. The Application Center comes preloaded with over 200 verified office applications, which administrators can enforce or allow end users to install independently. This eliminates risks like malware or pirated software from untrusted sources. Additionally, enterprises can upload their own applications.
Sandbox mode: Some applications in the Application Center run in a sandboxed environment. Instead of being fully installed on the cloud computer, they are dynamically mounted, enabling instant installation and removal, minimizing system impacts, and ensuring a clean and lightweight system.
|
02 System security
2.1 OTA update
EDS Enterprise enables secure and efficient system software updates via Over-The-Air (OTA). Before implementing an update, the system updater verifies the integrity and signature validity of the update package (whether downloaded OTA or copied offline) to prevent unauthorized modifications.
|
2.2 SASE integration
Integrating the SASE platform into Alibaba Cloud Workspace's cloud computer images boosts security and office behavior audit.
Integrated office security protection
Provides unified security management for enterprise mobile and branch offices. Key features include:
Zero trust private network access: This feature employs an Alibaba Cloud-developed HTTPS-based protocol to enable dynamic identity authentication. It enforces least-privilege access control for device-to-device communication over TCP and device-to-application communication over HTTP and HTTPS. Unlike traditional VPNs, private access offers faster connectivity, more efficient O&M, easier deployment, and stronger security.
Office network access: This feature enables secure 802.1x-based network access by using certificates. No manual username, password, or certificate import is required. Simply install the SASE client for automatic and secure connectivity. The SASE client enhances office network security and convenience while supporting account-password authentication for dumb terminals and whitelisted devices. This enables printers, IoT devices, and other equipment to securely access office networks, simplifying access control management.
Office data protection: This feature employs a cloud-based file analysis engine, ensuring efficient operation without consuming terminal resources. It audits and stores sensitive data transferred outbound from terminals, generating alerts for such transfers. Supported outbound methods include portable storage devices, instant messaging (IM) tools, emails, HTTP/FTP transfers, printing and burning, and cloud storage services. This feature also recognizes over 100 file types and includes 60+ built-in sensitive information dictionaries, enhancing office data security.
Integrated office behavior audit
Supports full-scene office behavior audits, making employee activities visible, trackable, and manageable. Key features include:
Real-time access logs: This feature monitors and displays access logs across multiple dimensions to track and manage employee activities in real time.
Internet access behavior audit: This feature enables real-time, multi-dimensional monitoring of employees' online activities, ensuring compliance with the Cybersecurity Law and other data protection regulations. It supports real-name auditing to enhance accountability and security.
Internal network access audit: This feature enables real-name tracking of employee internal network activities. All access logs are retained for six months to comply with internal audit requirements.
For more information about SASE, see What is SASE?
|
2.3 Component disk mechanism
EDS Enterprise employs an original component disk mechanism to physically isolate and protect its runtime components. This safeguards cloud computers from disruptions caused by misoperations, software conflicts, or malware. If issues arise, a simple restart restores normal operation.
|
