Cloud platform operation security solution

As the management and operation side of the cloud platform, it should not only ensure the stability and
reliability of the cloud services provided by the cloud platform, but also ensure the overall security and
controllability of the platform to avoid the outbreak of large-scale security incidents.

Scheme Background



The security of cloud computing has become the focus of cloud enterprises

The management and operation of the cloud platform should not only ensure the stability and reliability of the cloud services provided by the cloud platform, but also ensure the overall security and controllability of the platform to avoid the outbreak of large-scale security incidents, which may affect the use of tenants, or even be held accountable by the supervision.

Cloud platforms face the risk of violating laws and regulations

Platform operators need to discover and deal with various illegal behaviors of tenants on the platform in a timely manner to avoid large-scale security incidents.

Risks of uncontrolled applications on the cloud

Because cloud platforms are isolated from VPCS, common security tools cannot scan application assets in VPCS. Therefore, application publishing and application security in VPCS are in a blind spot.

Cloud platform APT attack risk

Due to the existence of advanced attack means such as social engineering attacks and high-complexity APT attacks, the cloud platform cannot determine whether there are lurking attackers in its physical IDC Intranet.

The risk of underlying vulnerabilities in the cloud platform

For open source cloud platforms, the underlying architecture and core components may be exposed to new vulnerabilities, once these basic problems, the entire platform will be at risk.

Security risks of cloud platform mirroring

Users create virtual machine instances based on the image to obtain a system environment consistent with the image. If the image itself has a security vulnerability, then all virtual instances created using the image are at risk.

The Solution



Cloud security management system

Provide cloud platform operators with perfect security system construction services, and cooperate with the self-developed cloud security protection system to escort the safe operation of the cloud platform.

Cloud platform tenant management

Through the security collection node isolated based on the virtualization layer, distributed deployment on all hosts, collect all the tenant traffic data of the cloud platform, and combine machine learning and big data analysis to timely grasp the overall security status of the tenant behavior of the cloud platform.

Cloud platform application combing monitoring

The asset security monitoring system is deployed on the cloud platform, and the asset security monitoring service is open to tenants. For VPC private network assets, a scan engine is automatically deployed in the scanned VPC and the scan results are collected to the server for unified management and monitoring.

Low-level vulnerability monitoring of open source cloud platform

The built-in security detection plug-in of open source components of the cloud platform can detect vulnerabilities of cloud infrastructure and core components of the cloud platform and discover security vulnerabilities in time.

Mirror security detection

The image security detection tool can detect whether the operating system and application software of the image have vulnerabilities or malicious codes.

APT Advanced threat detection

By deploying camouflage decoys on the core physical network of the cloud platform, the attackers can be tricked into attacking, and passive defense can be replaced with active induction, which can help detect internal latent threats.

Advantages of Scheme



Professional safety system construction services

Based on years of experience in cloud security operation, we provide professional suggestions for cloud platform operators on operation system construction, and combine the actual situation of the cloud platform to create practical and practical management norms and system processes.

Eliminate hidden compliance risks

General cloud platform construction pays more attention to the implementation of the hierarchical protection system, but ignores the impact of tenant behavior on the platform. Through machine learning and big data analysis, illegal behaviors of tenants can be accurately identified and timely controlled to avoid invisible compliance risks.

Cloud platform asset security monitoring

The integrated cloud platform API solves the problem that cloud platform application assets cannot be managed in a unified manner, helps operation personnel sort out all application assets on the platform, including internal VPC assets and public network assets, and monitors security vulnerabilities of all applications to prevent losses of tenant assets.

Protect against advanced APT threats

Based on a large amount of data, the system engine is trained to accurately identify attack sources, attack paths and attack methods. Based on patented technology, the system can trace the source of the perceived attack events, with man-machine identification, network identity identification, fingerprint persistent planting, attack IP identification, physical location identification and other functions.

Company Name: Shanghai Jingan Information Technology Co., LTD

Email:info@easmcn.com

Official Accounts

Mini Programs

2022@竞安科技所有

沪ICP备2022010711号

沪公网安备 31011202002916