HUAWEI CLOUD Security Services
HUAWEI CLOUD Security Services
Foreword
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Security Concerns of In-cloud Users
Enterprises' Security Concerns for Migrating to
CSA Top Threats
the Cloud
Data Confidentiality
• Data leaks
• Advanced persistent threats
• Lack of identity, credential, (APTs) Service Continuity Controllable O&M • Data theft
and access management prevention
• Data loss • Cyberattack • Security policy • Access control of
• Insecure interfaces and defense configuration unauthorized
• Insufficient due diligence
application programming • Anti-hacking • Risk identification employees
interfaces (APIs) • Abuse and malicious use of • Law compliance and • Access control of
cloud services quantification cloud service
• System vulnerabilities
• Denial of Service (DoS) • Operations providers
• Account hijacking auditable and
• Shared technical traceable
• Malicious insiders
vulnerabilities
4 Huawei Confidential
HUAWEI CLOUD - From "iceberg" to "inclusive security"
When evaluating the security level of a cloud, enterprises usually focus on cloud security services and security
features of cloud services. If cloud security is likened to "icebergs", they are visible parts of "icebergs". Security
capabilities under the "iceberg" are often unknown, but they bear the security of the entire public cloud.
HUAWEI CLOUD :
5 Huawei Confidential
Security Ecosystem
QUALYS gemalto ……
6 Huawei Confidential
HUAWEI CLOUD Security Service System
With data security as its core, HUAWEI CLOUD builds a series of security services to meet the particular needs.
Application Prevention of
and host Unauthorized Access
security Brute force Malicious
Data Security Host Security
attacks programs
Unauthorized
Webshell
access Data Encryption
SQL injection XSS Workshop
Host Security Service
Database Security
Service
Prevention of Unauthorized
Database View
security
Data Automatic
discovery
Dynamic
masking Application Security Network Security
Comprehensive
Precise audit
defense
Web Application Firewall Anti-DDoS
7 Huawei Confidential
HUAWEI CLOUD Security Service Family - Data Security
Security
Description Function Application Scenario
Name
Applicable to the public sector, Internet,
e-commerce, transportation,
manufacturing, medical care, and more
• Key and key pair management: KMS is a secure,
Data Encryption Workshop industries
reliable, and easy-to-use service designed to manage
(DEW) is a full-stack data • Decrypting small-size data
and protect your keys. KPS is a secure, reliable, and
encryption service. It covers • Encrypting large volumes of data
easy-to-use service designed to manage and protect
DEW Key Management Service • Encrypting data in
your key pairs.
(KMS), Key Pair Service OBS/EVS/IMS/SFS/RDS
• Dedicated HSM: It provides you with Dedicated HSM
(KPS), and Dedicated HSM. • Logging in to a Linux ECS
instances that are certified by China State
With DEW • Obtaining the password for logging
Cryptography Administration (SCA
in to a Windows ECS
• Encrypting your service system using
dedicated HSM
8 Huawei Confidential
HUAWEI CLOUD Security Service Family - Host Security
Service
Description Function Application Scenario
Name
9 Huawei Confidential
HUAWEI CLOUD Security Service Family - Application
Security
Service
Description Function Application Scenario
Name
10 Huawei Confidential
HUAWEI CLOUD Security Service Family - Network
Security
Service
Description Function Application Scenario
Name
11 Huawei Confidential
Purchase and Use of HUAWEI CLOUD Security Services
12 Huawei Confidential
Contents
13 Huawei Confidential
Data Encryption Workshop (DEW)
Dedicated HSM
HUAWEI CLOUD
on chip
Encrypti
e-Invoice e-Contract Verification Virtual
HSM
e-Policy EMR API
Verification
on chip
Encrypti
Personal privacy data system Encryption Virtual
API HSM
Public utilities system
Sensitive data
Video data system
on chip
Encrypti
Liquidation system Encryption Exclusive
Financial system HSM
API
Payment payment system
14 Huawei Confidential
Database Security Service (DBSS)
Database firewall Sensitive data discovery and Database audit
masking
Database
Database Database
Non-masking DBSS
Authorized query User 1
Normal users
users 19900808 Modification
RDS
RDS Masking RDS
query User 2
DBSS
User 3 deletion
modification
User 1 query
DBSS
operation
User 2
xxxxxxxx
Unauthorized User-installed
User-installed users databases User-installed
User 3 databases
Attackers databases on ECS
on ECS
on ECS Remote log storage
• Database intrusion prevention: Blocks SQL • Automatic sensitive data discovery: Automatically • Activity and exception monitoring:
injection attacks in real time. detects sensitive data based on compliance Manages activities at the column level,
• Fine-grained access control: Role-based requirements and generates masking rules with and monitors behavior, login, and access
and minimized permission. one click. exceptions.
• Learning mode: The security mode • Dynamic masking: Original data is not modified • Real-time alarm: Real-time alarm
generated from self-learning and can be and columns of sensitive data are anonymized. reporting on attacks such as SQL
applied to the firewall policy. • Multiple masking rules: Email masking and injection.
character string masking. • Audit report: Near-immediate availability
of compliance audit report.
15 Huawei Confidential
Host Security Service (HSS)
Vulnerability Security
Management Compliance
HSS
Agent
Baseline
Inspection
Intelligent
In-cloud/On-
Intrusion
premises
servers Detection
Intrusion
Detection
50000+ servers are running properly at the same time, reducing 90% attacks.
16 Huawei Confidential
Web Application Firewall (WAF)
Technology Innovation
• Three-engine architecture: semantic, regular, and AI engines
HUAWEI CLOUD improve the threat detection rate by over 30%.
WAF • Dynamic anti-crawler: Uses an industry-leading anti-crawler
Attack traffic
algorithm based on encryption technologies to effectively
Attacker
North China prevent data leakage.
East China
Legitimate traffic South China • CC attack protection: Precisely blocks CC attacks based on
Hong Kong
Route the traffic for
1 www.XX.com Protection engine the IP address, cookie field, and referer.
User to HUAWEI CLOUD WAF. cluster
Reliability
2 • Remote disaster recovery in China: Ensure that services are
Off-HUAWEI Back-to-source
CLOUD not interrupted.
17 Huawei Confidential
Vulnerability Scan Service (VSS)
Major Function
Description
Scanning for over 30 types of vulnerabilities,
including but not limited to OWASP Top 10, web
Vulnerability
Online assessment
injection, file inclusion, configuration error,
information disclosure, and backdoor
implantation vulnerabilities.
Detects threats to website services, including but
Detection to not limited to sensitive information, unsolicited
Intelligent scanning and service service threats advertisements, malicious codes, and malicious
Out-of-the-box
analysis links.
Easy-to-use
Real-time monitoring and dynamic
frequency adjustment Baseline In compliance with governmental security
compliance requirements, discovers non-compliant items and
check generates professional reports.
Custom scan settings Collaboration with other cloud Critical CVE Security experts analyze the latest critical
Multi-scenario applicability security services to build a three- vulnerability vulnerabilities and update rules to provide the
dimensional security system. scan fastest and most complete CVE vulnerability scan.
18 Huawei Confidential
Anti-DDoS
Anti-DDoS is a highly reliable and secure DDoS protection service with on-demand and scalable features,
thereby ensuring the stable running of resources such as ECS, ELB, and BMS on HUAWEI CLOUD.
19 Huawei Confidential
Advanced Anti-DDoS (AAD)
AAD is a value-added service to protect Internet servers (both HUAWEI CLOUD and
other hosts) against bandwidth-consuming DDoS attacks. It diverts attack traffic to
high-defense IP addresses for scrubbing, keeping your businesses stable and reliable.
High-defense
Connection to IP address High-defense 1. Change the DNS or service
AAD
data center IP address.
Users
Domain name access IP address access
www.example.com= Origin server IP address
Origin server IP address access from the client
2. Traffic is diverted to the
Traffic
retrieval
high-defense center.
www.example.com= High-defense IP address Origin server IP
High-defense CNAME access from the client address
20 Huawei Confidential
Quiz
1. Which of the following security services can be used to protect websites? (Multi-
choice)
A. WAF
B. VSS
C. SCM
D. Anti-DDoS
21 Huawei Confidential
Summary
22 Huawei Confidential
Recommendations
23 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
25 Huawei Confidential