Trust Center

By taking users as the core and adopting JD's many years of security technology and experience, JD Cloud is providing compliant, safe and stable cloud computing services to fully protect the security capabilities of the cloud platform. Through the construction of security ecology, users can easily experience JD Cloud Security capabilities.

JD Cloud Security White Paper

JD Cloud takes the users as the core, integrating JD’s professional security team, provides users with all-around security protection measures to ensure the business security and stability of the users business, so that users can rest assured access cloud. JD's many years of security technology and experience serve in providing compliant, safe and stable cloud computing services to fully protect the security operation capabilities of the cloud platform. Through the construction of security ecology, users can easily experience JD Cloud Security capabilities. View Now

Compliance Qualification

JD Cloud has been working to improve cloud security system, build security compliance capacity and constantly improve their own management and mechanism according to industry security best practices and various IT security standard designs. What is more, it has passed a series of standard verification, third-party security evaluation and audit, seek to better provide users with cloud computing services of compliance, security and stability.

公安部信息安全等级保护

可信云服务认证

ISO27001信息安全管理体系国际认证

ISO9001质量管理体系认证

C STAR云计算安全评估认证

CSA STAR云安全认证

PCI-DSS支付卡行业数据安全标准认证

全国CDN经营许可证

云服务企业信用评级AAA级认证

云计算服务能力标准符合性证书
(公有云)

云计算服务能力标准符合性证书
(私有云)

计算机信息系统安全专用产品销售许可证

赛可达东方之星安全认证

云计算风险管理能力-先进级

政务云综合水平评估

可信政务云

高新技术企业认证

中关村高新技术企业认证

软件企业认证

软件产品登记认证

JD Cloud Security

Share Security Responsibility

Security and compliance are the common responsibilities of JD Cloud and users. JD Cloud is responsible for security of cloud platform itself, while user is responsible for business security of cloud platform.

User User Data User Data Security Identity Management and Resource Identity and Access Management
Client Data Encryption& Integrity Verification Server-side Encryption (File System/Data) Network Transmission Protection (Encryption/Completion/Identity Authentication)
Platform, Application Program, Identity and Access Management User Platform and Application Security
Operating System, Network and Firewall Configuration
JD Cloud Virtual Machines, Cloud Disk Service, Cloud Database, Cloud Storage, Cloud Security and Cloud Operating System Cloud Platform and Application Security Identity Management and Resource Identity and Access Management
Computation Storage Database Network
JD Cloud Infrastructure Infrastructure Security
Region (Region) Zone (AZ) Edge Site

JD Cloud is responsible for the security control and management of infrastructure, physical device resources, cloud operating system and cloud service products, and constructs multi-dimensional stereoscopic security protection system of infrastructure, platform and application, identity management and resource IAM based on cloud products and security services of security, compliance, high availability, best practices and secure, and ensure its operation and maintenance security.

Cloud users construct cloud application systems based on the services provided by JD Cloud, and protect their own business systems by the cloud products and security service of JD Cloud Security and safety ecological third party safety products. Cloud users are responsible for customized configuration, self-deployment as well as operation and maintenance of the network, systems, applications, management, data, security and other services used on the cloud platform. Cloud users are responsible for the safe use of cloud platform to guarantee the business security design, data protection, verification encryption and other necessary security measures and functional implementation; managing account password and personnel authorization, developing application and operating business safely.

Basic Architecture Security
Facility Security

JD Cloud implements stricter IDC standards, server access standards and operation and maintenance standards and has realized the Region regional level, AZ Availability Zone level, and FD fault domain level disaster tolerance abilities, based on which the entire line of products further realized high available architecture and stable service quality in different dimensions.

Physical and Environmental Security

JD Cloud contains multilevel security measures in the data center, and the operation and maintenance team strictly implements IAM, security measures, routine monitoring and audit, emergency response and other measures to ensure the physical and environmental security of JD Cloud Data Center.

Network Security

JD Cloud provides mature network security architecture and multi-layer protection security scheme. It provides security isolation and strict IAM between production network and non-production network, business network and management network, virtual network and physical network.

Data Security

JD Cloud is subject to the advanced industry standards for data security life cycle management, and adopts means in both management and technology aspects to conduct the construction of comprehensive data security system. In the aspects of identity verification, permission management, IAM, data encryption, data isolation, transmission security, storage security, data destruction and so on, the user's rights of privacy, ownership and control to the data are protected from infringement, and the user is provided with the most effective data protection.

Cloud Product Service Security
Virtual Machines Security

The network between users will be subject to 100% isolation and the machine’s security risks will be monitored in real time to precisely defend hacker intrusions and ensure the data security of the user. The security group is provided to enhance the network defense capability and provide comprehensive protection for the machine.

Content Distribution Network Security

CDN has implemented Referer Anti-Leech, URL authentication, IP blacklist, security protection and security audit in the aspects of IAM, security protocol and network attack protection. It provides users with low-cost, high-performance and extensible Internet content distribution services.

Virtual Private Cloud (VPC) Security

Virtual Private Cloud VPC is the expression of user network on JD Cloud. It contains a series of network and security functions and is isolated from other VPC logic. The primary protection of security group is realized in the instance level, the secondary protection of network ACL is achieved in the subnet level, and 100% security isolation of network is realized between VPCs so that the access control without dead space can be reached for the resources in the whole network.

Object Storage Service Security

Based on cross-region cloud storage backup, through identity authentication, ACL IAM and other authentication methods and white list Anti-Leech, HTTPS transmission encryption of data is carried out during transmission, and the security and reliability of user data storage are ensured by multiple protective measures.

Relational Database Security

Relational database has high availability, instance disaster tolerance, IAM and data encryption. It supports the Primary-secondary hot standby architecture by default, and provides complete solutions such as data backup, fault recovery and monitoring.

Cloud Security Product Service
Anti-DDoS Basic

Anti-DDoS Basic protection capability: After the user successfully applies for EIP and the attack traffic exceeds the cleaning trigger value, the EIP will trigger the black hole status. Withstand mass-traffic attacks, such as SYN Flood and ICMP Flood.

Anti-DDoS Pro

Anti-DDoS Pro is an Anti-DDoS security value-added service launched based on JD Mall’s years of actual experience in attack protection. It aims to secure the user’s server in case the user suffers mass-traffic DDoS attacks.

Endpoint Security

The endpoint security risks can be perceived in real time by deploying lightweight Agent on the Virtual Mchines, so that the malicious attack behaviors can be effectively prevented. It provides machine defense and detection capabilities including important risk vulnerability detection, remote login reminder, Webshell detection and killing and brute force anti-crack, to ensure the security of public Virtual Machines.

Cloud Situation Awareness

It is the security decision capacity provided to the lessee, which based on the public cloud computing environment and with full authorization of the user and collects mass data of each security component, improves finding, identification, understanding, analysis, response and disposal to the security threat from the global view by big data association analysis and machine learning of technique, ultimately provides user with security decision-making capabilities.

Web Application Firewall

It is the professional security protection service launched by JD Cloud. It can defense SQL injection, XSS cross-site script, common vulnerabilities of Web server and plug-in, Webshell upload and common attacks of OWASP, withstand malicious CC attacks, avoid leakage of website asset data, to ensure the safety and availability of the website.

Application Security Gateway

It is a Web application security protection product based on JD Cloud high-performance load balancer cluster, which guarantees stable and sustainable running of business and improve users’ experience by providing WAF function, business security visualization, BOT behavior management and compliance inspection and other functions so as to solve exception or compliance problems of Web or APP businesses caused by attacks for network service providers.

SSL Certificate

It provides certificate upload, download, management and other functions, which may issue Symantec, GlobalSign and GeoTrust certificates; it offers perfect HTTPS solutions for websites and mobile applications.

Cloud Security Operation Management

Inheriting from more than ten years' experience of internet e-commerce security operation service, JD Cloud Security Operational Service, through multilevel, multi-dimensional and real-time monitoring and offline analysis, provides systematic security service for cloud tenants, solves all kinds of unexpected security incidents, to enhance the business system risk-resistant ability of cloud tenant and prevent the system from happening serious security events.

JD Cloud Security Ecology

JD Cloud will enhance cloud computing security service capability throughout China by constructing cloud service security ecology and cloud service security big data shared platform. It conducts capacity sharing, resource sharing, profit sharing and ecological sharing and develops deep cooperation with security partners. It creates a brand new “Internet +" solutions, trains industry genes, and actively works with global security partners to create an open, collaborative, win-win cloud security ecosystem.