JD Cloud takes the users as the core, integrating JD’s professional security team, provides users with all-around security protection measures to ensure the business security and stability of the users business, so that users can rest assured access cloud. JD's many years of security technology and experience serve in providing compliant, safe and stable cloud computing services to fully protect the security operation capabilities of the cloud platform. Through the construction of security ecology, users can easily experience JD Cloud Security capabilities. View Now
JD Cloud has been working to improve cloud security system, build security compliance capacity and constantly improve their own management and mechanism according to industry security best practices and various IT security standard designs. What is more, it has passed a series of standard verification, third-party security evaluation and audit, seek to better provide users with cloud computing services of compliance, security and stability.
Security and compliance are the common responsibilities of JD Cloud and users. JD Cloud is responsible for security of cloud platform itself, while user is responsible for business security of cloud platform.
|User||User Data||User Data Security||Identity Management and Resource Identity and Access Management|
|Client Data Encryption& Integrity Verification||Server-side Encryption (File System/Data)||Network Transmission Protection (Encryption/Completion/Identity Authentication)|
|Platform, Application Program, Identity and Access Management||User Platform and Application Security|
|Operating System, Network and Firewall Configuration|
|JD Cloud||Virtual Machines, Cloud Disk Service, Cloud Database, Cloud Storage, Cloud Security and Cloud Operating System||Cloud Platform and Application Security||Identity Management and Resource Identity and Access Management|
|JD Cloud Infrastructure||Infrastructure Security|
|Region (Region)||Zone (AZ)||Edge Site|
JD Cloud is responsible for the security control and management of infrastructure, physical device resources, cloud operating system and cloud service products, and constructs multi-dimensional stereoscopic security protection system of infrastructure, platform and application, identity management and resource IAM based on cloud products and security services of security, compliance, high availability, best practices and secure, and ensure its operation and maintenance security.
Cloud users construct cloud application systems based on the services provided by JD Cloud, and protect their own business systems by the cloud products and security service of JD Cloud Security and safety ecological third party safety products. Cloud users are responsible for customized configuration, self-deployment as well as operation and maintenance of the network, systems, applications, management, data, security and other services used on the cloud platform. Cloud users are responsible for the safe use of cloud platform to guarantee the business security design, data protection, verification encryption and other necessary security measures and functional implementation; managing account password and personnel authorization, developing application and operating business safely.
JD Cloud implements stricter IDC standards, server access standards and operation and maintenance standards and has realized the Region regional level, AZ Availability Zone level, and FD fault domain level disaster tolerance abilities, based on which the entire line of products further realized high available architecture and stable service quality in different dimensions.
JD Cloud contains multilevel security measures in the data center, and the operation and maintenance team strictly implements IAM, security measures, routine monitoring and audit, emergency response and other measures to ensure the physical and environmental security of JD Cloud Data Center.
JD Cloud provides mature network security architecture and multi-layer protection security scheme. It provides security isolation and strict IAM between production network and non-production network, business network and management network, virtual network and physical network.
JD Cloud is subject to the advanced industry standards for data security life cycle management, and adopts means in both management and technology aspects to conduct the construction of comprehensive data security system. In the aspects of identity verification, permission management, IAM, data encryption, data isolation, transmission security, storage security, data destruction and so on, the user's rights of privacy, ownership and control to the data are protected from infringement, and the user is provided with the most effective data protection.
The network between users will be subject to 100% isolation and the machine’s security risks will be monitored in real time to precisely defend hacker intrusions and ensure the data security of the user. The security group is provided to enhance the network defense capability and provide comprehensive protection for the machine.
CDN has implemented Referer Anti-Leech, URL authentication, IP blacklist, security protection and security audit in the aspects of IAM, security protocol and network attack protection. It provides users with low-cost, high-performance and extensible Internet content distribution services.
Virtual Private Cloud VPC is the expression of user network on JD Cloud. It contains a series of network and security functions and is isolated from other VPC logic. The primary protection of security group is realized in the instance level, the secondary protection of network ACL is achieved in the subnet level, and 100% security isolation of network is realized between VPCs so that the access control without dead space can be reached for the resources in the whole network.
Based on cross-region cloud storage backup, through identity authentication, ACL IAM and other authentication methods and white list Anti-Leech, HTTPS transmission encryption of data is carried out during transmission, and the security and reliability of user data storage are ensured by multiple protective measures.
Relational database has high availability, instance disaster tolerance, IAM and data encryption. It supports the Primary-secondary hot standby architecture by default, and provides complete solutions such as data backup, fault recovery and monitoring.
Anti-DDoS Basic protection capability: After the user successfully applies for EIP and the attack traffic exceeds the cleaning trigger value, the EIP will trigger the black hole status. Withstand mass-traffic attacks, such as SYN Flood and ICMP Flood.
Anti-DDoS Pro is an Anti-DDoS security value-added service launched based on JD Mall’s years of actual experience in attack protection. It aims to secure the user’s server in case the user suffers mass-traffic DDoS attacks.
The endpoint security risks can be perceived in real time by deploying lightweight Agent on the Virtual Mchines, so that the malicious attack behaviors can be effectively prevented. It provides machine defense and detection capabilities including important risk vulnerability detection, remote login reminder, Webshell detection and killing and brute force anti-crack, to ensure the security of public Virtual Machines.
It is the security decision capacity provided to the lessee, which based on the public cloud computing environment and with full authorization of the user and collects mass data of each security component, improves finding, identification, understanding, analysis, response and disposal to the security threat from the global view by big data association analysis and machine learning of technique, ultimately provides user with security decision-making capabilities.
It is the professional security protection service launched by JD Cloud. It can defense SQL injection, XSS cross-site script, common vulnerabilities of Web server and plug-in, Webshell upload and common attacks of OWASP, withstand malicious CC attacks, avoid leakage of website asset data, to ensure the safety and availability of the website.
It is a Web application security protection product based on JD Cloud high-performance load balancer cluster, which guarantees stable and sustainable running of business and improve users’ experience by providing WAF function, business security visualization, BOT behavior management and compliance inspection and other functions so as to solve exception or compliance problems of Web or APP businesses caused by attacks for network service providers.
It provides certificate upload, download, management and other functions, which may issue Symantec, GlobalSign and GeoTrust certificates; it offers perfect HTTPS solutions for websites and mobile applications.
Inheriting from more than ten years' experience of internet e-commerce security operation service, JD Cloud Security Operational Service, through multilevel, multi-dimensional and real-time monitoring and offline analysis, provides systematic security service for cloud tenants, solves all kinds of unexpected security incidents, to enhance the business system risk-resistant ability of cloud tenant and prevent the system from happening serious security events.
JD Cloud will enhance cloud computing security service capability throughout China by constructing cloud service security ecology and cloud service security big data shared platform. It conducts capacity sharing, resource sharing, profit sharing and ecological sharing and develops deep cooperation with security partners. It creates a brand new "Internet +" solutions, trains industry genes, and actively works with global security partners to create an open, collaborative, win-win cloud security ecosystem.
Provide customers with required cloud platform compliance evidence support to meet compliance requirements of the Ministry of Public Security of People’s Republic of China such as Cybersecurity Classified Protection, listing audit and regulatory review. If required, please contact us at any time.Apply Now
Scan, feedback the current page