Security Index Service Video

Security Index Service (SIS) is a security assessment service for your cloud environment. It provides you with unified, clear, and multi-dimensional security views. With SIS, you can know promptly whether your cloud environment is properly configured, whether the security measures are sufficient, and whether the proactive and passive security situations are good enough. In addition, SIS provides convenient paths to other security services.

Comprehensive Check

SIS comprehensively checks cloud services of tenants.

Quick Guide

SIS provides best practices and quick links to the configuration pages.

Compliance Check

SIS checks environment compliance on the tenant cloud and assist tenants in self-assessment.

Application Scenarios

  • Configuration Security Check

Configuration Security Check

Configuration Security Check

SIS checks the security configuration of your cloud environment according to the best security practices and compliance requirements, lists the non-compliance items, and prompts you to carry on further analysis and rectification.

Advantages

  • Comprehensive Check

    SIS comprehensively checks cloud services of tenants.

  • Quick Guide

    SIS provides best practices and quick links to the configuration pages.

  • Compliance Check

    SIS checks environment compliance on the tenant cloud and assist tenants in self-assessment.

Functions

Security Index Service

SIS is a security assessment service for users' cloud environments. It provides unified, clear, and multi-dimensional security views.

  • Security Check

    Evaluates users' cloud environments from the aspects of identity authentication, access control, security audit, intrusion prevention, resource control, and backup and restoration, provide suggestions for modifying insecure configurations based on best practices, and provide links for quick recovery.

  • Compliance Report

    Checks users' cloud environments from three dimensions (network & communication security, equipment & computing security, and application & data security) according to the technical requirements of classified protection specifications, and provides compliance reports to assist users in classified protection evaluation.

Video Tutorials

How Do I Handle Security Events