您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[华为技术有限公司]:华为云安全白皮书 - 发现报告

华为云安全白皮书

2025-05-07华为技术有限公司七***
AI智能总结
查看更多
华为云安全白皮书

Issue3.7Date2025-5-7 Copyright © Huawei Technologies Co., Ltd. 2025. All rights reserved. No part of this document may be reproduced or transmitted in any form or by anymeans without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are theproperty of their respectiveholders. Notice The purchased products, services and features are stipulated by the contract made between Huawei andthe customer. All or part of the products, services and features described in this document may not be withinthe purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,information, and recommendations in this document are provided "AS IS" without warranties, guarantees orrepresentations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Cloud Computing Technologies Co., Ltd. Address:HUAWEI CLOUD Data Center, Jiaoxinggong Road,Qianzhong AvenueGui'an New District,Guizhou 550029Website:https://www.huaweicloud.com/intl/en-us/ 3.1Huawei Cloud's Security Responsibilities....................................................................................................93.2Tenants' Security Responsibilities.............................................................................................................10 4 Security Compliance and Privacy Protection.............................................................13 4.1Security Compliance and Standards Compliance.....................................................................................134.2Privacy Protection......................................................................................................................................15 5 Security Organization and Personnel.........................................................................17 5.1Security Organization................................................................................................................................175.2Security & Privacy Protection Personnel...................................................................................................185.3Internal Audit Personnel............................................................................................................................185.4Human Resource Management.................................................................................................................185.4.1Security Awareness Education...............................................................................................................195.4.2Security Competency.............................................................................................................................195.4.3Key Position Management......................................................................................................................205.5Security Violation Accountability................................................................................................................21 6Infrastructure Security.................................................................................................22 6.1Identity and Access Security......................................................................................................................226.1.1Identity Management..............................................................................................................................226.1.2Permissions Management......................................................................................................................236.2Physical and Environmental Security........................................................................................................236.2.1Physical Security....................................................................................................................................246.2.2Environmental Security...........................................................................................................................246.3Network Security........................................................................................................................................256.3.1Security Zone Planning and Isolation.....................................................................................................266.3.2Service Plane Planning and Isolation.....................................................................................................276.3.3Advanced Border Protection.....................................................................