
Tencent Cloud is committed to working with customers to build a better and more comprehensive security system for cloud-based businesses and data, and has established a cloud security responsibility-sharing model based on different cloud service categories.
Tencent Cloud's responsibility: Responsible for the security of the underlying physical and infrastructure of the entire cloud computing environment, and ensuring the security and compliance of the cloud platform and the cloud products provided.
Customer's responsibility: Responsible for ensuring the security of self-built cloud applications and business data, including the correct development and use of cloud products (including security products), proper protection and authorization of cloud accounts, continuous monitoring and operation, and protecting business and data security.
Tencent Cloud's responsibility: Responsible for the security of the underlying physical and infrastructure of the entire cloud computing environment, and ensuring the security and compliance of the cloud platform and the cloud products provided.
Customer's responsibility: Responsible for ensuring the security of self-built cloud applications and business data, including the correct development and use of cloud products (including security products), proper protection and authorization of cloud accounts, and protecting business and data security.
Tencent Cloud's responsibility: Responsible for the security of the underlying physical and infrastructure of the entire cloud computing environment, and ensuring the security and compliance of the cloud platform and the cloud products provided.
Customer Responsibilities: Responsible for ensuring the security of self-built cloud applications and business data, including the correct development and use of cloud products (including security products), proper protection and authorization of cloud accounts, and safeguarding business and data security.
Compliance is the foundation of Tencent Cloud's development. Tencent Cloud identifies and adopts advanced international and industry security standards, adheres to the compliance requirements of different countries/regions and industries, continuously improves its internal management system, enhances its security control level, and strives to create cloud services that customers can trust. At the same time, Tencent Cloud actively participates in the formulation and promotion of industry security standards, adheres to the principle of compliance as a service, and builds and operates a secure and reliable cloud ecosystem.
To date, Tencent Cloud has obtained multiple security and privacy compliance certifications or qualifications through independent third-party audits or assessments, including: ISO 27001 Information Security Management System Certification, CSA STAR Cloud Security Certification (SOC 1/SOC 2/SOC 3 reports), and security certifications or audit reports for other regions and industries.
For more information on Tencent Cloud's security compliance, please see the Tencent Cloud Compliance page. For any related compliance certificates or reports, please apply for and download them through the Tencent Cloud Compliance Documentation Center.
Tencent Cloud has established a structured and systematic mature risk management system, combining the international standard ISO/IEC 27005 Information Security Risk Management Guidelines with its own business practices.
Starting with information assets, Tencent Cloud comprehensively identifies and analyzes potential risk scenarios and uses a risk quantification assessment model to classify and manage risks. Tencent Cloud has set clear risk acceptance benchmarks, requiring action to be taken for any risk at a medium or higher level, ensuring that risks are reduced to an acceptable range and build a solid security defense line for Tencent Cloud.
This dynamic monitoring and continuous cyclical risk management mechanism ensures that Tencent Cloud can proactively and forward-lookingly identify and control security risks, maintaining them at an acceptable level and guaranteeing the secure and stable operation of its cloud platform and services.
Tencent Cloud has established an information security risk management procedure to identify, track, and manage risks throughout the entire process.
To ensure that operations within the production environment can be recorded and traced, Tencent Cloud has implemented a log management policy requiring all system components, including servers, network devices, databases, and applications, to enable logging. Tencent Cloud's production environment has fully deployed bastion hosts, which centrally manage administrator account permissions for Tencent Cloud backend system components. Internal operations personnel must obtain authorization to access the bastion host, and all backend operations are recorded in detail and centrally stored by the log platform.
Tencent Cloud's security operations platform uses predefined auditing and monitoring rules to automatically and intelligently analyze collected log data, promptly detecting system and activity anomalies, preventing security risks, achieving comprehensive visualization and real-time insight into risk data, and improving the security response speed and efficiency of the cloud platform.
Tencent Cloud has established internal log collection and management standards and mechanisms to control the recording, extraction, analysis, and auditing of login logs, operation logs, event logs, etc. Once any abnormal behavior is detected, an alarm ticket is automatically generated to order action.
Customer data is classified as highest-security data within Tencent Cloud. Unless required for service provision or troubleshooting and with explicit customer authorization, Tencent Cloud employees will never proactively access any customer data. To mitigate the risk of unauthorized access to information assets, Tencent Cloud has implemented strict access management policies, including:
Tencent Cloud has clearly defined management requirements and related authorization mechanisms for special access permissions. Bastion hosts have been fully deployed in Tencent Cloud's production environment, providing centralized control over administrator account permissions for Tencent Cloud backend system components. Internal operations and maintenance personnel must obtain authorization to access the bastion host; access is limited to specific Tencent Cloud internal operations and maintenance personnel, and two-factor authentication is required to log in. Operational records are centrally stored on a log platform, and the logs are regularly audited by Tencent Cloud's internal audit team.
Tencent Cloud has established detailed operational security "red lines" and, leveraging years of experience in abnormal behavior monitoring, has built a comprehensive rule base and developed reliable automated operational security audit tools to identify abnormal behavior and automatically trigger real-time alerts.
Tencent Cloud provides multiple data transmission protection mechanisms to ensure the confidentiality, integrity, and authenticity of sensitive information from sender to receiver, including:
To ensure the confidentiality of customer data stored in the cloud, Tencent Cloud provides secure encryption solutions:
KMS seamlessly integrates with Tencent Cloud products such as Object Storage (COS), Cloud Disk (CBS), and Database (TencentDB/CDB). Users only need to select the key managed by KMS, without needing to worry about the encryption details, to achieve transparent cloud data encryption and decryption.
The Key Management System (KMS) uses a Hardware Security Module (HSM) certified by the State Cryptography Administration or FIPS-140-2 to generate and protect keys, meeting compliance review standards and supporting full lifecycle management of encryption keys, including generation, storage, rotation, archiving, and destruction.
To reduce the risk of key cracking or misuse, KMS supports key rotation and employs secure and reliable methods to delete expired, invalid, or leaked keys. Deleted keys cannot be recovered, and encrypted data under those keys cannot be decrypted.
Tencent Cloud has formulated and implemented multi-level network security governance and strategies to improve the robustness of the underlying network of its cloud platform, including:
Tencent Cloud provides a mature network security architecture, employing multiple protection mechanisms including firewalls, intrusion detection/prevention systems (IDS/IPS), DDoS protection, network logical isolation, and web application security to promptly detect, filter, and block malicious network traffic, protecting Tencent Cloud's network security.
Through multi-point monitoring and multi-layered defense mechanisms, Tencent Cloud analyzes traffic in a timely manner, detects network attacks or threats in real time and issues alerts, assisting Tencent Cloud services in resisting network attacks from the internet (such as DDoS attacks) and providing a secure, stable, and healthy network operating environment for its businesses.
Tencent Cloud has established a rigorous supplier evaluation and onboarding process.
Tencent Cloud has established supplier management processes and requirements to ensure that all service providers are fully evaluated and that their services meet security, quality, and compliance requirements through clear service agreements.
To ensure the continuous and stable operation of customer systems and data availability, Tencent Cloud, from the perspective of a cloud service provider, safeguards the business continuity of its cloud platform and services in three aspects: high availability of infrastructure, disaster recovery of network and computing units, and daily business continuity management.
Tencent Cloud places great emphasis on the business continuity management of its cloud platform. It ensures business operations meet availability requirements by establishing and implementing internal processes, and supports customers in integrating their business continuity plans. Tencent Cloud has established and implemented a business continuity management system and has obtained third-party certification for ISO22301 business continuity management system.
Tencent Cloud has internally established information security incident management standards, and set up information security reporting, response, and handling mechanisms and related processes.
1. Incident Identification and Risk Assessment: After a security alarm is triggered, the cloud security team first assesses the incident risk and classifies it. Relevant teams then activate emergency plans according to the classification to control the escalation of the situation.
2. Incident Emergency Response: The emergency response team will respond to and handle the incident according to the process. Through log review, the attack path, alarm cause, and scope of impact will be identified. Measures will be taken to eliminate the fault, restore the system/service, and, if necessary, activate the business continuity management plan.
3. Incident Review and Optimization: After the impact of the fault is eliminated, relevant departments will review the incident and conduct root cause analysis, formulate corrective measures, and optimize existing security strategies.
4. Incident Reporting: Tencent Cloud reports the incident response and handling process to relevant parties in accordance with laws, regulations, and relevant requirements.
Tencent Cloud has established a regular vulnerability scanning and penetration testing mechanism to comprehensively address internal and external vulnerabilities and risks.
Tencent Cloud's security vulnerability management platform automatically generates security tickets for discovered security vulnerabilities or risks. The relevant product departments must promptly conduct vulnerability remediation assessments and quickly mitigate losses based on the type and risk level of the security ticket, and determine remediation measures and plans based on root cause analysis. Security tickets contain detailed vulnerability descriptions, vulnerability risk levels, processing time limits, and vulnerability remediation guidelines. Vulnerabilities of different risk levels must be processed strictly according to their respective time requirements.
If a cloud platform vulnerability discovered during the assessment may impact customers, Tencent Cloud will promptly synchronize information such as vulnerability overview, scope, and severity of impact to customers through official website announcements, internal messages, etc., and provide relevant remediation suggestions and specific operational guidelines.
Tencent Cloud is committed to working with customers to build a better and more comprehensive security system for cloud-based businesses and data, and has established a cloud security responsibility-sharing model based on different cloud service categories.
Tencent Cloud's responsibility: Responsible for the security of the underlying physical and infrastructure of the entire cloud computing environment, and ensuring the security and compliance of the cloud platform and the cloud products provided.
Customer's responsibility: Responsible for ensuring the security of self-built cloud applications and business data, including the correct development and use of cloud products (including security products), proper protection and authorization of cloud accounts, continuous monitoring and operation, and protecting business and data security.
Tencent Cloud's responsibility: Responsible for the security of the underlying physical and infrastructure of the entire cloud computing environment, and ensuring the security and compliance of the cloud platform and the cloud products provided.
Customer's responsibility: Responsible for ensuring the security of self-built cloud applications and business data, including the correct development and use of cloud products (including security products), proper protection and authorization of cloud accounts, and protecting business and data security.
Tencent Cloud's responsibility: Responsible for the security of the underlying physical and infrastructure of the entire cloud computing environment, and ensuring the security and compliance of the cloud platform and the cloud products provided.
Customer Responsibilities: Responsible for ensuring the security of self-built cloud applications and business data, including the correct development and use of cloud products (including security products), proper protection and authorization of cloud accounts, and safeguarding business and data security.
Compliance is the foundation of Tencent Cloud's development. Tencent Cloud identifies and adopts advanced international and industry security standards, adheres to the compliance requirements of different countries/regions and industries, continuously improves its internal management system, enhances its security control level, and strives to create cloud services that customers can trust. At the same time, Tencent Cloud actively participates in the formulation and promotion of industry security standards, adheres to the principle of compliance as a service, and builds and operates a secure and reliable cloud ecosystem.
To date, Tencent Cloud has obtained multiple security and privacy compliance certifications or qualifications through independent third-party audits or assessments, including: ISO 27001 Information Security Management System Certification, CSA STAR Cloud Security Certification (SOC 1/SOC 2/SOC 3 reports), and security certifications or audit reports for other regions and industries.
For more information on Tencent Cloud's security compliance, please see the Tencent Cloud Compliance page. For any related compliance certificates or reports, please apply for and download them through the Tencent Cloud Compliance Documentation Center.
Tencent Cloud has established a structured and systematic mature risk management system, combining the international standard ISO/IEC 27005 Information Security Risk Management Guidelines with its own business practices.
Starting with information assets, Tencent Cloud comprehensively identifies and analyzes potential risk scenarios and uses a risk quantification assessment model to classify and manage risks. Tencent Cloud has set clear risk acceptance benchmarks, requiring action to be taken for any risk at a medium or higher level, ensuring that risks are reduced to an acceptable range and build a solid security defense line for Tencent Cloud.
This dynamic monitoring and continuous cyclical risk management mechanism ensures that Tencent Cloud can proactively and forward-lookingly identify and control security risks, maintaining them at an acceptable level and guaranteeing the secure and stable operation of its cloud platform and services.
Tencent Cloud has established an information security risk management procedure to identify, track, and manage risks throughout the entire process.
To ensure that operations within the production environment can be recorded and traced, Tencent Cloud has implemented a log management policy requiring all system components, including servers, network devices, databases, and applications, to enable logging. Tencent Cloud's production environment has fully deployed bastion hosts, which centrally manage administrator account permissions for Tencent Cloud backend system components. Internal operations personnel must obtain authorization to access the bastion host, and all backend operations are recorded in detail and centrally stored by the log platform.
Tencent Cloud's security operations platform uses predefined auditing and monitoring rules to automatically and intelligently analyze collected log data, promptly detecting system and activity anomalies, preventing security risks, achieving comprehensive visualization and real-time insight into risk data, and improving the security response speed and efficiency of the cloud platform.
Tencent Cloud has established internal log collection and management standards and mechanisms to control the recording, extraction, analysis, and auditing of login logs, operation logs, event logs, etc. Once any abnormal behavior is detected, an alarm ticket is automatically generated to order action.
Customer data is classified as highest-security data within Tencent Cloud. Unless required for service provision or troubleshooting and with explicit customer authorization, Tencent Cloud employees will never proactively access any customer data. To mitigate the risk of unauthorized access to information assets, Tencent Cloud has implemented strict access management policies, including:
Tencent Cloud has clearly defined management requirements and related authorization mechanisms for special access permissions. Bastion hosts have been fully deployed in Tencent Cloud's production environment, providing centralized control over administrator account permissions for Tencent Cloud backend system components. Internal operations and maintenance personnel must obtain authorization to access the bastion host; access is limited to specific Tencent Cloud internal operations and maintenance personnel, and two-factor authentication is required to log in. Operational records are centrally stored on a log platform, and the logs are regularly audited by Tencent Cloud's internal audit team.
Tencent Cloud has established detailed operational security "red lines" and, leveraging years of experience in abnormal behavior monitoring, has built a comprehensive rule base and developed reliable automated operational security audit tools to identify abnormal behavior and automatically trigger real-time alerts.
Tencent Cloud provides multiple data transmission protection mechanisms to ensure the confidentiality, integrity, and authenticity of sensitive information from sender to receiver, including:
To ensure the confidentiality of customer data stored in the cloud, Tencent Cloud provides secure encryption solutions:
KMS seamlessly integrates with Tencent Cloud products such as Object Storage (COS), Cloud Disk (CBS), and Database (TencentDB/CDB). Users only need to select the key managed by KMS, without needing to worry about the encryption details, to achieve transparent cloud data encryption and decryption.
The Key Management System (KMS) uses a Hardware Security Module (HSM) certified by the State Cryptography Administration or FIPS-140-2 to generate and protect keys, meeting compliance review standards and supporting full lifecycle management of encryption keys, including generation, storage, rotation, archiving, and destruction.
To reduce the risk of key cracking or misuse, KMS supports key rotation and employs secure and reliable methods to delete expired, invalid, or leaked keys. Deleted keys cannot be recovered, and encrypted data under those keys cannot be decrypted.
Tencent Cloud has formulated and implemented multi-level network security governance and strategies to improve the robustness of the underlying network of its cloud platform, including:
Tencent Cloud provides a mature network security architecture, employing multiple protection mechanisms including firewalls, intrusion detection/prevention systems (IDS/IPS), DDoS protection, network logical isolation, and web application security to promptly detect, filter, and block malicious network traffic, protecting Tencent Cloud's network security.
Through multi-point monitoring and multi-layered defense mechanisms, Tencent Cloud analyzes traffic in a timely manner, detects network attacks or threats in real time and issues alerts, assisting Tencent Cloud services in resisting network attacks from the internet (such as DDoS attacks) and providing a secure, stable, and healthy network operating environment for its businesses.
Tencent Cloud has established a rigorous supplier evaluation and onboarding process.
Tencent Cloud has established supplier management processes and requirements to ensure that all service providers are fully evaluated and that their services meet security, quality, and compliance requirements through clear service agreements.
To ensure the continuous and stable operation of customer systems and data availability, Tencent Cloud, from the perspective of a cloud service provider, safeguards the business continuity of its cloud platform and services in three aspects: high availability of infrastructure, disaster recovery of network and computing units, and daily business continuity management.
Tencent Cloud places great emphasis on the business continuity management of its cloud platform. It ensures business operations meet availability requirements by establishing and implementing internal processes, and supports customers in integrating their business continuity plans. Tencent Cloud has established and implemented a business continuity management system and has obtained third-party certification for ISO22301 business continuity management system.
Tencent Cloud has internally established information security incident management standards, and set up information security reporting, response, and handling mechanisms and related processes.
1. Incident Identification and Risk Assessment: After a security alarm is triggered, the cloud security team first assesses the incident risk and classifies it. Relevant teams then activate emergency plans according to the classification to control the escalation of the situation.
2. Incident Emergency Response: The emergency response team will respond to and handle the incident according to the process. Through log review, the attack path, alarm cause, and scope of impact will be identified. Measures will be taken to eliminate the fault, restore the system/service, and, if necessary, activate the business continuity management plan.
3. Incident Review and Optimization: After the impact of the fault is eliminated, relevant departments will review the incident and conduct root cause analysis, formulate corrective measures, and optimize existing security strategies.
4. Incident Reporting: Tencent Cloud reports the incident response and handling process to relevant parties in accordance with laws, regulations, and relevant requirements.
Tencent Cloud has established a regular vulnerability scanning and penetration testing mechanism to comprehensively address internal and external vulnerabilities and risks.
Tencent Cloud's security vulnerability management platform automatically generates security tickets for discovered security vulnerabilities or risks. The relevant product departments must promptly conduct vulnerability remediation assessments and quickly mitigate losses based on the type and risk level of the security ticket, and determine remediation measures and plans based on root cause analysis. Security tickets contain detailed vulnerability descriptions, vulnerability risk levels, processing time limits, and vulnerability remediation guidelines. Vulnerabilities of different risk levels must be processed strictly according to their respective time requirements.
If a cloud platform vulnerability discovered during the assessment may impact customers, Tencent Cloud will promptly synchronize information such as vulnerability overview, scope, and severity of impact to customers through official website announcements, internal messages, etc., and provide relevant remediation suggestions and specific operational guidelines.