MindMap Gallery Alibaba Cloud Security Manager
Alibaba Cloud Security Manager service combines the best cloud security operation practices accumulated by Alibaba Cloud experts to provide in-depth security detection and response services for cloud users, quickly build a basic security operation system for customers, and ensure the security of customers' cloud businesses.
Edited at 2024-01-17 10:26:32This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
Alibaba Cloud Security Manager
Product introduction
Alibaba Cloud Security Manager Service is a comprehensive security technology and consulting service provided by Alibaba Cloud security experts to cloud users based on Alibaba Cloud's years of best security practice experience. It establishes and continuously optimizes the cloud security defense system for cloud users, and protects cloud users. business security.
Service specifications
Service specifications Applicable scene Service Content MDR Basic Edition Only security consulting and daily security monitoring services are required. Security product monitoring Security status monitoring of cloud security center, cloud firewall, web application firewall, and DDoS protection. Exposed asset security Website availability monitoring, exposed IP and port monitoring. event handling Quarterly emergency response services (on demand). External security monitoring Emergency vulnerability notification, AK leak monitoring, sensitive data leak monitoring, content risk monitoring, and source code leak monitoring. MDR Enterprise Edition It is suitable for scenarios with high security protection requirements and builds a comprehensive security operation system. Covers the capabilities of MDR Advanced Edition and supports the following capabilities: Vulnerability classification and hierarchical management Vulnerability grading scheme based on vulnerability scanning, cloud security center, and Alibaba Cloud best practices. Threat analysis Honeypot intelligence analysis, cloud platform intelligence analysis, external monitoring analysis. Security hardening Patch repairs, configuration repairs, cloud security product upgrades or upgrade recommendations. Safety training empowerment Large safety screen, daily consultation, safety training. MDR Ultimate Edition It is suitable for the staged escort scenarios of key businesses during major events, such as: Large-scale offensive and defensive drills organized by regulatory agencies, industry leaders, etc. Security activities for major national and government events or conferences. Company anniversary celebrations, new product launches, major promotions, IPO and other business security guarantees, etc. Covers the capabilities of MDR Advanced Edition and supports the following capabilities: Security plan design Tailor-made security protection plans based on the security objectives of the security protection objects. Assessment and reinforcement guidance Conduct comprehensive safety inspections on key systems and guide customers to perform safety optimization. 7*24 hours security guard During the escort period, 7*24-hour security experts will be provided online on demand to provide timely response to security incidents and provide daily escort safety daily reports. security emergency response Coordinate the Alibaba Cloud security expert team to quickly respond to security incidents once they occur and reduce the impact of security incidents.
Product advantages
One-click hosting, full-stack operation
Alibaba Cloud Security Manager service relies on the technical advantages of Alibaba Cloud platform and Alibaba Cloud's years of security best practice experience to provide cloud users with a full range of security technology and consulting services, from the boundary to the intranet, from vulnerabilities to policies, and from configuration to Provide data security operation services, establish and continuously optimize cloud security defense systems for cloud users, ensure cloud business security, and allow cloud users to focus on their own business development.
Big data blessing
Cloud Security Center Cloud Firewall Web Application Firewall DDoS Protection and other security protection data cover multi-level protection such as VPN network, ECS, Web application, database protection, etc. Based on the data mining technology accumulated in many years of actual combat, it provides every cloud user with practical attack and defense capabilities. intelligence. At the same time, the security operation team relies on attack and defense intelligence data, combined with the protection requirements of different users and the current status of business systems, to adjust security protection strategies from time to time to reduce security risks to a controllable range and achieve dynamic adjustment, dynamic defense, dynamic operation, and dynamic management.
Advantages of scale
Faced with the huge number of users of security products and services, Security Butler uses a large-scale and systematic operation model to better and more efficiently serve every cloud user.
Minute-level emergency response
The emergency response system of cloud security monitoring and security housekeeper can quickly help cloud users correctly respond to hacker intrusions, clean up Trojan backdoors, analyze the causes of intrusions, and effectively reduce the losses caused by security incidents when a security incident occurs. Users quickly resume normal business operations.
Service catalog
security services Service overview Charging model Path to purchase Risk assessment services With user authorization, Alibaba Cloud's security technology team carries out comprehensive risk assessment activities or host and web vulnerability scanning services for cloud assets, providing you with services such as baseline reinforcement, vulnerability repair, and component upgrades. Charge based on number of services Visit the risk assessment service sales page, purchase service specifications based on business needs and complete payment. emergency response services Security Manager's emergency response services are based on Alibaba's many years of practical security attack and defense technical capabilities and management experience, and refer to relevant national information security incident response standards. After a security incident occurs, it follows the prevention, intelligence information collection, containment, eradication, and recovery processes. Provide professional 7*24 remote emergency response services to help enterprise users quickly respond to and handle information security incidents and recover business from them. At the same time, the emergency response service provides post-planning and cloud security management solution services to help enterprise users contain security incidents from the root cause and reduce business impact. Charge based on number of services Visit the emergency response service sales page, purchase service specifications based on business needs and complete payment. Class-guaranteed assessment services Integrating the technical advantages of cloud security products and combining with high-quality LPS consulting and LPS evaluation cooperation resources, we provide one-stop service that comprehensively covers LPS classification, filing, construction and rectification, and evaluation stages to help you pass the LPS assessment efficiently. Annual fee Visit the sales page of the Class A guarantee assessment service, select service specifications according to business needs and complete the payment.
Service Content
MDR service content (Enterprise Edition)
Service classification Service Content Delivery content details Deliver output SLA Security consulting Provide consulting services related to security products such as basic security product (Advanced Defense, WAF, Cloud Wall, Cloud Security Center, etc.) configuration issues, policy anomaly analysis, abnormal event handling and other consulting services. Troubleshooting cloud security product anomalies Ding group and housekeeper console notification information push. Summarize and reflect in relevant daily reports. 5*8 working days, providing on-demand consultation response within 30 minutes and completing a closed loop of consultation work orders within 72 hours. Cloud product strategy tuning guidance Consulting on cloud security product issues Security risk assessment Assess the overall security of the cloud and help users discover cloud security risks by analyzing several major risks and exposures on the cloud. Security Operations Capability Assessment Evaluate security maturity through interviews, surveys, etc., and provide security construction suggestions. Provide a "Safety Assessment Report". Once every quarter Network Architecture Risk Assessment Check the rationality of network control access policies and provide policy optimization suggestions for unreasonable policies. Provide a "Safety Assessment Report". Provide "Vulnerability Scanning Report". Continuously provide users with security risk monitoring and repair and reinforcement suggestions, and assist users in repair risk assessment and reinforcement content. During the service period, assessments will be completed monthly. Cloud product security assessment The cloud host performs baseline inspections and risk management, and outputs repair suggestions and risk management best practices, including system vulnerability inspections. Exposure surface/attack surface risk assessment Systematically provides periodic asset exposure, vulnerability detection and management services for cloud hosts and cloud businesses, manually analyzes report content, and outputs repair guidance and risk management best practices, including: public network exposure risks, high-risk port scanning, and Web vulnerabilities scanning. Account security risk assessment Detection and assessment of risks related to AK leakage. Application system security risk assessment Cloud security product configuration risk assessment Security Monitoring Monitor and analyze alarm events, launch alarms in the form of pin groups, manage alarms in the form of work orders, and help users filter out false alarms, false alarms and other issues. Analyze and judge alarms, and provide security opinions based on current business. Monitor the security status of cloud security products. Includes web application firewall, DDoS protection, cloud security center, and cloud firewall. Asset security status monitoring for multi-cloud and IDC access. Provide "Security Monitoring Service Report". Ding group and housekeeper console notification information push. 5*8 working days: 30 minutes to respond to alarms, complete alarm closed-loop processing on the same day, and inspect the cloud security center, cloud firewall, and DDoS every 15 minutes. Security hardening Based on the actual alarm situation and relevant industry standards, we assist users in quickly implementing security reinforcement after a security incident occurs. Security product configuration service: Helps users access security products and configure policies. The output is incorporated into the "Security Assessment Report", "Risk Tracking Form" and "Security Vulnerability Hardening List". have Emergency Response After a security incident occurs, we provide containment, eradication, and recovery methods, as well as prevention and security suggestions to help find the source of the attack and the cause of the intrusion. Security incident emergency response. After the emergency response is completed, an "Emergency Response Report" will be provided. Trigger conditions include the following two types of scenarios: Users proactively request emergency response support. Security experts discovered anomalies and initiated emergency response. Yes (provided by users with orders more than three months old). 5*8 working days: respond proactively to identify risks within 30 minutes, respond passively 24/7, provide improvement suggestions within 2 hours, and complete report output within 72 hours. Vulnerability Notice It provides 0day vulnerability impact detection based on vulnerability detection rules, and provides impact analysis based on the current host's network status, host status, etc. Latest vulnerability intelligence monitoring, analysis and early warning: When new high-risk vulnerability events affecting user assets are detected on the Internet, early warnings and repair plans will be analyzed and issued to remind users to repair them. DingTalk group and housekeeper console notification information push. Provide "Emergency Vulnerability Inspection Notice". Continue daily. Monitoring vulnerability reports are delivered from time to time. Product training Provide cloud security product capabilities, best practices and other related training. The following services are provided on demand: Cloud security products use best practices once Remote training time 30 minutes Provide "training materials". have Visual Portal Provide visualization, management, monitoring, and collaborative security butler service platform. none Security Manager Console have Summary and Report Provide cloud security situation reports in various formats such as monthly, quarterly, and semi-annual summaries, optimize product rules, and communicate at monthly, quarterly, and semi-annual meetings based on the current situation. none Provide the following work summary and content report: "Safety Service Daily" "Security Service Weekly" "Safety Service Monthly Report" "Security Service Quarterly Report" "Security Service Annual Report" Corresponding reports are provided on a regular basis.
MDR service content (basic version)
Service classification Service Content Delivery content details Deliver output Alibaba Cloud’s new SOW and SLA Security consulting Provide consulting services related to security products such as basic security product (Advanced Defense, WAF, Cloud Wall, Cloud Security Center, etc.) configuration issues, policy anomaly analysis, abnormal event handling and other consulting services. Troubleshooting cloud security product anomalies DingTalk group and housekeeper console notification information push. Summarize and reflect in relevant daily reports. have 5*8 working days, providing on-demand consultation response within 30 minutes and completing a closed loop of consultation work orders within 72 hours. Cloud product strategy tuning guidance Consulting on cloud security product issues Security Monitoring Monitor and analyze alarm events, launch alarms in the form of pin groups, manage alarms in the form of work orders, and help users filter out false alarms, false alarms and other issues. Analyze and judge alarms, and provide security opinions based on current business. Monitor the security status of cloud security products. Includes web application firewall, DDoS protection, cloud security center, and cloud firewall. Asset security status monitoring for multi-cloud and IDC access. Provide "Security Monitoring Service Report". Ding group and housekeeper console notification information push. 5*8 working days: 30 minutes to respond to alarms, complete alarm closed-loop processing on the same day, and inspect the cloud security center, cloud firewall, and DDoS every 15 minutes. Vulnerability Notice It provides 0day vulnerability impact detection based on vulnerability detection rules, and provides impact analysis based on the current host network status, host status, etc. Latest vulnerability intelligence monitoring, analysis and early warning: When new high-risk vulnerability events affecting user assets are detected on the Internet, analysis will be carried out and early warnings and repair plans will be issued to remind users to repair them. DingTalk group and housekeeper console notification information push. Provide "Emergency Vulnerability Inspection Notice". Continue daily Irregular delivery Summary and Report Provide cloud security situation reports in various formats such as monthly, quarterly, and semi-annual summaries, optimize product rules, and communicate at monthly, quarterly, and semi-annual meetings based on the current situation. none Provide the following work summary and content report: "Security Service Biweekly Report" "Safety Service Monthly Report" "Security Service Annual Report" Corresponding reports are provided on a regular basis.