Security & Compliance
Secondary Authorization for High-Risk Database Operations

Enable two-level approval for high-risk database operations to monitor business-critical assets in real time.

Changing CBH Instance Specifications

Change CBH instance specifications to meet your business growth needs.

Encrypting and Decrypting Small Data

Use the KMS online tool or call APIs to encrypt or decrypt a small amount of data.

Auditing an RDS DB instance (with Agents)

Audit the security of an RDS DB instance that connects to an ECS with applications deployed.

Auditing a User-built Database on ECS

Audit the security of a database built on an ECS or a BMS.

Adding a Domain Name to WAF

Connect your website to WAF to defend against common web attacks and malicious CC attacks, preventing data breaches.

Using False Alarm Masking Rules to Reduce False Positives

Customize false alarm masking rules to let WAF allow normal service requests that match basic web protection rules.

CC Attack Protection

Precisely identify and mitigate CC attacks by limiting access to protected websites by IP addresses or cookies.

Origin Server Protection

Customize access control rules to protect origin servers from data leakage.

Defense Against Oracle WebLogic wls9-async Deserialization Remote Command Execution Vulnerability (CNVD-C-2019-48814)

Protect websites from exploitation of Oracle WebLogic wls9-async Deserialization Remote Command Execution vulnerability.

Defending Against Fastjson Remote Code Execution Vulnerability

Defend against DoS vulnerabilities of the open-source component Fastjson.

Defending Against DoS Vulnerability in the Open-Source Component Fastjson

Defend against DoS vulnerabilities of the open-source component Fastjson.