- What's New
- Service Overview
- Billing
- Getting Started
- User Guide
- API Reference
- SDK Reference
-
FAQs
-
DeH FAQs
- What Is DeH?
- When a DeH Is Needed?
- Can I Use DeHs to Build Websites?
- Can I Buy DeHs by Myself?
- What Hypervisor Is Used by DeHs?
- Does Each DeH Have a Unique ID?
- What Are the Differences Between DeHs and BMSs?
- What Are the Differences Between DeH and DeC?
- What Are the Differences Between DeHs and ECSs?
- How Can I Query the Number of Available Resources on a DeH?
- Why Is It Not Possible to Successfully Create an ECS on a DeH Even When There Are More Available Resources on the DeH Than What the ECS Requires?
- Does DeH Support Capacity Expansion?
- What Is BYOL?
- How Do I Bring My Own Licenses to a DeH?
- Can I Attach an EVS Disk to a DeH?
- Is There a Limit on the Number of DeHs That I Can Purchase?
-
ECS FAQs
- What Are the Differences Between ECSs on DeHs and Those on Shared Hosts?
- What Are the Restrictions on Creating ECSs on a DeH?
- Can I Create ECSs of Different Flavors on a DeH?
- Can I Modify the Specifications of ECSs on DeHs?
- What Should I Do If I Fail to Create an ECS on a DeH?
- Can I Migrate ECSs in Resource Pools to DeHs?
- Billing FAQs
-
DeH FAQs
- Videos
- Glossary
-
More Documents
-
User Guide (Paris Region)
- Product Introduction
- Getting Started
- DeH Management
- ECS Management
- Tag Management
- Key Operations Recorded by CTS
- Managing Enterprise Projects
- Permission Management
-
FAQs
-
DeH FAQs
- What Is DeH?
- When a DeH Is Needed?
- Can I Use DeHs Build Websites?
- Can I Allocate DeHs by Myself?
- What Hypervisor Is Used by DeHs?
- Does Each DeH Have a Unique ID?
- What Are the Differences Between DeHs and BMSs?
- What Are the Differences Between DeH and DeC?
- What Are the Differences Between DeHs and ECSs?
- How Can I Query the Number of Available Resources on a DeH?
- Does DeH Support Capacity Expansion?
- What Is BYOL?
- How Do I Bring My Own Licenses to a DeH?
- Can I Attach an EVS Disk to a DeH?
- Is There a Limit on the Number of DeHs That I Can Purchase?
-
ECS FAQs
- What Are the Differences Between ECSs on DeHs and Those on Shared Hosts?
- What Are the Restrictions on Creating ECSs on a DeH?
- Can I Create ECSs of Different Flavors on a DeH?
- Can I Modify the Specifications of ECSs on DeHs?
- What Should I Do If I Fail to Create an ECS on a DeH?
- Can I Migrate ECSs in Resource Pools to DeHs?
- Billing FAQs
-
DeH FAQs
- Change History
- API Reference (Paris Region)
-
User Guide (Paris Region)
- General Reference
Show all
Copied.
Shared Responsibilities
Huawei guarantees that its commitment to cyber security will never be outweighed by the consideration of commercial interests. To cope with emerging cloud security challenges and pervasive cloud security threats and attacks, Huawei Cloud builds a comprehensive cloud service security assurance system for different regions and industries based on Huawei's unique software and hardware advantages, laws, regulations, industry standards, and security ecosystem.
- Huawei Cloud: Ensure the security of cloud services and provide secure clouds. Huawei Cloud's security responsibilities include ensuring the security of our IaaS, PaaS, and SaaS services, as well as the physical environments of the Huawei Cloud data centers where our IaaS, PaaS, and SaaS services operate. Huawei Cloud is responsible for not only the security functions and performance of our infrastructure, cloud services, and technologies, but also for the overall cloud O&M security and, in the broader sense, the security and compliance of our infrastructure and services.
- Tenant: Use the cloud securely. Tenants of Huawei Cloud are responsible for the secure and effective management of the tenant-customized configurations of cloud services including IaaS, PaaS, and SaaS. This includes but is not limited to virtual networks, the OS of virtual machine hosts and guests, virtual firewalls, API Gateway, advanced security services, all types of cloud services, tenant data, identity accounts, and key management.
Huawei Cloud Security White Paper elaborates on the ideas and measures for building Huawei Cloud security, including cloud security strategies, the shared responsibility model, compliance and privacy, security organizations and personnel, infrastructure security, tenant service and security, engineering security, O&M security, and ecosystem security.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot