Conclusion
This document provides an end-to-end security solution from the QingTian architecture system security to tenant security. This solution ensures that customers' sensitive services and data can run in a secure environment and prevents leakage of key sensitive data.
These security capabilities rely on the synergy of QingTian Cards, QingTian virtualization, and QingTian Controller, as well as the security of custom hardware.
Currently, all new ECS types are built based on the QingTian system, providing customers with all the security and benefits discussed in this document. Customers can select the most suitable instances to provide excellent security for their workloads based on the sensitivity.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot