Help Center/
Well-Architected Framework/
Well-Architected Framework and Practices/
Security Pillar/
Data Security and Privacy Protection/
SEC07 General Data Security/
SEC07-05 Transmission Data Encryption
Updated on 2025-05-22 GMT+08:00
SEC07-05 Transmission Data Encryption
Encrypt data during transmission to prevent data from being stolen, tampered with, or viewed by unauthorized users.
- Risk level
High
- Key strategies
- Using encryption protocols: Ensure that secure encryption protocols are used to encrypt data and protect it from being stolen or tampered with during transmission. Use the latest TLS version (TLS 1.2 or later) to ensure that the strongest encryption standard is used.
- Secure transmission channel: Ensure that the data transmission channel is secure. Do not use insecure networks or public networks to transmit sensitive data.
- Ensure that sensitive data is encrypted when being transmitted between the cloud and the client. In this way, data is difficult to be decrypted even if it is stolen.
- E2E encryption: Use E2E encryption to ensure that data stays encrypted during transmission, that is, from the data generation end to the data receiving end. Use HTTPS to encrypt communication between clients and servers for web application APIs.
- Data integrity verification: Use hash functions, digital signatures, and message authentication codes (MACs) to verify data integrity to ensure that data is not tampered with during transmission.
- Related cloud services and tools
- VPN
- Direct Connect
- Cloud Connect
- Data Express Service (DES)
- CCM
Parent topic: SEC07 General Data Security
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot