AICC Security Assurance
The AICC migrates businesses and data to the cloud, where system resources are shared by multiple enterprises. This section describes how the AICC ensures system security in this scenario.
The AICC ensures business security in terms of APIs, businesses, operations, and networks.
API Security
The AICC uses mechanisms such as encrypted data transmission and API authentication to ensure the security for enterprises to invoke APIs.

Business Security
The AICC uses mechanisms such as business data isolation and user permission control to ensure the security of enterprise contact center services.


Operation Security
The AICC management system ensures the security of management operations for the enterprise contact center based on mechanisms such as administrator permission control and operation log recording.

Network Security
The AICC uses firewalls and IP packet attack defense mechanisms at network borders to prevent malicious behavior from untrusted domains.

To sum up, the AICC provides a four-layer security mechanism to ensure the security of contact center businesses.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot