Updated on 2025-10-16 GMT+08:00

Conclusion

This document provides an end-to-end security solution from the QingTian architecture system security to tenant security. This solution ensures that customers' sensitive services and data can run in a secure environment and prevents leakage of key sensitive data.

These security capabilities rely on the synergy of QingTian Cards, QingTian virtualization, and QingTian Controller, as well as the security of custom hardware.

Currently, all new ECS types are built based on the QingTian system, providing customers with all the security and benefits discussed in this document. Customers can select the most suitable instances to provide excellent security for their workloads based on the sensitivity.