Cloudpense cooperates with AWS to establish a shared hierarchical security model and form a defense mechanism with the highest security level.
·Cloudpense Protection: network access, login audit, assets, customer operating system updates, anti-malware, IDS/IPS backup settings.
·AWS Guarantee: 24*7 security protection, restricted access, double verification, disk destruction, intrusion detection, security inspection, network monitoring, and secure API endpoints.


·Physical Machine: ssh access, all operations are recorded and auditable, os enhanced configuration-close ports, etc.
·EC2: security group, network isolation, key protection, anti-attack-Hillstone.
·VPC: network customization, ACL access control, vpn encrypted access.
·Storage Encryption.
·Multi-region Deployment.
·Authorization: IAM, users, roles, groups, control whether to allow access to those resources.
·Audit: every operation-api and manual behavior audit, resource change audit.
·Physical Machine: ssh access, all operations are recorded and auditable, os enhanced configuration-close ports, etc.
·EC2: security group, network isolation, key protection, anti-attack-Hillstone.
·VPC: network customization, ACL access control, vpn encrypted access.
·Storage Encryption.
·Multi-region Deployment.
·Authorization: IAM, users, roles, groups, control whether to allow access to those resources.
·Audit: every operation-api and manual behavior audit, resource change audit.

Considering the needs of enterprises for data isolation and self-management, Cloudpense provides a unique hybrid cloud deployment architecture to achieve complete data independence while sharing the SaaS service application layer. Users have 100% data ownership, management capabilities and monitoring rights to prevent data access, loss and tampering. The hybrid cloud deployment method not only enjoys all the benefits of SaaS, but also guarantees the security of data.


Cloud computing and internal system communication adopt a three-layer security architecture to ensure the safety of interface data communication:
·Infrastructure Security: 1. Use a physical firewall to limit communication IP; 2. Set up a bastion machine to isolate internal and external network communications;
Transmission Link Security: all communications adopt HTTPS encryption protocol, communication data is anti-theft, anti-tampering; at the same time, it has security policies such as login error lock, Touch ID, Face ID, and third-party authentication login.
· Application Layer Security: application identity token verification and business logic verification to ensure the correct business of the interface data.
Cloud computing and internal system communication adopt a three-layer security architecture to ensure the safety of interface data communication:
·Infrastructure Security: 1. Use a physical firewall to limit communication IP; 2. Set up a bastion machine to isolate internal and external network communications;
Transmission Link Security: all communications adopt HTTPS encryption protocol, communication data is anti-theft, anti-tampering; at the same time, it has security policies such as login error lock, Touch ID, Face ID, and third-party authentication login.
· Application Layer Security: application identity token verification and business logic verification to ensure the correct business of the interface data.

·On each single node, Cloudpense has set up dual-system hot backup; at the same time, in two remote availability zones (data centers) of Amazon, system disaster recovery is performed to ensure up to 99.5% system availability
·The system adopts S3 data storage technology, which can provide up to11 9 of data persistence; at the same time, the system provides regular disk snapshots and data backups to ensure the reliability of business data.


The system platform architecture has good large concurrency support and system scalability. Through application node replication, it can quickly expand computing and service capabilities and provide a good system experience.
Under the stress test of 5000 concurrent users, the system feedback is good, and the average feedback time is about 2 seconds.
The system platform architecture has good large concurrency support and system scalability. Through application node replication, it can quickly expand computing and service capabilities and provide a good system experience.
Under the stress test of 5000 concurrent users, the system feedback is good, and the average feedback time is about 2 seconds.
