驿来特平台
organization
A platform with security and maintenance features, including monitoring and protection measures for databases and networks.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
微信公众号管理功能模块
organization
A module within the platform that provides operational monitoring for domains, account balances, and database instances.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
Mysql数据库
organization
A database system experiencing rapid disk growth, requiring solutions to manage its performance.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
云防火墙
organization
A network security tool providing access control and intrusion prevention for the platform.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
Web应用防火墙
organization
A security tool that protects web applications by analyzing and blocking malicious requests.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
云安全中心
organization
A security service offering protection against viruses, vulnerabilities, and malicious attacks on hosts.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
阿里云
organization
A cloud service provider offering vulnerability scanning and other security services.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
运维监控功能
category
A feature enabling monitoring of domains, account balances, and database instances.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
防护措施
category
Security measures including network, application, and host-level protections.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
维护制度
category
Maintenance protocols ensuring database recovery and system security.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
MongoDb实例
organization
MongoDB database instances being monitored by the platform's operational features.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
Redis实例
organization
Redis database instances monitored for CPU and disk usage by the platform.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
ACL访问控制策略
category
Access control list policies implemented in cloud firewall for network security.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
CNAME接入方式
category
Domain name connection method used for web application firewall protection.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
区域封禁功能
category
Geographical blocking feature in web application firewall to restrict foreign IP access.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
扫描防护攻击
category
Scan protection feature in WAF to block malicious scanning attempts.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
BOT管理
category
Bot management system to block crawlers and automated machine behavior.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
主机防勒索
category
Host anti-ransomware protection provided by cloud security center.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
数据库防勒索
category
Database anti-ransomware feature in cloud security solutions.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
等保要求
category
Information security level protection requirements for system maintenance.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
RedoLog日志
category
Database redo logs used for incremental recovery testing.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
空难性故障恢复演练
event
Disaster recovery drills to establish service restoration procedures.
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
漏洞扫描服务
chunk-303a6253ad5ce6cedc3106ad88ac03a7
Alibaba Cloud provides vulnerability scanning services for system security.
UNKNOWN
驿来特平台安全.docx
1751799414
8.0
The platform includes the WeChat public account management module for operational monitoring.
monitoring,platform feature
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
9.0
The platform uses cloud firewall for network security and access control.
network protection,security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
9.0
The platform employs a web application firewall to protect against malicious requests.
application protection,security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
9.0
The platform utilizes a cloud security center for host and database protection.
host protection,security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The platform leverages Alibaba Cloud services for vulnerability scanning and security.
cloud services,security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
The module provides operational monitoring features for various platform components.
functionality,monitoring
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The monitoring function tracks MySQL database disk growth and performance issues.
performance tracking,resource monitoring
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The cloud firewall is part of the platform's network security measures.
network protection,security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The cloud firewall implements ACL policies for network access control.
access management,network security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The web application firewall is a key component of the platform's application security.
application protection,security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The WAF uses CNAME method for domain protection and IP hiding.
domain security,protection method
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
The WAF includes geographical blocking to restrict foreign IP access.
access control,geographical restriction
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
The WAF provides scanning protection against malicious probes.
security scanning,threat prevention
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
The WAF includes bot management to block automated threats.
automated threat prevention,bot protection
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The cloud security center is integral to the platform's host and database security.
host protection,security
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The security center offers anti-ransomware protection for hosts.
host security,ransomware protection
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The security center provides anti-ransomware features for databases.
database security,ransomware protection
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
Alibaba Cloud's services support the platform's maintenance protocols, including vulnerability scanning.
cloud services,maintenance
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
Alibaba Cloud provides vulnerability scanning services for system security.
cloud services,security scanning
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
The monitoring system observes MongoDB instance metrics and performance.
database monitoring,performance tracking
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
The monitoring feature tracks Redis instance CPU and disk usage.
performance tracking,resource monitoring
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The maintenance protocols follow information security level protection requirements.
compliance,security standards
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
7.0
The maintenance procedures use redo logs for incremental recovery testing.
database maintenance,recovery testing
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414
8.0
The maintenance system includes disaster recovery drills for service restoration.
disaster preparedness,recovery planning
chunk-303a6253ad5ce6cedc3106ad88ac03a7
驿来特平台安全.docx
1751799414