Huawei Cloud is dedicated to helping you build a secure cloud environment.

We rely on over 30 years of security experience, combining the best cloud security practices in and outside China, and always complying with all applicable laws, regulations, and cloud security standards and specifications in the service provisioning area. We provide customers with cloud security services that are easily available, scalable, and offered on a pay-per-use basis, helping you protect application systems and important data on the cloud.

Terms & Conditions

活动对象:华为云电销客户及渠道伙伴客户可参与消费满送活动,其他客户参与前请咨询客户经理

活动时间: 2020年8月12日-2020年9月11日

活动期间,华为云用户通过活动页面购买云服务,或使用上云礼包优惠券在华为云官网新购云服务,累计新购实付付费金额达到一定额度,可兑换相应的实物礼品。活动优惠券可在本活动页面中“上云礼包”等方式获取,在华为云官网直接购买(未使用年中云钜惠活动优惠券)或参与其他活动的订单付费金额不计入统计范围内;

  • What Is Huawei Cloud infrastructure security?

    Infrastructure security is a core component of Huawei Cloud's multi-dimensional, full-stack cloud security system. We have enhanced the security and compliance of our data centers, networks, and other infrastructure based on industry best practices, so that you can migrate services to the cloud, stay focused on your business, and leave the security to us.


    Huawei Cloud is deployed in multiple regions and availability zones (AZs) around the world. You can check the services available at each site on the Huawei Cloud home page. Our data centers are located in geographically secure locations. We take appropriate access control, monitoring, and service continuity assurance measures to improve the security and reliability of Huawei Cloud infrastructure. Visit the Data Center page for more details.


    We divide and isolate security zones and network planes in compliance with ITU-T E.408 standards and industry best practices.


    For more information about the security design and practices of Huawei Cloud infrastructure, see Huawei Cloud Security White Paper.

  • How does Huawei Cloud secure my data on the cloud?

    We consider data asset protection as the core of our security policies. Huawei Cloud complies with industry-leading standards on data security lifecycle management and adopts excellent technologies, practices, and processes for identity authentication, permissions management, access control, data isolation, transmission security, storage security, data deletion, and physical device destruction. You can find more information on these practices in the Huawei Cloud Data Security White Paper.


    You own all the content data generated when you use services on Huawei Cloud, and have full control over the data. You are responsible for configuring security measures for specific data and ensuring the confidentiality, integrity, availability, and data access identity authentication and authorization. For example, if you use Identity and Access Management (IAM) and Data Encryption Workshop (DEW), you are responsible for keeping your accounts, passwords, and keys safe, and shall comply with industry best practices in configuring, updating, and resetting passwords and keys. You can check out more data security products under Huawei Cloud's [Security & Compliance] category.


    Huawei Cloud will never access your content data without your express authorization. We comply with all applicable laws and regulations, regularly update services to meet internal and external compliance requirements, evaluate security status based on industry standards, and share our compliance practices to maintain transparency.

  • Does Huawei Cloud Transfer My Data to Other Regions or Countries?

    Content data: You can decide where your content data is stored. Huawei Cloud will not transfer your content data to other regions without your explicit consent or unless required by legal obligations. If you plan to transfer content data across borders and need assistance from Huawei Cloud, contact and authorize Huawei Cloud support to transfer data.


    Personal data: We provide products and services for you through our global resources and servers. Any personal data we collect may be stored in the countries or regions where we, our affiliates, service providers, and subcontractors are located. This means that your personal data may be transferred to other jurisdictions outside the country or region where the product or service you use is located, or may be accessed from these jurisdictions.


    The laws protecting personal data vary by jurisdiction. Different jurisdictions may have laws protecting personal information to varying degrees or may not have personal data protection laws. Huawei Cloud ensures that your personal data is protected in compliance with applicable laws, regulations, and the Privacy Policy Statement. If you are a user in the Chinese mainland, your personal data will be stored on servers in the Chinese mainland.

  • What services can I use to improve cloud security?

    With years of security experience and data security as the core, Huawei Cloud provides a series of multi-dimensional and in-depth security services that integrate hardware and software. For instance, there are services to manage the security posture of your system, such as Situation Awareness (SA) and Managed Threat Detection (MTD). You can also find Host Security Service (HSS) and Web Application Firewall, which can protect your cloud workloads and applications. There are also many data security services that can protect your data assets on the cloud, including Data Security Center (DSC), Data Encryption Workshop (DEW), and Data Lake Governance Center (DGC). You can check out more data security products under Huawei Cloud's [Security & Compliance] category.


    You can easily build a comprehensive security system based on Huawei Cloud infrastructure and security services.

  • How does Huawei Cloud help me enhance security for operations and maintenance?

    In the DevOps or DevSecOps process, operations and maintenance are as important as R&D. Huawei Cloud attaches great importance to O&M and has abundant practices in O&M security, vulnerability management, security event management, business continuity, and disaster recovery management. Take O&M access as an example. Huawei Cloud uses the VPN and CBH deployed in your data center to manage and audit your server O&M in a unified manner, and takes different security control measures for different operations. For more information, see "Operational Security" in Huawei Cloud Security White Paper.


    You can also learn about secure and intelligent O&M from Huawei Cloud courses. For details about services recommended for O&M security, go to the O&M Security page.

  • What do I do to meet security and compliance requirements?

    Security and compliance is a shared responsibility between Huawei Cloud and customers. That is, Huawei Cloud is responsible for the security compliance of cloud services, and you assume the responsibilities of the service security and compliance inside your organization.


    Huawei Cloud keeps updating to meet the changing internal and external compliance requirements, ensures the legal and regulatory compliance of cloud services, strictly enforces security standard evaluations in a range of industries, and shares compliance practices with tenants to keep services transparent.


    You need to check the applications and services that you deployed on Huawei Cloud but do not belong to Huawei Cloud against the applicable security laws and regulations.


    For more information about Huawei Cloud certifications and regulation compliance, check our Compliance Center and Resources.

Cloud Security Resources & Best Practices

  • Huawei Cloud Security Features

    Check here see how you can configure Huawei Cloud services to achieve your security objectives.

    Check here see how you can configure Huawei Cloud services to achieve your security objectives.

  • Security Best Practices

    Huawei Cloud security best practices are developed based on a range of our customer success stories, helping you easily configure cloud services and securely migrate your business to the cloud.

    Huawei Cloud security best practices are developed based on a range of our customer success stories, helping you easily configure cloud services and securely migrate your business to the cloud.

  • Notices

    Updates about security events and vulnerabilities

    Updates about security events and vulnerabilities

  • Huawei Cloud Security White Paper

    Huawei Cloud experience and practices in secure cloud construction

    Huawei Cloud experience and practices in secure cloud construction

  • Huawei Cloud Data Security White Paper

    Huawei Cloud experience and practices in the data security field

    Huawei Cloud experience and practices in the data security field

  • Huawei Cloud Practical Guide for NIST CSF

    Learn how Huawei Cloud's products and services help you respond the requirements of NIST CSF.

    Learn how Huawei Cloud's products and services help you respond the requirements of NIST CSF.

  • Security Partner Alliance

    Huawei Cloud works with industry-leading security vendors to build a cloud security business and technology ecosystem.

    Huawei Cloud works with industry-leading security vendors to build a cloud security business and technology ecosystem.

  • Online Security Courses

    Learn how you can take advantages of security services and technologies on Huawei Cloud.

    Learn how you can take advantages of security services and technologies on Huawei Cloud.

  • Security FAQs

    Frequently asked questions about cloud security

    Frequently asked questions about cloud security

  • Huawei Cloud Cyber Security and Privacy Protection FAQs

    Frequently asked questions about Cyber Security and Privacy Protection

    Frequently asked questions about Cyber Security and Privacy Protection

Vulnerability Feedback

Product security is very important to Huawei.


If you suspect that HUAWEI CLOUD resources are being used inappropriately or encounter any security vulnerabilities in the HUAWEI CLOUD website, products, or services, please email [email protected]. For a more effective response to your report, please provide any necessary supporting materials (such as vulnerability reproduction conditions, proof-of-concept code, the IP address of the resource being used inappropriately, and suspicious behavior logs) to help the security response team understand the issue thoroughly. We reply to all feedback. You will receive a confirmation email within one working day of your initial feedback.


You can also send emails to [email protected]. We encourage global vulnerability coordination organizations, suppliers, security companies, organizations, security researchers, and Huawei employees to report vulnerabilities in our products or solutions.