Alibaba Cloud Official Statement on Data Security Protection

"Alibaba Cloud monitors user data traffic?" "Really?" A screenshot of Alibaba Cloud's circle of friends posted by Zhu Feng@肥鹅旅游 spread throughout the IT circle in the morning.
 

Alibaba Cloud Official Statement on Data Security Protection Alibaba Cloud Official Statement on Data Security Protection


Regarding various disseminations on the Internet, the following is Alibaba Cloud's official reply, the original text is as follows:

Statement on Data Security Protection

Today, a customer reported that when using the Alibaba Cloud server to deploy the crawler business, they found that the network connection was unstable. It was suspected that it might be caused by the four programs g shell d, aliyun-service, Aegis, and Snort.

We hereby solemnly declare that all programs of Alibaba Cloud will not check the customer's key and server certificate, nor will they detect the port traffic data of the customer's server.

gshelld, aliyun-service, and Aegis are programs that come with Alibaba Cloud mirroring. Among them, gshelld is an open source program of XEN on ECS, which is mainly responsible for the initialization, management and control of virtual machines on XEN;

aliyun-service is the configuration process of the ECS virtual machine on the Aliyun KVM platform. It is an open source module of qemu, which is mainly responsible for the initialization function of the virtual machine on KVM;

Aegis includes two processes, AliYunDun and AliYunDunUpdate, which are mainly responsible for security defense and security knight upgrade and update.

Among the four processes mentioned by the customer, Snort is not the default program of Alibaba Cloud's official image, but a commonly used open source intrusion detection software. Customers are advised to check whether the Snort rule configuration affects the crawler service.

Alibaba Cloud has always regarded the protection of customer data privacy and data security as the lifeline. Without customer authorization, Alibaba Cloud will never view customer sensitive data, including but not limited to port traffic, private key, PKI key ciphertext, etc.

We believe that transparent communication is the cornerstone of trust. Regarding data security, we welcome all forms of inquiries.

 

Guess you like

Origin blog.csdn.net/weixin_56035688/article/details/132127794