{"id":4298,"date":"2019-02-14T13:08:57","date_gmt":"2019-02-14T05:08:57","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=4298"},"modified":"2019-02-21T21:18:07","modified_gmt":"2019-02-21T13:18:07","slug":"%e5%90%84%e5%8e%82%e5%95%86%e5%ae%89%e5%85%a8%e7%99%bd%e7%9a%ae%e4%b9%a6%e6%94%b6%e9%9b%86%e6%95%b4%e7%90%86","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/4298.html","title":{"rendered":"\u5404\u5382\u5546\u5b89\u5168\u767d\u76ae\u4e66\u6536\u96c6\u6574\u7406"},"content":{"rendered":"<p>=Start=<\/p>\n<h4 id=\"id-\u6a21\u677f-\u7f18\u7531\uff1a\">\u7f18\u7531\uff1a<\/h4>\n<p>\u9075\u5faa\u6700\u4f73\u5b9e\u8df5\uff0c\u5411\u6700\u4f73\u6848\u4f8b\u5b66\u4e60\uff0c\u662f\u5feb\u901f\u63d0\u5347\u7684\u4e0d\u4e8c\u6cd5\u95e8\u3002<\/p>\n<h4 id=\"id-\u6a21\u677f-\u6b63\u6587\uff1a\">\u6b63\u6587\uff1a<\/h4>\n<h5><strong>=\u5404\u5382\u5546\u4e91\u5b89\u5168\u767d\u76ae\u4e66=<\/strong><\/h5>\n<h6>\u9876\u7ea7\u68af\u961f\uff1a<\/h6>\n<p><a href=\"https:\/\/cloud.google.com\/security\/infrastructure\/design\/\">Google \u57fa\u7840\u67b6\u6784\u5b89\u5168\u8bbe\u8ba1\u6982\u8ff0<\/a><br \/>\n<a href=\"https:\/\/zhuanlan.zhihu.com\/p\/25272746\">Google\u67b6\u6784\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<p><a href=\"https:\/\/d1.awsstatic.com\/whitepapers\/Security\/CN_Whitepapers\/AWS_Security_Best_Practices_CN.pdf\">AWS \u5b89\u5168\u6700\u4f73\u5b9e\u8df5<\/a><br \/>\n<a href=\"https:\/\/aws.amazon.com\/cn\/security\/\">https:\/\/aws.amazon.com\/cn\/security\/<\/a><\/p>\n<p><a href=\"https:\/\/zhuanlan.zhihu.com\/p\/33389958\">Google\u4e91\u5b89\u5168 vs AWS\u5b89\u5168<\/a><br \/>\n<a href=\"https:\/\/kinsta.com\/blog\/google-cloud-vs-aws\/#security\">https:\/\/kinsta.com\/blog\/google-cloud-vs-aws\/#security<\/a><\/p>\n<h6>\u4e00\u7ea7\u68af\u961f\uff1a<\/h6>\n<p><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/azure\/security\/security-white-papers\">Azure \u5b89\u5168\u6027\u767d\u76ae\u4e66<\/a><\/p>\n<p><a href=\"https:\/\/www.alibabacloud.com\/help\/zh\/faq-detail\/42435.htm\">\u963f\u91cc\u4e91\u5b89\u5168\u767d\u76ae\u4e66<\/a><br \/>\n<a href=\"https:\/\/www.aqniu.com\/industry\/28726.html\">\u963f\u91cc\u4e91\u5b89\u5168\u767d\u76ae\u4e66\u90fd\u6709\u54ea\u4e9b\u91cd\u8981\u5185\u5bb9\uff1f<\/a><\/p>\n<p><a href=\"https:\/\/mc.qcloudimg.com\/static\/pdf\/09b9bbad30e9a0457cc4b958c44f049e\/docfile.pdf\">\u817e\u8baf\u4e91\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<p><a href=\"https:\/\/intl.huaweicloud.com\/content\/dam\/cloudbu-site\/archive\/hk\/zh-cn\/securecenter\/security_doc\/Security_cn_201709.pdf\">\u534e\u4e3a\u4e91\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<h6>\u4e8c\u7ea7\u68af\u961f\uff1a<\/h6>\n<p><a href=\"https:\/\/img1.jcloudcs.com\/portal\/pdf\/JDCloud-Security-WhitePaper-201809.pdf\">\u4eac\u4e1c\u4e91\u5b89\u5168\u767d\u76ae\u4e66<\/a><br \/>\n<a href=\"https:\/\/www.jdcloud.com\/cn\/service\/trustedCenter\">https:\/\/www.jdcloud.com\/cn\/service\/trustedCenter<\/a><\/p>\n<p><a href=\"https:\/\/docs.ksyun.com\/read\/latest\/133\/_book\/whitepaper\/index.html\">\u91d1\u5c71\u4e91\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<p><a href=\"https:\/\/static.ucloud.cn\/c1d2f62967c140f716015b4c331051b2.pdf\">UCloud \u4e91\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<p>=<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/static.leiphone.com\/uploads\/new\/article\/740_740\/201709\/59ce2e5ece267.png?imageMogr2\/format\/jpg\/quality\/90\" width=\"554\" height=\"422\" \/><\/p>\n<p>&nbsp;<\/p>\n<h5><span style=\"color: #ff0000;\"><strong>=\u6570\u636e\u5b89\u5168\u767d\u76ae\u4e66=<\/strong><\/span><\/h5>\n<p><a href=\"http:\/\/www.caict.ac.cn\/kxyj\/qwfb\/bps\/201807\/P020180712523226672500.pdf\">\u5927\u6570\u636e\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<p><a href=\"https:\/\/intl.huaweicloud.com\/content\/dam\/cloudbu-site\/archive\/hk\/zh-cn\/securecenter\/security_doc\/DataSecurity_cn_20180927.pdf\">\u534e\u4e3a\u4e91\u6570\u636e\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<p><a href=\"https:\/\/mc.qcloudimg.com\/static\/pdf\/132296755c1dd18a5eb83f827577abc7\/docfile.pdf\">\u817e\u8baf\u4e91\u6570\u636e\u5b89\u5168\u767d\u76ae\u4e66<\/a><\/p>\n<p><a href=\"https:\/\/security.aliyun.com\/trust\">\u963f\u91cc\u4e91\u4fe1\u4efb\u4e2d\u5fc3<\/a><\/p>\n<p><a href=\"https:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=YTW03470CNZH\">IBM\u6570\u636e\u5b89\u5168\u9632\u62a4\u767d\u76ae\u4e66<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u9075\u5faa\u6700\u4f73\u5b9e\u8df5\uff0c\u5411\u6700\u4f73\u6848\u4f8b\u5b66\u4e60\uff0c\u662f\u5feb\u901f\u63d0\u5347\u7684\u4e0d\u4e8c\u6cd5\u95e8\u3002 \u6b63\u6587\uff1a =\u5404\u5382\u5546\u4e91\u5b89\u5168\u767d\u76ae\u4e66=  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25],"tags":[1310,963,1311],"class_list":["post-4298","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","tag-1310","tag-963","tag-1311"],"views":13142,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=4298"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4298\/revisions"}],"predecessor-version":[{"id":4299,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/4298\/revisions\/4299"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=4298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=4298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=4298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}