重庆百变王牌复式投注规则|重庆百变王牌开奖结果查询

Security Guarantee

Architecture Security

Our Security Standards

  • oTMS strictly adheres to various international standards such as ISO27001 and implements information security governance and control of the SaaS system and data security management. In addition, oTMS obtained ISO27001:2013 certification in June 2017.

Network Security

  • The oTMS SaaS newtork is hosted on AliCloud managed by Ali security service and has strict controls in place.
  • The oTMS network is equipped a strong firewall to prevent illegal access.
  • All data is encrypted when being sent and received through the internet.
  • The database zone, application zone, and web zone are managed separately.

Data Security

  • All cloud data locally contained in China is stored in mainland China and is never transferred outside of China.
  • Sensitive files are well secured on Ali Cloud OSS service using 256-bit encryption.
  • Database zones, application zones, and web zone are all separated contained.
  • Database backup policies are in place to ensure that no more than 2 hours of data loss may occur annually.

Disaster Recovery

  • A disaster recovery protocol is in place which includes off-site storage locations for all data. In the event of a disaster, core applications can be recovered within as little as 4 hours.

Physical Security

  • The oTMS SaaS is hosted on Ali Cloud which provides securely managed and operated infrastructure.
  • Ali Cloud adheres to domestic and international information security standards, as well as industry requirements.

Application Security

Operations

  • The SaaS is operated on a 24/7 basis to ensure that critical incidents can be tracked and resolved in a timely manner.
  • The system features continuous daily operation logging, reviewing, and verification to ensure that system administrators conduct operations in accordance with standard procedures.

Access Controls

  • All customer accounts feature a 2-stage authentication process.
  • Password complexity is strictly defined, and passwords must be comprised of at least 3 different types of character sets.
  • System administrator accounts are reviewed on a regular basis to ensure that only authorized individuals have the ability to perform specified operations.
  • Remote access is accessible through an encrypted tunnel.

Vulnerability Management

  • The system is regularly scanned for vulnerabilities, and any detected vulnerability is immediately rectified.
重庆百变王牌复式投注规则 电竞电竞比分网1zplay 7m篮球比分即时比分app 足球指数捷报网007 雪缘园比分直播 混合过关 浙江快乐12 188比分直播 qq分分彩 球探网即时比分足球 网易体育比分 极速十一选五 500万即时赔率 广东时时彩 淘宝快3 6场半全场 p3试机号