A. Security operation for underlying hardware of cloud computing.
B. Application maintenance in ECS instances.
C. Security isolation between cloud computing tenants.
D. IP white list setting for RD
Explanation:
Reference: https://www.alibabacloud.com/solutions/security