Huawei

Huawei's logo


Location(s)

Huawei has 28 zones(s) in 15 countries:

  • Europe
  • North America
  • South America
  • Central America
  • Asia
  • Africa
  • Russia
  • Pacific

Elastic Cloud Servers

Provides secure, scalable, on-demand compute resources, enabling you to flexibly deploy applications and workloads

232 CPU

3.1 TB of RAM

Instance types

BS 10012

BS 10012

Guidelines and requirements for establishing, implementing, maintaining, and continually improving a personal information management system

BSI C5 Type 1

BSI C5 Type 1

Specifies minimum requirements for secure cloud computing and is primarily intended for professional cloud providers, their auditors and customers.

BSI C5 Type 2

BSI C5 Type 2

Specifies minimum requirements for secure cloud computing and is primarily intended for professional cloud providers, their auditors and customers.

CSA Star

CSA Star

The industry's most powerful program for security assurance in the cloud.

ISO 20000:2018

ISO 20000:2018

Service management - Part 1: Service management system requirements

ISO 22301:2019

ISO 22301:2019

Security and resilience — Business continuity management systems — Requirements

ISO 27001:2022

ISO 27001:2022

Code of practice for information security controls based on ISO/IEC 27002 for cloud services

ISO 27015:2017

ISO 27015:2017

Code of practice for information security controls based on ISO/IEC 27002 for cloud services

ISO 27018:2019

ISO 27018:2019

Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

ISO 27701:2019

ISO 27701:2019

Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management

ISO 27799:2016

ISO 27799:2016

Guidelines to support the interpretation and implementation in health informatics of ISO/IEC 27002 and is a companion to that International Standard.

ISO 29151:2017

ISO 29151:2017

Guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information.

ISO 9001:2015

ISO 9001:2015

Quality management systems — Requirements

ITSS

ITSS

Guidelines for safeguarding IT systems and assets from unauthorized access and cyber threats.

MTCS

MTCS

Certifies cloud service providers' security levels for organizations to choose secure cloud services.

OSPAR

OSPAR

Evaluates the security and compliance practices of external service providers, ensuring they meet required standards and regulations for handling sensitive data and services.

PCI-3DS

PCI-3DS

Information security standard for organizations that handle branded credit cards from the major card schemes

PCI-DSS

PCI-DSS

Information security standard for organizations that handle branded credit cards from the major card schemes

SOC 1 Type II

SOC 1 Type II

Internal Control over Financial Reporting

SOC 2 Type II

SOC 2 Type II

Trust Services Criteria

SOC 3

SOC 3

Trust Services Criteria for General Use Report

TISAX

TISAX

Secure processing of information from business partners, the protection of prototypes and data protection in accordance with the GDPR for transactions between automobile manufacturers, service providers or suppliers

TRUCS

TRUCS

An assessment system for cloud computing services