Provides a trustworthy, secure, and reliable platform for enterprise services.
Threats from both external and internal sources could cause severe impacts on your business running on Kingdee’s cloud services. We have implemented comprehensive measures to safeguard it.
- Security Requirements Analysis
- Security Requirements Review
- Security Design
- Threat Modelling
- PIA & PbD
- AI Security Review
- Component Review
- Testing Design
- Security Coding
- Code Review
- Code Scanning
- Document Security
- Security Scanning
- Penetration Test
- Third-Party Penetration Test
- Security Review
- Release Approval
- System Hardening
- PSIRT Vulnerability
- Management
- Incident Responding
- Environment Scanning
- Security Inspection
- Data Minimization
- Privacy Policy
- Cookie Policy
- RoPA
- Encrypted Channel
- Data Flow Monitor
- TIA
- SCC & MCC
- Security Tag
- Data Encryption
- Retention Control
- Remote Backup
- Tenant Segregation
- Access Control
- SOD
- Data Masking
- Processing Log
- User Data Erasure
- Data Export and Deletion upon
- License Expiration
Kingdee’s cloud service runs in a secure environment with multiple security protection measures implemented to prevent intentional or unintentional intrusions.
Kingdee uses an access control model based on RBAC (Role-Based Access Control), which defines different user permissions through roles. The model supports data access permission control at different granularities, such as the functional, field, and data levels.
Kingdee supports the access management strategy of separating the system administrator, security administrator, and audit administrator roles.
Kingdee’s public cloud utilizes renowned CSPs, which offer a complete security and privacy protection system, have obtained recognized security certifications (such as ISO27001, ISO27701, and CSA-STAR), and regularly receive SOC 2 attestation reports from third-party external audits.
Kingdee attaches great importance to your data assets and takes data protection as the core of its security strategy. Only authorized users can access the data, and data access permissions can be managed at different granularities, such as the functional, field, and data levels. For sensitive business data, Kingdee supports encryption using different encryption algorithms, such as common security encryption algorithms like Advanced Encryption Standard (AES).
Do note that Kingdee is only the custodian for the content data generated when you use cloud services; you have ownership and control over it. You are responsible for specific data security configurations and must therefore effectively ensure its confidentiality, integrity, and availability, as well as the authentication and authorization of data access.
Kingdee’s public cloud is currently deployed on servers in Singapore. Without your consent, Kingdee will not transfer your data to other regions. If you are located in countries other than Singapore or need to transfer data to other countries and require Kingdee’s assistance, you can contact Kingdee and sign Standard Contractual Clauses (SCC )or Model Contractual Clauses (MCC). Kingdee will deploy services overseas or transfer the data according to your authorization.
When using Kingdee cloud services, you should request Kingdee to configure cross-border security settings, which include encrypted data storage, data masking for display, encrypted transmission, etc. Your domestic branches and the foreign headquarters should sign EU-recognized SCCs. To mitigate risks, you could establish a security and privacy management system in accordance with the local regulation’s requirements, deploy cloud services locally, and de-identify personal information before transferring it to the foreign headquarters.
© 2026 Kingdee International Software Group Company Limited. All rights reserved.
© 2026 Kingdee International Software Group Company Limited. All rights reserved.
- Security Planning
- Planning Review