Tencent Cloud -- Architecture Patterns¶
This note covers the major architecture patterns for complex project setups on Tencent Cloud: single-VPC, multi-VPC, multi-account, multi-AZ / multi-region, DR, DMZ, and Landing Zone / Governance. Each pattern includes the key services, recommended configurations, and real-world examples drawn from official Tencent Cloud documentation and established practice.
1. Single Project with Single VPC¶
Architecture Summary¶
A Virtual Private Cloud (VPC) is the foundational building block on Tencent Cloud. A VPC is an isolated virtual network where you define a private CIDR block, create subnets across Availability Zones, and attach route tables and gateways. For a single project, one VPC with multi-AZ subnets provides network isolation, high availability, and operational simplicity.
CIDR blocks cannot be modified after VPC or subnet creation
Plan IP address space carefully before provisioning. When the primary CIDR cannot support growth, create a secondary CIDR to expand the range.
Internet --> WAF --> CLB (public subnet, AZ-a / AZ-b)
|
+--------+--------+
| |
CVM App (private CVM App (private
subnet, AZ-a) subnet, AZ-b)
| |
CDB MySQL (private subnet, AZ-a, replica in AZ-b)
|
NAT Gateway --> Internet (outbound SNAT)
Key Services¶
| Service | Role |
|---|---|
| VPC | Isolated virtual network with custom CIDR; supports 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16 (mask 12-28) |
| Subnet | Layer within a VPC bound to a single AZ; all Tencent Cloud resources must be deployed in a subnet |
| Route Table | System route table (auto-created per VPC) + custom routes; controls next-hop forwarding |
| Security Group | Stateful per-instance firewall; controls inbound/outbound traffic by protocol and port |
| Network ACL | Stateless subnet-level packet filter; operates at the protocol and port level |
| CLB (Cloud Load Balancer) | Layer 4/7 traffic distribution across CVM instances; supports TCP, UDP, HTTP, HTTPS |
| NAT Gateway | Provides outbound Internet access (SNAT) and inbound port mapping (DNAT); up to 10M concurrent connections |
| EIP (Elastic IP) | Public IP that can be bound to NAT Gateway, CLB, or individual CVM |
Recommended Configurations¶
- CIDR planning: Use RFC 1918 ranges. Reserve headroom -- VPC CIDR cannot
overlap with any VPC you plan to interconnect later via Peering or CCN. Use
/16for the VPC and/24for subnets as a starting point. Each VPC can provide up to 65,533 private IP addresses. - Multi-AZ subnets: Create at least two subnets in different AZs. Place CLB, CVM, and CDB replicas across both. A single VPC can span all AZs in a region.
- Subnet tiers: Segment into public (DMZ), private (application), and data (database) subnets. Use route tables and Network ACLs to enforce tiered traffic flow.
- No public IPs on app/DB: Application and database instances should have no EIPs. Use NAT Gateway (SNAT) for outbound Internet and CLB for inbound.
- Security Groups: One SG per tier (web, app, db), least-privilege rules. Rules are prioritized top-to-bottom; the first matching rule wins. Back up SG rules before modifying. Combine Security Groups with Network ACLs for defense in depth.
- Reserved IPs: Tencent Cloud reserves the first two and last IP of every subnet CIDR for internal networking.
- Secondary CIDR: When the primary CIDR cannot support business growth, add a secondary CIDR block to extend the address space without recreating the VPC.
Real-World Example¶
A SaaS startup deploys a three-tier web application in the Guangzhou region.
One VPC (10.0.0.0/16) with subnets in AZ-2 and AZ-3. Public subnets host a
CLB instance (HTTP/HTTPS listeners). Private subnets host CVM auto-scaling
groups running application containers. A managed CDB for MySQL (two-node,
semi-sync) instance runs with cross-AZ replica. NAT Gateway in the public
subnet provides egress for pulling container images and calling third-party
APIs. Security Groups restrict app-tier ingress to CLB health-check IPs only.
2. Multi-VPC Architecture¶
When workloads span multiple VPCs -- whether for environment isolation (dev/staging/prod), business-unit separation, or regulatory compliance -- Tencent Cloud offers three primary inter-VPC connectivity options.
2a. Cloud Connect Network (CCN) -- Full-Mesh¶
Architecture Summary¶
CCN is Tencent Cloud's managed WAN service. It establishes full-mesh interconnection between VPCs and between VPCs and on-premises IDCs. CCN uses MPLS-VPN technology for tenant isolation and supports automatic route learning, so when network topology changes you do not need to manually configure routes.
Once VPCs or Direct Connect gateways connect to a CCN instance, any two network instances can communicate without additional links.
+----------------------------------+
| CCN Instance |
| |
Region A | Region B On-Prem IDC |
+-------+ | +-------+ +-----------+ |
| VPC-1 |-+---| VPC-2 |-------| DC GW | |
+-------+ | +-------+ +-----------+ |
| | | |
+-------+ | +-------+ |
| VPC-3 |--+ | VPC-4 | |
+-------+ | +-------+ |
+----------------------------------+
Key Features¶
| Capability | Detail |
|---|---|
| Full-mesh | Any-to-any connectivity; no need for individual peering connections |
| Automatic route learning | Multi-level routing with autonomous learning; no manual route table updates |
| MPLS-VPN isolation | Tenant networks isolated at the data plane; meets financial and government security requirements |
| Custom route tables | Divide network zones within CCN for isolation between specific VPC groups |
| Cross-account | VPCs from different Tencent Cloud accounts can join the same CCN instance |
| VPN Gateway for CCN | Attach IPsec VPN tunnels to CCN, enabling encrypted access from multiple IDCs |
| Service levels | Platinum, Gold, Silver -- with different bandwidth and latency SLAs |
| Free intra-region | Same-region bandwidth up to 5 Gbps is free of charge (same or cross account) |
2b. Peering Connection -- Point-to-Point¶
Peering Connection provides direct, one-to-one VPC interconnection. Unlike CCN, connectivity is not transitive -- to fully interconnect N VPCs you need N*(N-1)/2 peering connections.
When to use Peering Connection vs CCN
Use Peering for simple two-VPC links. Use CCN when three or more VPCs need interconnection, or when VPCs span multiple regions or accounts.
2c. VPN Gateway -- Encrypted Tunnel¶
VPN Gateway creates IPsec VPN tunnels between a VPC and an on-premises IDC, between VPCs, or between a VPC and another cloud. Tencent Cloud also supports VPN Gateway for CCN, which attaches VPN tunnels directly to a CCN instance.
A common hybrid-cloud pattern uses Direct Connect (primary) with VPN (secondary) for disaster recovery. When the Direct Connect link fails, traffic automatically fails over to the VPN tunnel.
Connectivity Comparison Matrix¶
| Criterion | CCN | Peering Connection | VPN Gateway |
|---|---|---|---|
| Topology | Full-mesh (any-to-any) | Point-to-point | Point-to-point tunnel |
| Transitivity | Yes | No | No (unless via CCN) |
| Multi-region | Yes (cross-region bandwidth billed) | Yes (cross-region peering) | Yes (over public Internet) |
| Multi-account | Yes | Yes (cross-account peering) | Limited |
| Routing | Automatic route learning + custom route tables | Manual route configuration | Manual route configuration |
| Encryption | MPLS-VPN isolation (not encrypted on wire) | No encryption | IPsec encryption |
| Bandwidth | Up to 5 Gbps free intra-region; Platinum/Gold/Silver tiers for cross-region | Configurable per connection | Up to 1 Gbps per tunnel |
| Latency | Optimized private backbone | Private backbone | Internet-dependent |
| Use case | Enterprise multi-VPC, hybrid cloud, multi-region | Simple two-VPC link | Hybrid cloud, branch office, cross-cloud |
| Migration | Target architecture | Legacy; migrate to CCN when growing | Supplement to Direct Connect |
Recommended Configurations¶
- Prefer CCN for any topology involving three or more VPCs.
- CIDR discipline: Plan non-overlapping CIDRs across all VPCs. CCN can lower CIDR conflict detection to the subnet level, but non-overlapping VPC CIDRs is the safest approach.
- Custom route tables in CCN: Use them to isolate network segments (e.g., production VPCs cannot route to development VPCs).
- Hybrid DR: Use Direct Connect as the primary link and VPN Gateway as the secondary. When the DC link is healthy, all traffic flows over DC; when it fails, traffic fails over to VPN automatically.
Real-World Example¶
A financial services company operates in three regions (Shanghai, Guangzhou, Singapore) with separate VPCs per region and per environment (prod/staging). Six VPCs join a single Gold-tier CCN instance. Custom route tables isolate production from staging. A Direct Connect circuit from the Shanghai IDC connects via DC Gateway to CCN, with a VPN Gateway for CCN as a warm standby. Cross-region bandwidth is billed at CCN monthly 95th-percentile rates.
3. Multi-Account / Multi-Project Governance¶
Architecture Summary¶
Tencent Cloud provides two complementary services for multi-account governance:
- Tencent Cloud Organization (TCO) -- centralized management of multiple Tencent Cloud accounts under a single organization, with Organizational Units (OUs), Service Control Policies (SCPs), and consolidated billing.
- Cloud Access Management (CAM) -- identity and permission management within a single account, including sub-accounts, roles, policies, federated identity (SAML/OIDC SSO), and MFA.
+------------------------------------------------------+
| Tencent Cloud Organization |
| |
| +------------+ +------------+ +------------+ |
| | OU: Core | | OU: Prod | | OU: Dev | |
| | | | | | | |
| | - Shared | | - BizUnit1 | | - Sandbox | |
| | Services | | - BizUnit2 | | - Staging | |
| | - Security | | - BizUnit3 | | | |
| +------------+ +------------+ +------------+ |
| |
| Service Control Policies (SCPs) applied per OU |
| Consolidated billing across all member accounts |
+------------------------------------------------------+
Key Services¶
| Service | Role |
|---|---|
| Tencent Cloud Organization (TCO) | Multi-account organizational hierarchy with OUs, SCPs, consolidated billing, and account lifecycle management |
| CAM (Cloud Access Management) | IAM service: sub-users, collaborators, roles, policies, temporary credentials, federated SSO, MFA |
| Service Control Policies (SCP) | Guardrails applied at the OU/account level; restrict which services/actions member accounts can use |
| Resource Tags | Key-value metadata on resources for cost allocation, ownership tracking, and policy enforcement |
| CloudAudit | API-level audit logging for all account activity; 90-day retention; export to COS via tracking sets |
CAM Identity Types¶
| Identity | Description |
|---|---|
| Root account | Full access to all resources; creates sub-accounts |
| Sub-user | Fully owned by the root account; receives console login and API keys |
| Collaborator | An existing Tencent Cloud root account invited as a collaborator; maintains dual identity |
| Message recipient | Receives notifications but has no console/API access |
| Role | Virtual identity with temporary credentials; can be assumed by any Tencent Cloud account; used for cross-account access and service-linked permissions |
Service Control Policies (SCPs)¶
SCPs are the enforcement mechanism in TCO. If an OU only permits CVM-related actions via SCP, then member accounts in that OU can only grant CVM permissions to their sub-accounts through CAM -- regardless of what CAM policies exist.
SCP + CAM interaction
Effective permissions = intersection of SCP permissions AND CAM permissions. SCPs set the maximum boundary; CAM sets the actual grant within that boundary.
Recommended Configurations¶
- Account-per-environment: Separate accounts for production, staging, development, and shared services (logging, security, networking).
- OU hierarchy: Group accounts by lifecycle stage (Core / Prod / Non-Prod) and apply SCPs per OU.
- Federated SSO: Connect your corporate IdP (Active Directory, Okta) to CAM via SAML 2.0 or OIDC. Avoid creating individual sub-users for every employee.
- Least-privilege policies: Use CAM policy conditions (IP range, MFA required, time-of-day) to tighten access.
- Consolidated billing: Use TCO billing mode to view all member account costs from the management account.
- Resource tags: Enforce mandatory tags (
env,team,cost-center) across all member accounts. Use tags for cost allocation in billing reports.
Real-World Example¶
A conglomerate with three subsidiaries manages 12 Tencent Cloud accounts under one TCO Organization. The Core OU holds the shared-services account (VPC hub via CCN, CloudAudit aggregation, COS log bucket) and the security account (Cloud Firewall, WAF). The Prod OU holds six production accounts (two per subsidiary), each with SCPs restricting resource creation to approved regions only (Shanghai, Guangzhou). The Dev OU holds three sandbox accounts with relaxed SCPs but hard budget limits via billing alerts. All accounts federate to a corporate Okta instance for SSO.
4. Multi-AZ / Multi-Region¶
Architecture Summary¶
Tencent Cloud operates 64 availability zones across 22 regions globally. Mainland China regions include Guangzhou, Shenzhen, Shanghai, Nanjing, Beijing, Chengdu, Chongqing, and Qingyuan. International regions include Hong Kong, Singapore, Seoul, Tokyo, Bangkok, Silicon Valley, Virginia, Frankfurt, Sao Paulo, Jakarta, and (newly opened in 2025) Saudi Arabia.
Multi-AZ deployment keeps resources in multiple data centers within the same region for intra-region HA. Multi-region deployment replicates infrastructure across geographies for DR, latency reduction, and data-residency compliance.
Key Services for Multi-AZ / Multi-Region¶
| Service | Multi-AZ / Multi-Region Role |
|---|---|
| CLB (Cloud Load Balancer) | Deploys master/slave clusters across AZs in the same region; automatic AZ failover; supports cross-region binding 2.0 via CCN |
| CDB (TencentDB for MySQL) | Two-node (source + replica cross-AZ), three-node (two replicas in different AZs), Cluster Edition with decoupled compute/storage |
| TDSQL for MySQL | Distributed database with intra-city active-active, 1-region-2-DC, 2-region-3-DC architectures; strong synchronous replication |
| TDSQL-C (CynosDB) | Cloud-native MySQL/PostgreSQL with serverless compute and multi-AZ storage; compatible with MySQL 8.0 |
| TencentDB for Redis | Multi-AZ deployment for master and replica nodes; supports up to 6 AZs; read/write separation routes reads to local-AZ replica |
| COS (Cloud Object Storage) | Multi-AZ (MAZ) storage within a region; cross-region replication between buckets for DR |
| GAAP (Global Application Acceleration Platform) | 50+ global nodes; accelerates TCP/UDP/HTTP/HTTPS between user and origin; up to 10 Gbps per connection; IPv6 and HTTP/3 support |
| DNSPod | DNS resolution service; supports geo-based and latency-based routing; used with CLB for global load balancing |
| CCN | Cross-region VPC interconnection over private backbone; enables cross-region CLB binding |
CLB Cross-AZ and Cross-Region¶
CLB provides two levels of geographic distribution:
-
Cross-AZ (default): CLB deploys high-performance clusters across AZs within a region. If an AZ becomes unreachable, traffic automatically routes to the surviving AZ. Bind CLB to CVM instances in multiple AZs for real-server-level HA.
-
Cross-Region Binding 2.0: Uses CCN to bind CLB to CVM instances in a different region or VPC. The fee is charged on the CCN instance, not the CLB. Prerequisites: bill-by-IP account, CCN instance created, target VPC associated with CCN.
Global Load Balancing combines CLB instances per region with DNSPod geo-routing to distribute traffic globally.
CDB (TencentDB for MySQL) Multi-AZ Architectures¶
| Architecture | Nodes | Replication | Cross-AZ | Use Case |
|---|---|---|---|---|
| Two-Node | 1 source + 1 replica | Async or semi-sync | Source and replica in different AZs | Standard HA |
| Three-Node | 1 source + 2 replicas | Semi-sync or strong sync | Replicas in different AZs (e.g., Beijing Zone 5 + Zone 7) | Financial-grade HA |
| Cluster Edition | 1 primary + N read replicas | Decoupled compute/storage | Multi-AZ compute nodes | Elastic read scaling |
CDB uses the TXSQL kernel (Tencent's MySQL branch), which optimizes InnoDB, replication performance, and provides enterprise features (TDE, audit, read/write separation). CDB supports 99.9996% data reliability and 99.95% service availability.
Cross-region DR: CDB supports creating disaster recovery instances in a remote region. DTS (Data Transmission Service) replicates data continuously over Tencent's private network. The DR instance can be promoted to a source instance in seconds.
GAAP (Global Application Acceleration Platform)¶
GAAP is purpose-built for reducing cross-border and cross-region latency. It creates high-speed tunnel connections between the user's region and the origin server region, bypassing congested public Internet paths.
| Feature | Detail |
|---|---|
| Nodes | 50+ globally distributed acceleration nodes |
| Bandwidth | Up to 10 Gbps per connection |
| Concurrency | Up to 1 million concurrent requests per connection |
| Protocols | TCP, UDP, HTTP, HTTPS, IPv6, HTTP/3 |
| Security | End-to-end encryption, two-way client auth, IP blocklist/allowlist, Anti-DDoS Basic integration |
| Monitoring | Per-connection, per-listener, per-domain, per-origin statistics; alarms for bandwidth, concurrency, latency, packet loss |
Recommended Configurations¶
- Multi-AZ by default: Deploy CVM, CDB, and Redis across at least two AZs. Use CLB to distribute traffic across both.
- Three-node CDB for financial or mission-critical workloads with strong sync replication and replicas in separate AZs.
- COS MAZ storage class for intra-region object durability. Add cross-region replication for DR.
- GAAP for any user base that accesses the application from a different continent. Configure GAAP connections per acceleration region and monitor latency/packet-loss metrics.
- DNSPod + CLB for global load balancing: resolve the same domain to different CLB VIPs per region using geo-routing policies.
Real-World Example¶
A global gaming company deploys its matchmaking service across Shanghai,
Frankfurt, and Virginia. Each region has a VPC with multi-AZ subnets and a
CLB. CDB three-node (strong sync) handles game state in Shanghai; DR replicas
in Frankfurt via DTS. GAAP acceleration connections tunnel player traffic from
South America to the Virginia origin and from Southeast Asia to the Shanghai
origin. DNSPod resolves api.game.com to the nearest regional CLB VIP based
on the player's geography.
5. Disaster Recovery (DR) Patterns¶
Architecture Summary¶
Tencent Cloud supports a spectrum of DR strategies from cold backup to active-active. The primary enabler is DTS (Data Transmission Service) for database-level DR, combined with COS cross-region replication for object storage and TDSQL / CDB features for database HA.
Key DR Services¶
| Service | DR Role |
|---|---|
| DTS (Data Transmission Service) | Database migration, real-time synchronization, and binlog-based subscription; supports cloud-local active-active, multi-site active-active, and cross-border sync |
| CDB Disaster Recovery Instance | Read-only replica in a remote region; syncs via DTS over private network; promotable to source in seconds |
| TDSQL for MySQL | Intra-city active-active in financial AZs; 1-region-2-DC and 2-region-3-DC architectures with strong sync (MAR technology) |
| TDSQL-C (CynosDB) | Cloud-native MySQL with multi-AZ storage replication; automatic failover within seconds |
| COS Cross-Region Replication | Incremental object sync between buckets in different regions; supports versioning; master/slave failover with SCF automation |
| SCF (Serverless Cloud Function) | Automates DR switchover logic (health checks, DNS updates, failover triggers) |
| EventBridge | Event-driven orchestration for DR workflows; triggers SCF functions on failure events |
| DNSPod | DNS failover routing; switches traffic between primary and DR endpoints |
DR Strategy Comparison¶
| Strategy | RPO | RTO | Cost | Tencent Cloud Implementation |
|---|---|---|---|---|
| Backup & Restore | Hours | Hours | Lowest | CDB automated backups (binlog + physical); COS lifecycle; restore on demand |
| Pilot Light | Minutes | 10-30 min | Low | CDB DR instance (stopped/minimal); COS replication; scale up on failover |
| Warm Standby | Minutes | Minutes | Medium | CDB DR instance (running, read-only); CLB + CVM at reduced capacity in DR region; DTS continuous sync |
| Active-Active | Near zero | Near zero | Highest | TDSQL intra-city active-active; DTS bi-directional sync; dual CLB with DNSPod weighted routing |
COS Cross-Region Replication DR¶
COS cross-region replication is the primary mechanism for object storage DR. It syncs incremental data between a source bucket and a destination bucket in a different region.
Architecture:
+-- cross-region replication -->
[Bucket A] | [Bucket B]
(Shanghai) <----+---- replication (reverse) (Singapore)
| |
[CDN Layer] [CDN Layer]
| |
+----+----+ +----+----+
| App | <-- SCF health check + failover | App |
| Primary | DNSPod switches DNS | DR |
+---------+ +---------+
Key characteristics:
- Requires versioning enabled on both buckets.
- Incremental replication; files replicate in seconds to minutes depending on size and distance.
- Master/slave failover: when Bucket A links fail, SCF detects the failure and switches client traffic to Bucket B. Reverse replication keeps Bucket A in sync once it recovers.
- Cost optimization: replicate only hot data (recent uploads) to reduce storage costs in the DR bucket.
- COS Multi-AZ (MAZ) storage class provides intra-region redundancy across IDCs. Combine MAZ with cross-region replication for both local and geographic durability.
DTS Capabilities¶
DTS is the workhorse for database DR:
- Data Migration: One-time full + incremental migration with minimal downtime. Supports migration to Tencent Cloud, between TencentDB instances, and from third-party cloud databases.
- Data Synchronization: Continuous real-time sync between two database instances. Supports bi-directional sync for active-active patterns.
- Data Subscription: Streams binlog changes to downstream consumers (data warehouses, event pipelines).
DTS leverages Tencent's private network for DR sync, reducing latency and minimizing data loss risk compared to public-network replication. Each DTS node has second-level failure recovery and self-healing capabilities.
TDSQL Multi-DC Architectures¶
| Architecture | Description | Failover | Data Consistency |
|---|---|---|---|
| 1-Region-2-DC | Master and slave nodes in two data centers within the same city | Automatic; minutes | Strong sync (MAR) |
| 2-Region-3-DC | Three data centers across two regions | Automatic; minutes | Strong sync (MAR); zero data loss |
| Intra-city Active-Active | Both DCs serve read/write traffic via the same virtual IP | Automatic; transparent to application | Strong sync; same VIP, same port |
TDSQL achieves strong sync through Multi-thread Asynchronous Replication (MAR), a Tencent kernel optimization that brings strong-sync performance close to asynchronous replication levels. This addresses the traditional performance penalty of synchronous replication.
Recommended Configurations¶
- Warm standby as the default DR strategy for most production workloads: CDB DR instance + DTS continuous sync + COS cross-region replication + reduced-capacity CLB/CVM in DR region.
- Active-active for financial and payment workloads: TDSQL intra-city active-active with strong sync in financial AZs.
- Automate failover: Use SCF + EventBridge + DNSPod to detect failures, promote DR instances, and switch DNS -- avoid manual intervention.
- Test DR regularly: Promote the DR CDB instance periodically in a test window to validate RTO. Simulate COS bucket-A failure to verify SCF switchover logic.
Real-World Example¶
Airstar Bank (a Tencent-backed virtual bank in Hong Kong) runs a multi-layer DR architecture on Tencent Cloud. The system achieves cross-AZ dual-active disaster recovery with second-level rapid switching on extreme failures. DTS provides continuous database synchronization between the primary and DR regions. Tencent Cloud's observability platform monitors all business nodes in real time, triggering automated failover workflows when anomalies are detected.
6. DMZ / Perimeter Security Patterns¶
Architecture Summary¶
Tencent Cloud implements defense-in-depth through layered security services rather than a traditional physical DMZ. The recommended deployment chain is:
Each layer strips a category of threat before traffic reaches the application. Subnet tiering within the VPC provides network-level isolation between public, application, and data tiers.
Key Security Services¶
| Service | Role |
|---|---|
| Anti-DDoS Basic | Free 2 Gbps (up to 10 Gbps) DDoS protection; auto-enabled for all Tencent Cloud resources; SYN/UDP/ACK/ICMP/CC flood defense |
| Anti-DDoS Pro | Paid; binds to Tencent Cloud IPs (CVM, CLB, NAT); 30-line BGP; base + elastic bandwidth; no IP change required |
| Anti-DDoS Advanced | Paid; for any Internet business (in or outside Tencent Cloud); hides real server IP; Tbps-level capacity; 900+ Gbps per China node; global cleaning centers |
| Tencent EdgeOne | Integrated CDN + DDoS + WAF + bot protection; 25+ Tbps DDoS reserve; 3-second attack response; Anycast |
| WAF (Web Application Firewall) | OWASP Top 10 defense; SQL injection, XSS, CSRF, web shell detection; VIP addresses include 2 Gbps Anti-DDoS Basic |
| Cloud Firewall (CFW) | Network-layer firewall with IPS, virtual patching, domain-based ACLs; NAT firewall for outbound control; VPC boundary firewall for inter-VPC isolation |
| Security Group | Instance-level stateful firewall |
| Network ACL | Subnet-level stateless packet filter |
Anti-DDoS Protection Tiers¶
| Tier | Protection | Scope | Pricing | Key Feature |
|---|---|---|---|---|
| Anti-DDoS Basic | 2-10 Gbps | Auto-enabled on all Tencent Cloud resources | Free | Basic volumetric defense |
| Anti-DDoS Pro | Configurable base + elastic | Tencent Cloud resources only (CVM, CLB, NAT) | Base monthly + elastic daily | No IP change; 30-line BGP |
| Anti-DDoS Advanced | Tbps-level | Any Internet business (Tencent Cloud or external) | Base monthly + elastic daily + app bandwidth | Hides real IP; global cleaning centers |
Cloud Firewall (CFW) Editions¶
| Edition | Capabilities |
|---|---|
| Premium | ACL control, IPS intrusion blocking, virtual patch, malicious code detection, NAT firewall with integrated NAT |
| Enterprise | All Premium features + inter-VPC firewall for VPC boundary isolation |
| Ultimate | All Enterprise features + advanced threat tracing, 6-month log retention |
CFW replaces traditional DMZ management
Cloud Firewall can implement DMZ-style management for VPC networks, focusing protection on core assets and achieving fine-grained isolation between VPC segments -- similar to traditional network DMZ zones but using cloud-native controls.
Subnet Tiering Pattern¶
+----------------------------------------------------------+
| VPC (10.0.0.0/16) |
| |
| +------------------+ Public Tier (10.0.1.0/24) |
| | CLB, NAT Gateway | <-- Internet-facing |
| +------------------+ <-- Anti-DDoS + WAF protect this |
| | |
| +------------------+ Application Tier (10.0.10.0/24) |
| | CVM App Servers | <-- CFW VPC firewall isolates |
| +------------------+ <-- SG: allow from CLB only |
| | |
| +------------------+ Data Tier (10.0.20.0/24) |
| | CDB, Redis, ES | <-- SG: allow from App tier only |
| +------------------+ <-- No Internet access |
| |
+----------------------------------------------------------+
Recommended Traffic Flow¶
- Anti-DDoS Pro/Advanced absorbs volumetric attacks at the network edge.
- EdgeOne / CDN caches static content and provides additional L7 DDoS protection.
- WAF inspects HTTP/HTTPS traffic for application-layer attacks (SQL injection, XSS, bot traffic).
- CLB distributes clean traffic to CVM instances in private subnets.
- Cloud Firewall (NAT firewall) controls outbound connections from CVM, detecting and blocking malicious outbound traffic (C2 callbacks, data exfiltration).
- Cloud Firewall (VPC firewall) isolates east-west traffic between VPCs or between subnet tiers.
- Security Groups on each instance provide the final layer of least-privilege access control.
Recommended Configurations¶
- Always enable Anti-DDoS Basic (it is auto-enabled, but verify the protection threshold).
- Bind Anti-DDoS Pro to WAF VIP addresses for combined L3/L4 + L7 protection.
- Use CFW Enterprise edition for multi-VPC environments to inspect east-west traffic at VPC boundaries.
- NAT firewall for outbound traffic control: identify CVM instances making suspicious outbound connections.
- Network ACLs on the data-tier subnet: whitelist only application-tier subnet CIDRs on database ports.
- No direct Internet access for data-tier or application-tier subnets. Route all outbound through NAT Gateway, monitored by CFW.
Real-World Example¶
An e-commerce platform in Guangzhou deploys Anti-DDoS Advanced (hiding the origin IP), EdgeOne for CDN and bot mitigation, and WAF for application-layer defense. Traffic flows through CLB into CVM instances in a private subnet. Cloud Firewall Enterprise edition monitors east-west traffic between the order-processing VPC and the payment VPC. NAT firewall inspects all outbound connections, blocking known malicious domains. CDB for MySQL sits in a data subnet with Network ACLs that only allow TCP 3306 from the application subnet CIDR.
7. Landing Zone / Governance¶
Architecture Summary¶
Tencent Cloud does not have a single packaged "Landing Zone" product equivalent to AWS Control Tower or Azure Landing Zones. Instead, governance is assembled from individual services:
| AWS Equivalent | Tencent Cloud Service |
|---|---|
| AWS Organizations | Tencent Cloud Organization (TCO) |
| AWS Service Control Policies | TCO Service Control Policies (SCPs) |
| AWS IAM | Cloud Access Management (CAM) |
| AWS CloudTrail | CloudAudit |
| AWS Config | No direct equivalent; partial coverage via Cloud Security Center |
| AWS Control Tower | No direct equivalent; assemble from TCO + CAM + CloudAudit + tags |
| Resource Groups / Tags | Resource tags (key-value pairs on resources) |
CloudAudit¶
CloudAudit is Tencent Cloud's API-level audit logging service:
| Feature | Detail |
|---|---|
| Coverage | Logs all API operations across Tencent Cloud Console, CLI, SDK |
| Retention | 90 days in CloudAudit console (event history) |
| Persistent storage | Tracking sets export to COS buckets for long-term retention |
| Query fields | Access key, region, error code, event ID, event name, event source, event time, request ID, source IP, username |
| Cost | Free (you only pay for COS storage if using tracking sets) |
| Use case | Compliance audits, security investigations, resource change tracking, troubleshooting |
Governance Building Blocks¶
A Tencent Cloud Landing Zone can be assembled as follows:
-
TCO Organization: Create the organization from a management account. Define OUs (Core, Production, Non-Production, Sandbox). Invite or create member accounts and assign to OUs.
-
Service Control Policies: Apply SCPs per OU to restrict allowed services, regions, and actions. For example, restrict production OU to Shanghai and Guangzhou regions only.
-
CAM Federated SSO: Configure SAML 2.0 or OIDC identity providers in each member account (or use cross-account role assumption from a central identity account).
-
CloudAudit Aggregation: In each member account, create a tracking set that exports audit logs to a centralized COS bucket in the security account. This provides a single pane for compliance review.
-
Resource Tags: Define mandatory tags (
env,team,cost-center,data-classification) and enforce them through CAM policy conditions or post-deployment compliance checks. -
Shared Networking: Create a network hub account with a CCN instance. Member account VPCs join the CCN. Use custom route tables for isolation.
-
Security Baseline: Deploy Cloud Firewall, WAF, and Anti-DDoS in the security account. Route all Internet-facing traffic through the security account's CLB and WAF.
-
COS Log Bucket: Centralize all logs (CloudAudit, CLB access logs, WAF logs, COS access logs) in a dedicated COS bucket with versioning, lifecycle policies, and cross-region replication.
Compliance¶
Tencent Cloud complies with local information security standards in countries and regions where it provides cloud services. Available compliance certifications include ISO 27001, SOC 1/2/3, PCI-DSS, GDPR readiness, CSA STAR, and region-specific certifications (China MLPS, Singapore MTCS).
Government-grade workloads benefit from:
- Encryption: TLS in transit, AES at rest for logs and audit data.
- RBAC: CAM role-based access to restrict log access to authorized personnel.
- Tamper-proof storage: COS versioning + object lock prevents unauthorized modification or deletion of audit trails.
- CLS (Cloud Log Service): Centralized log management for real-time analysis and compliance monitoring.
Recommended Configurations¶
- Start with TCO + CAM SSO: Even for small organizations, setting up TCO early avoids painful account restructuring later.
- Mandatory CloudAudit tracking sets: Export to COS in a separate security account from day one.
- Tag enforcement: Use CAM policies that deny resource creation when mandatory tags are missing.
- Network hub: Centralize Internet egress and ingress through a shared-services account with CLB, NAT Gateway, WAF, and Cloud Firewall.
- Quarterly compliance review: Use CloudAudit event history and COS log analysis to generate compliance reports.
Real-World Example¶
A mid-size enterprise establishes a Tencent Cloud landing zone with 8 accounts under TCO. The management account owns the organization and billing. A security account hosts CloudAudit tracking-set COS buckets, Cloud Firewall, and WAF. A network account holds the CCN instance and shared NAT Gateways. Three production accounts and two development accounts are organized into Prod and Dev OUs. SCPs on the Prod OU restrict instance creation to approved regions and require MFA for destructive API calls. All accounts federate to Azure AD via SAML 2.0. Resource tags are enforced through CAM deny policies.
8. Service Naming Quick Reference¶
This table maps common cloud concepts to their Tencent Cloud product names and abbreviations.
Compute¶
| Concept | Tencent Cloud Service | Abbreviation |
|---|---|---|
| Virtual Machine | Cloud Virtual Machine | CVM |
| Serverless Function | Serverless Cloud Function | SCF |
| Container Orchestration | Tencent Kubernetes Engine | TKE |
| Container Registry | Tencent Container Registry | TCR |
| Bare Metal | Cloud Physical Machine | CPM |
| Auto Scaling | Auto Scaling | AS |
Networking¶
| Concept | Tencent Cloud Service | Abbreviation |
|---|---|---|
| Virtual Network | Virtual Private Cloud | VPC |
| Subnet | Subnet | -- |
| Load Balancer (L4/L7) | Cloud Load Balancer | CLB |
| NAT Gateway | NAT Gateway | NAT |
| Elastic IP | Elastic IP | EIP |
| DNS | DNSPod | -- |
| CDN | Content Delivery Network / EdgeOne | CDN |
| WAN / Transit Network | Cloud Connect Network | CCN |
| VPC Peering | Peering Connection | -- |
| VPN | VPN Connections (VPN Gateway) | VPN |
| Dedicated Circuit | Direct Connect | DC |
| Global Acceleration | Global Application Acceleration Platform | GAAP |
Database¶
| Concept | Tencent Cloud Service | Abbreviation |
|---|---|---|
| Managed MySQL | TencentDB for MySQL | CDB |
| Managed PostgreSQL | TencentDB for PostgreSQL | -- |
| Managed Redis | TencentDB for Redis | -- |
| Managed MongoDB | TencentDB for MongoDB | -- |
| Managed SQL Server | TencentDB for SQL Server | -- |
| Cloud-native MySQL/PG | TDSQL-C for MySQL / PostgreSQL | CynosDB |
| Distributed MySQL | TDSQL for MySQL | DCDB |
| Managed MariaDB | TencentDB for MariaDB | TDSQL (legacy naming) |
| NoSQL (wide column) | TcaplusDB | -- |
| Managed Kafka | Cloud Kafka | CKafka |
| DB Migration/Sync | Data Transmission Service | DTS |
Storage¶
| Concept | Tencent Cloud Service | Abbreviation |
|---|---|---|
| Object Storage | Cloud Object Storage | COS |
| Block Storage | Cloud Block Storage | CBS |
| File Storage (NFS) | Cloud File Storage | CFS |
| Archive Storage | COS Archive / Deep Archive | -- |
Security & Identity¶
| Concept | Tencent Cloud Service | Abbreviation |
|---|---|---|
| IAM | Cloud Access Management | CAM |
| Organization / Multi-Account | Tencent Cloud Organization | TCO |
| Network Firewall | Cloud Firewall | CFW |
| Web App Firewall | Web Application Firewall | WAF |
| DDoS Protection (free) | Anti-DDoS Basic | -- |
| DDoS Protection (Tencent IPs) | Anti-DDoS Pro | -- |
| DDoS Protection (any IP) | Anti-DDoS Advanced | -- |
| Integrated Edge Security | Tencent EdgeOne | -- |
| Data Security | Data Security Governance Center | DSGC |
| Key Management | Key Management Service | KMS |
| SSL Certificate | SSL Certificate Service | -- |
Monitoring & Logging¶
| Concept | Tencent Cloud Service | Abbreviation |
|---|---|---|
| Cloud Monitoring | Cloud Monitor | CM |
| Log Management | Cloud Log Service | CLS |
| API Audit Logging | CloudAudit | -- |
| Event Bus | EventBridge | EB |
| APM | Application Performance Management | APM |
AI / ML¶
| Concept | Tencent Cloud Service | Abbreviation |
|---|---|---|
| Machine Learning Platform | Tencent Cloud TI Platform | TI |
| NLP / Speech / Vision | Tencent Cloud AI | -- |
Cross-References¶
- Alibaba Cloud Architecture -- comparable architecture patterns for Alibaba Cloud
- Multi-Cloud Governance -- cross-cutting governance patterns applicable across cloud providers