Search

Huawei Among the First to Receive BSI's Vulnerability Management System Certification

2025.01.12

[Beijing, China, January 12, 2025] Huawei has recently passed BSI's vulnerability management system certification, which covers three international standards: ISO/IEC 27001 information security management, ISO/IEC 29147 vulnerability disclosure, and ISO/IEC 30111 vulnerability handling process. With its excellent vulnerability management practices, Huawei is one of the first organizations that achieve the certification, which covers Huawei products, including firewalls, intrusion prevention systems, AntiDDoS, situational awareness, and system APT defense products.

Huawei received the ISO/IEC 29147 & ISO/IEC 30111 certificate from David Zhu, BSI Greater China Sales Director

Huawei received the ISO/IEC 29147 & ISO/IEC 30111 certificate from David Zhu, BSI Greater China Sales Director

This certification is a series of Digital Trust Assurance Awards initiated by BSI, aiming to recognize enterprises' achievements in building digital trust. With further digital transformation, network attacks are increasingly frequent and automated. High-risk vulnerabilities and frequent security incidents drive regulatory legislation and new technologies.

Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. One of Huawei's development strategies is to establish an end-to-end global network security assurance system. To this end, Huawei has established a sustainable and reliable vulnerability management system, which covers policies, organizations, processes, management, technologies, and specifications. Furthermore, Huawei is open to address challenges together with external stakeholders.

In the future, Huawei will continue to adhere to the five principles in vulnerability management, which are harm and risk reduction, vulnerability reduction and mitigation, proactive management, continuous improvement, and openness and collaboration. Huawei will also follow the standards and best practices in the industry in vulnerability management to build a comprehensive and end-to-end vulnerability management system that covers the entire lifecycle of products and the entire supply chain, aiming to mitigate risks on customers' live networks.

TOP