Cloud computing provides users with a new type of computing, network, and storage environment, but at the service level of systems and applications, compared with traditional deployment methods, it has not undergone revolutionary changes. On the cloud computing platform, threats such as authentication and authorization, logic attacks, client attacks, command execution, and information leakage are still not to be ignored, and cloud computing vendors and enterprise IT managers need to pay sufficient attention. Compared with traditional server architecture, cloud computing technology introduces concepts such as virtualization and multi-tenancy, which to a certain extent bring related risk points to information systems. Security issues such as data leakage, insufficient identity verification, and insecure interfaces have become the core threats facing cloud computing services. How to control the security risks of the cloud computing environment is a concern for both cloud computing service providers and users.