Product Advantages
Product Advantages
-
Full Coverage
With CTS, you can track operations on cloud services in your account. These operations include actions taken on console, API activities, and system calls. They are carefully recorded in detail so you can always find the information you need for troubleshooting or security analysis.With CTS, you can track operations on cloud services in your account. These operations include actions taken on console, API activities, and system calls. They are carefully recorded in detail so you can always find the information you need for troubleshooting or security analysis. -
Data Security
Data integrity is key to compliance. In CTS, traces are transmitted and stored encrypted, and traces cannot be deleted or modified on the console or using APIs.Data integrity is key to compliance. In CTS, traces are transmitted and stored encrypted, and traces cannot be deleted or modified on the console or using APIs.
-
Access Security
Trace access is strictly controlled in a centralized manner. Only administrators can allocate permissions to access traces.Trace access is strictly controlled in a centralized manner. Only administrators can allocate permissions to access traces. -
Efficient Governance
With centralized, automated, and secure trace management, you can implement highly available and cost-effective IT governance.With centralized, automated, and secure trace management, you can implement highly available and cost-effective IT governance.
Application Scenarios
-
Compliance Auditing
-
Resource Tracking
-
Fault Locating
-
Security Analysis
Compliance Auditing
CTS provides a history of operation records, making it easy to comply with internal policies and regulatory standards.
Advantages
Traces are in a uniform format and conform to common
standards.
Traces are encrypted when they are generated, transmitted,
and stored.
CTS itself is free, and helps you save money in terms of maintenance too, but storage will generate some fees. However, traces can be merged to reduce storage costs.
Resource Tracking
Get a comprehensive history of changes made on cloud resources throughout their lifecycle.
Advantages
Changes are recorded in real time. You can search for records and get results in seconds. You can also configure email or SMS notifications for certain operations.
All console and API operations are recorded. Any alteration to trace files can be detected by integrity verification.
Traces are encrypted when they are generated, transmitted, and stored.
Fault Locating
If a fault occurs, you can use filters to quickly search for unusual operations. This accelerates troubleshooting and reduces manpower requirements.
Advantages
You can search for traces by combining multiple filters.
Traces contain necessary details about operations and are in a unified format, so you can quickly find whatever information you want.
The search UI makes it easy to search for traces and gives you instant results.
Security Analysis
Each trace records details on an operation. You can identify when an action was performed by which user, and the IP address from which a request was sent. This helps you detect unauthorized activities and analyze resource changes.
Advantages
Operations are recorded accurately and in real time. You can query traces at any time.
All operations are captured regardless of if they were performed on the console or triggered by an API.
Traces are encrypted when they are generated, transmitted, and stored.
Functions
Functions
-
Real-Time Tracking
CTS captures all operations on cloud resources in your account. You can have a complete view of actions made on consoles, API activities, and system calls.CTS captures all operations on cloud resources in your account. You can have a complete view of actions made on consoles, API activities, and system calls. -
Tracker Management
By configuring trackers, you can transfer traces to OBS buckets, encrypt trace files, and set key event notifications.By configuring trackers, you can transfer traces to OBS buckets, encrypt trace files, and set key event notifications. -
Trace Search and Query
You can search for traces by a set of filters, such as source, time, and operation type. You can also enable trace analysis to query traces in Log Tank Service (LTS).You can search for traces by a set of filters, such as source, time, and operation type. You can also enable trace analysis to query traces in Log Tank Service (LTS).
-
Key Event Notifications
Integration with Simple Message Notification (SMN) allows you to configure email and SMS notifications, so you will be alerted right away when critical events, such as ECS server creations or deletions, occur.Integration with Simple Message Notification (SMN) allows you to configure email and SMS notifications, so you will be alerted right away when critical events, such as ECS server creations or deletions, occur. -
Encrypted Trace Storage
You can control access to traces by encrypting trace files stored in OBS buckets using keys created in Data Encryption Workshop (DEW).You can control access to traces by encrypting trace files stored in OBS buckets using keys created in Data Encryption Workshop (DEW). -
Trace Integrity Verification
Integrity verification is a simple way to make sure you can tell if traces have been tampered with.Integrity verification is a simple way to make sure you can tell if traces have been tampered with.