检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
account creation Suspicious IAM Account Create Suspicious IAM account creation IAM permission escalation IAM Permissions Escalation IAM permission escalation ECS login through brute-force attack ECS BruteForce Login ECS login through brute-force attack IAM login through brute-force
Preparing for the Upgrade IAM is used for data collection authorization. You need to create an IAM user with the minimum permission to access SecMaster APIs and disable verification rules such as MFA for the user. Log in to the management console.
you are advised not to set access keys for IAM users who have console passwords when setting initial IAM users.
Only IAM users can be used to install component controller and check details on the console. The IAM user can have only the minimum permissions assigned. For details, see Preparations.
Procedure (Optional) Step 1: Buy an ECS (Optional) Step 2: Buy a Data Disk (Optional) Step 3: Attach a Data Disk Step 4: Create a Non-administrator IAM User Step 5: Configure Network Connection Step 6: Install the Component Controller (isap-agent) Step 7: Install the Log Collection
Prerequisites You have obtained the IAM administrator account information. Buying an ECS View the ECS information. Log in to the console as the IAM administrator.
Preparations Creating an IAM user with the minimum permission IAM is used for data collection authorization. You need to create an IAM user with the minimum permission to access SecMaster APIs and disable verification rules such as MFA for the user.
Identity security Identity Defense Alarms Are Associated With Historical Handling Information Associates new IAM alerts with IAM alerts handled earlier and adds historical handling details to the comment area for the new alerts.
Security Center (DSC) Tenant-side cloud service dsc-alarm DSC alarm logs AP-Singapore, CN-Hong Kong, TR-Istanbul, AP-Bangkok, AF-Johannesburg, LA-Mexico City2, LA-Sao Paulo1, LA-Santiago, AP-Jakarta, ME-Riyadh, AF-Cairo, and AP-Manila Identity security Identity and Access Management (IAM
Database Connections Vulnerability handling HSS Isolation and Killing of Malware Automatic Renaming of Alert Names CIS_PostgreSQL Enabling the Backup Function and Configuring a Backup Policy CIS_PostgreSQL Disabling Default Ports CIS_DDS Enabling Database Audit Log CIS_Ensuring IAM
Enter the domain name, username, and password of the machine-machine account created in Step 4: Create a Non-administrator IAM User as prompted. If install isap-agent successfully is displayed, the component controller is installed.
{Endpoint} is the IAM endpoint and can be obtained from Regions and Endpoints. For details about API authentication, see Authentication.
Step 4: Create a Non-administrator IAM Account Use this account to access SecMaster for the log collector on the tenant side. Step 5: Configure Network Connection Establish the connection between the customer VPC and SecMaster.
When a policy needs to be delivered to IAM, each time a maximum of 50 IAM users can be added as blocked objects for each account. Label Label of a custom emergency policy.
Log in to the console as the IAM administrator. Click in the upper left corner of the management console, select a region or project, click in the upper left corner of the page, and choose Storage > Elastic Volume Service.
It can be obtained by calling the IAM API used to obtain a user token.
For security purposes, create IAM users under the account and grant them permissions for routine management. User A user is created using a domain to use cloud services. Each user has its own identity credentials (password and access keys).
When using a token for authentication, cache it to prevent frequently calling the IAM API used to obtain a user token. Ensure that the token is valid when you use it. Using a token that will soon expire may cause API calling failures.
It can be obtained by calling the IAM API used to obtain a user token.
It can be obtained by calling the IAM API used to obtain a user token.