检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Auditing and Logs CTS is a log audit service for Huawei Cloud security. It allows you to collect, store, and query cloud resource operation records. You can use these records to perform security analysis, audit compliance, trace resource changes, and locate faults.
None Operation Guide Querying Traces 02:14 Querying Traces Creating a Tracker 02:45 Creating a Tracker Configuring Key Event Notifications 04:14 Configuring Key Event Notifications Transferring Audit Logs to LTS 02:09 Transferring Audit Logs to LTS
They can track and record audit logs. Two types of trackers can be created, respectively management tracker and data tracker.
They can track and record audit logs. Two types of trackers can be created, respectively management tracker and data tracker.
What Is Cloud Trace Service The log audit module is a core component necessary for information security audit and an important part for the information systems of enterprises and public institutions to provide security risk management and control.
Querying Audit Traces in LTS On the Tracker List page, click the LTS log stream name on the right of the system tracker. The system-trace log stream details page is displayed.
Querying Audit Log Operators Function This API is used to query audit log operators. API Calling For details, see Calling APIs. URI GET /v3/{project_id}/user-resources Table 1 Path parameter Parameter Mandatory Type Description project_id Yes String Project ID.
Then the delegated administrator account can implement cloud audit capabilities, such as security audit. Audit logs of all members in the organization in the current region will be transferred to the OBS bucket or LTS log stream configured for the tracker.
Connection with your own audit system: You can synchronize all audit logs to your audit system in real time to analyze the API calling success rate, unauthorized operations, security, and costs.
Connection with your own audit system: You can synchronize all audit logs to your audit system in real time to analyze the API calling success rate, unauthorized operations, security, and costs. Usage Description SMN sends key event notifications to subscribers.
Using CTS to Monitor Access Key Usage This section describes how to use the operation audit and audit log transfer to LTS functions of CTS to monitor access key-related traces, and how to use the log alarm function of LTS to report alarms.
All regions Example traces Trace file integrity verification During a security audit, operation records will not be able to serve as effective and authentic evidence if they have been deleted or otherwise tampered with.
Before You Start Cloud Trace Service (CTS) is a log audit service designed to strengthen cloud security. It allows you to collect, store, and query resource operation records.
Commercial use 2 Interconnection with NAT Gateway You can record operations associated with NAT Gateway for later query, audit, and backtracking. Commercial use
Creating a Tracker Verifying trace file integrity During a security audit, operation records cannot serve as effective and authentic evidence if trace files have been deleted or tampered with.
After Transfer to OBS is enabled, audit logs can be periodically transferred to OBS buckets. Enable Create a cloud service agency. After enabling Transfer to OBS, you must select Create a cloud service agency.
Background Audit logs may need to be stored for 180 days for query and backtracking purposes. You can perform the following steps to configure the log retention period.
Other APIs Querying the Tracker Quota of a Tenant Querying All Operations on a Cloud Service Querying Audit Log Operators Checking Whether Data Can Be Transferred to the Configured OBS Bucket Querying the Resources Involved in the Traces Parent topic: V3 APIs (Recommended)
Connection with your own audit system: You can synchronize all audit logs to your audit system in real time to analyze the API calling success rate, unauthorized operations, security, and costs.
It is an essential part of security risk control for information systems in enterprises and public sectors, and is also necessary for compliance with many industry standards and audit specifications.