检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For details, see Audit Logs. Parent topic: Security
Monitoring and Auditing Using Cloud Eye to Monitor DEW Using CTS to Audit DEW Using Config to Audit DEW
Figure 1 Adding an audit rule Click Next. On the displayed page, set Trigger Type and Execute Every. Click Next, confirm the information, and click Submit. You can view the added compliance rule in the rule list.
Using CTS to Audit DEW Operations supported by CTS Viewing CTS Traces in the Trace List Parent Topic: Monitoring and Auditing
Security Shared Responsibilities Asset Identification and Management Identity Authentication and Access Control Data Protection Technologies Audit and Logging Service Resilience Certificates
After the CTS service is enabled, you can view all generated traces to review and audit performed KMS operations. For details, see the Cloud Trace Service User Guide. IAM IAM provides permission management for DEW. Only users who have KMS Administrator permissions can use DEW.
In addition, it provides use records of all keys, meeting your audit and regulatory compliance requirements.
In addition, it provides use records of all keys, meeting your audit and regulatory compliance requirements.
Parent Topic: Using CTS to Audit DEW
In addition, it provides use records of all keys, meeting your audit and regulatory compliance requirements. Functions On the KMS console, you can: Create, query, enable, and disable CMKs, as well as schedule and cancel CMK deletion. Modify the alias and descriptions of CMKs.
If you choose envelope encryption, KMS will control access to keys and record all usages of and operations on keys with traceable logs, meeting your audit and regulatory compliance requirements.
In addition, it provides use records of all keys, meeting your audit and regulatory compliance requirements.
Clearing a private key Key pair clearPrivateKey Table 4 Dedicated HSM operations supported by CTS Operation Resource Type Event Name Purchasing an HSM instance HSM purchaseHsm Configuring an HSM instance HSM createHsm Deleting an HSM instance HSM deleteHsm Parent Topic: Using CTS to Audit
Check audit logs to determine the actual usage. For details, see Viewing CTS Traces in the Trace List. To delete a master key with replica key created, delete the replica key first.