检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Data Usage Audit Which Types of Abnormal Events Can Be Identified by DSC? How Do I Audit DSC Operation Records?
For details, see Viewing Audit Logs. Parent topic: Security
The OBS audit function has been enabled in the asset center. After OBS audit is enabled, you will be charged for reading and writing logs using the logging function of OBS. For details about the fees, see Requests. Sensitive data of OBS assets has been identified.
How Do I Audit the Operation Records of DSC? Does Data Masking Affect My Raw Data? How Is DSC Billed?
Data Security Operations Viewing the Security Awareness Dashboard Viewing Data Transfer Details Event Management Alarm Management OBS Usage Audit Watermarks Parent Topic: Common Data Security Protection
How Do I Audit DSC Operation Records? All operations performed on DSC are recorded as API calls in CTS. and you can view all the records on the CTS console for auditing. For details about how to view audit logs, see Viewing Audit Logs. Parent topic: Data Usage Audit
Event Management √ √ OBS Usage Audit DSC detects OBS buckets based on sensitive data identification rules and monitors identified sensitive data.
Security Shared Responsibilities Identity Authentication and Access Control Data Protection Technologies Audit Logs Fault Recovery Update Management Certificates
Parent topic: Data Usage Audit
Data Asset Protection Overview Data asset protection provides data masking, data watermarking, database audit, database encryption, cloud bastion host, and API data security protection to ensure your asset security. You can purchase and use these services as required.
Policy management: The administrator creates policies for database audit, encryption, watermarking, static masking, and dynamic masking on the policy management page of the policy center, and then deploys these policies to the relevant services or instances.
Alarm Level There are 5 alarm severity levels: Suggestion Low Medium High Critical Subcategory/Category Alarm source types are as follows: Database attacks API attacks Source Database Audit instances Status The status options are: Open Blocked Closed Affected Assets Affected database
Approval and audit: Secure approval and authorization in advance, and retain data transfer logs for audit purposes.
Viewing Data Transfer Details Full-link cloud data flow monitoring includes the following phases: Analyze the transfer paths between the cloud database, the data source, and the destination host based on the database audit logs.
Event Management DSC integrates with key security components, including Database Audit, and Cloud Bastion Host, enabling centralized event management and real-time event delivery to DSC. This allows users to promptly verify and handle events.
For details about how to enable DBSS, see Purchasing Database Audit . Enabling Transfer Log Collection Log in to the management console. Click in the upper left corner of the management console and select a region or project. In the navigation pane on the left, click .
After enabling CTS, you can view all generated traces to review and audit performed DSC operations. For details, see Cloud Trace Service User Guide. Table 1 lists DSC operations recorded by CTS.
Select the Database audit policy type. Click Start configuring. The page for configuring the database audit policy type is displayed. Set the parameters by referring to Table 1.
If no topics have been, the default notification is used for data usage audit alarms. Figure 1 Configuring alarm notifications Table 1 Alarm notification parameters Parameter Description Status Whether notification is enabled. : enabled. : disabled.
Enabling database audit Click Enable Audit in the Operation column of the asset list to enable audit for OBS assets. After this function is enabled, you can view audit records in OBS Usage Audit. Enabling this function will incur additional request fees.