检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
You can view audit logs of the last seven days in CTS. In addition, you can configure key event notifications. With CTS, you can monitor high-risk and sensitive operations related to IAM in real time.
This section describes the regular expressions of the following log files: Log4J Log Log4J Audit Log Tomcat Log Django Log Apache Server Log Log4J Log Log sample: 2018-01-11 08:50:59,001 INFO [org.apache.sqoop.core.SqoopConfiguration.configureClassLoader(SqoopConfiguration.java:251
This section describes the regular expressions of the following log files: Log4J Log Log4J Audit Log Tomcat Log Django Log Apache Server Log Log4J Log Log sample: 2018-01-11 08:50:59,001 INFO [org.apache.sqoop.core.SqoopConfiguration.configureClassLoader(SqoopConfiguration.java:251
Sensitive data identification, classification, privacy protection, resource permission control, encrypted data transmission, encrypted storage, data risk identification, and compliance audit help users establish a security warning mechanism and enhance the overall security protection
With CTS, you can query, audit, and backtrack those operations.
Audit Log Viewing Traces Key Operations Recorded by CTS
With CTS, you can query, audit, and backtrack those operations.
With CTS, you can query, audit, and backtrack those operations.
With CTS, you can query, audit, and backtrack those operations.
With CTS, you can query, audit, and backtrack those operations.
Data Security Operations Viewing Audit Logs Diagnosing Data Security Risks Viewing Owners of Table Permissions (Table Permission View) (Advanced Feature) Viewing User Permissions (Member Permission View) (Advanced Feature) Parent topic: DataArts Security
With CTS, you can query, audit, and backtrack those operations.
CTS DataArts Studio uses Cloud Trace Service (CTS) to audit users' non-query operations on the management console to ensure that no invalid or unauthorized operations have been performed. CTS enhances security.
Parent topic: Audit Log
Permission audit: Administrators can quickly and easily view the personnel with the corresponding database table permissions and perform audit management. Permission revoking and returning: Administrators can revoke user permissions in a timely manner.
Security Shared Responsibilities Asset Identification and Management Identity Authentication and Access Control Data Protection Technologies Audit and Logging Service Resilience Security Risk Monitoring Recovery from Failures Update Management Certificates
To audit access to GaussDB(DWS) data sources, ensure that the following conditions are met: The audit function has been enabled for GaussDB(DWS) clusters. The audit function is enabled by default.
Audit Log If Audit Log is set to Enabled, logs are recorded. The log content includes the client access time, client IP address, client user, and resource operation result. Policy Name Policy name is mandatory.
Key Operations Recorded by CTS Management Center Operations Key CDM Operations Recorded by CTS DataArts Architecture Operations DataArts Factory Operations DataArts Quality Operations DataArts Catalog Operations DataArts DataService Operations Parent topic: Audit Log
With CTS, you can query, audit, and backtrack those operations.