检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
To ensure data security, anti-tampering, data privacy protection, encryption, audit, and data sovereignty protection mechanisms must be provided throughout the full lifecycle of data and model training, including data extraction, processing, transmission, training, inference, and
You can use the logs generated by CTS to perform security analysis, audit compliance, track resource changes, and locate faults. After you enable CTS and configure a tracker, CTS can record management and data traces of PanguLM for auditing.