检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Protect audit logs and back them up periodically to avoid unexpected deletions, modifications, or overwriting.
CTS Logging account Centrally store and view audit logs and security-related logs (such as VPC flow logs and OBS access logs) of all accounts.
Moreover, periodically audit and rotate your credentials to reduce risks. Audit your identity providers and identities configured in IAM to ensure that only authorized identities can access your workloads. Use Data Encryption Workshop (DEW) to host credentials.
and VPC Endpoint (VPCEP) Enterprise Router (ER) Cloud Connect Cloud Firewall (CFW) protects Internet and Virtual Private Cloud (VPC) borders on the cloud by real-time intrusion detection and prevention, global unified access control, full traffic analysis and visualization, log audit
Use DBSS to audit operations on databases. DBSS database audit provides the audit function in bypass mode.
Enabling audit logs: Enable audit logs to monitor account activities. This can help you detect abnormal behaviors and take measures in a timely manner.
It provides account, authorization, authentication, and audit management services that enable you to centrally manage cloud computing resources. CBH provides various functional modules, such as department, user, resource, policy, operation, and audit modules.
Database Security Service (DBSS): Based on machine learning and big data analytics technologies, DBSS can audit your databases, detect SQL injection attacks, and identify high-risk operations.
Auditability The ability to effectively monitor, record, and audit systems or data processing. Auditability is usually implemented by using technologies such as audit logs, audit tracing, monitoring systems, and audit tools.