检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Retrieval Audit logs of access behaviors are recorded on the Retrieval page and sorted by request time. You can search for and view audit logs of various access behaviors on this page and configure protection and audit policies.
Backup and Restoration Backing Up Audit Logs and Configuration Data Restoring Audit Logs and Configuration Data Parent Topic: System Management
Enabling database audit Click Enable Audit in the Operation column of the asset list to enable audit for OBS assets. After this function is enabled, you can view audit records in OBS Usage Audit. Enabling this function will incur additional request fees.
Approval and audit: Secure approval and authorization in advance, and retain data transfer logs for audit purposes.
Security Shared Responsibilities Identity Authentication and Access Control Data Protection Technologies Audit Logs Fault Recovery Update Management
Data Security Operations Viewing the Security Awareness Dashboard Viewing Data Transfer Details Event Management Alarm Management OBS Usage Audit Watermarks
Audit Administrator: Responsible for auditing, tracing, analyzing, and supervising the actions of the system administrator and security administrator.
The application audit function records and audits various information about application requests, helping customers improve the accuracy of the audited contents. Parent Topic: API Data Security Protection
Protection Instance and Binding It to an EIP API Data Security Protection Overview Function and Features Applicable Scenarios Instance Management Logging In to the Instance Web Console System Administrator Operation Guide Operation Guide for Security Administrators Operation Guide for Audit
If there is an errored alarm, you can configure audit and protection policies based on the alarm. For details, see Configuring a Policy on the Alerts Page. Parent Topic: Alerts
Event Management √ √ OBS Usage Audit DSC detects OBS buckets based on sensitive data identification rules and monitors identified sensitive data.
If no topics have been, the default notification is used for data usage audit alarms. Figure 1 Configuring alarm notifications Table 1 Alarm notification parameters Parameter Description Status Whether notification is enabled. : enabled. : disabled.
Viewing Data Transfer Details Full-link cloud data flow monitoring includes the following phases: Analyze the transfer paths between the cloud database, the data source, and the destination host based on the database audit logs.
Policy management: The administrator creates policies for database audit, encryption, watermarking, static masking, and dynamic masking on the policy management page of the policy center, and then deploys these policies to the relevant services or instances.
Access requests that match a denylist will be directly blocked, and the risk severity level of the corresponding audit logs will be marked as Illegal.
On the Sensitive Data page, view the sensitive data audit information. Figure 1 Sensitive Data Table 1 Sensitive data Area Description Sensitive Data Statistics Sensitive Data Type: the total amount of sensitive data by type and the new sensitive data on the current day by type.
Alarm Level There are 5 alarm severity levels: Suggestion Low Medium High Critical Subcategory/Category Alarm source types are as follows: Database attacks API attacks Source Database Audit instances Status The status options are: Open Blocked Closed Affected Assets Affected database
For details about how to enable DBSS, see Purchasing Database Audit . Enabling Transfer Log Collection Log in to the DSC console. Click in the upper left corner of the management console and select a region or project.
Additionally, it includes data security functions such as application access security log audit, risk identification, and situation analysis, ensuring data security for the normal use and transfer of service data in the application system.
Audit Manager audadmin Audits, traces, analyzes, supervises, and checks the operations of system administrators and security administrators.