检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Connecting to a Database in SM-based TLS Mode When connecting to the GaussDB server through JDBC, you can enable SM-based TLS to encrypt the communication between the client and server. This mode provides a highly secure channel for sensitive data transmission on the Internet.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encrypting an OBS Volume You can use server-side encryption to encrypt data uploaded to OBS, enhancing storage security and compliance. The OBS server encrypts objects before storing them and decrypts them when accessed, returning the decrypted data to the client.
File System Encryption SFS enables you to encrypt data on the new file systems as required. Keys for encrypting file systems are provided by Key Management Service (KMS), which is secure and convenient. You do not need to establish and maintain key management infrastructure.
Connecting to an RDS for PostgreSQL Instance Through JDBC Although the SSL certificate is optional if you choose to connect to a database through Java database connectivity (JDBC), download an SSL certificate to encrypt the connections for security.
You can determine whether to encrypt new data disks, but cannot change the encryption setting of existing data disks.
The value can contain up to 128 characters. type Yes String Configuration file format. yaml properties sensitive Yes Boolean Whether to encrypt the configuration file. true: Encrypt. false: Not encrypt. config_encryption No Object Set the encryption key in the configuration file.
For symmetric keys, the same key is used to encrypt and decrypt data, which is fast and efficient, suitable for encrypting a large amount of data. For asymmetric keys, a key pair, that is, a public key and a private key, are used for encryption and decryption.
Data Protection Encryption SFS Turbo supports server-side encryption, which allows you to encrypt the data stored in SFS Turbo file systems. When data is accessed, SFS Turbo automatically decrypts the data and returns it to you.
It can be used to encrypt a small amount of data or DEKs. An asymmetric key is a RSA key or an ECC key pair (including SM2 key pair). It can be used for data encryption and decryption, digital signature, and signature verification.
Advantages Extensive Service Integration By integrating with OBS, EVS, and IMS, you can use KMS to manage the keys of the services or use KMS APIs to encrypt and decrypt local data.
File System Encryption You can encrypt data on the newly created SFS Turbo file systems if needed. Keys used by encrypted file systems are provided by the Key Management Service (KMS), which is secure and convenient.
Connecting to a Database in SM-based TLS Mode When connecting to a GaussDB server through JDBC, you can enable SM-based TLS to encrypt communication between a client and a server. This mode provides a highly secure channel for sensitive data transmission on the Internet.
You need to call APIs to encrypt and decrypt a large amount of data.
HTTP does not encrypt data in transmit, so confidential information, such as passwords, accounts, and transaction records, transmitted over HTTP is plaintext and easy to be leaked, stolen, or tampered with anytime. HTTP is insecure for transmitting private information.
For details about how to encrypt or decrypt a large amount of data, see Encrypting or Decrypting a Large Amount of Data. Parent topic: KMS
When connecting to an instance, clients can use the CA root certificates downloaded from the management console to authenticate the instance server and encrypt data during transmission. DCS Redis for 4.0/5.0 only support plaintext transmission.