检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Typical Configuration of the Encryption Function Database encryption and access control encrypt sensitive data in the database to ensure data security. This example shows how to encrypt the database.
In the Add Decryption Task dialog box, set and encrypt the corresponding data information, including the asset name, schema name, and table name. Figure 3 Adding a decryption task Select Start Task. After the creation is complete, the decryption task is automatically started.
Therefore, you are not advised to encrypt the database table. Parent topic: System Function Configuration and Application Scenario Examples
In this case, the task is removed, but the system continues to encrypt data. Figure 4 Full encryption mode Query the database table again. The query result is encrypted data, as shown in Figure 5. Figure 5 Encrypted data Parent topic: Sensitive Data Discovery
In this scenario, the bypass plug-in can be used to encrypt and decrypt customers' ciphertext data in real time when a single point of failure (SPOF) occurs on the encryption device, ensuring quick service recovery.
Databases and Versions That Can Be Managed by Database Encryption After adding data assets (databases) to the system, you can identify sensitive data in the databases and encrypt, decrypt, and mask sensitive information.
Adding Data Assets After data assets (databases) are added to the system, you can identify, encrypt, decrypt, and mask sensitive data in the databases. This section uses the MySQL database as an example. Add data assets based on the site requirements.
In this case, the task is in the Removed state, but the system continues to encrypt data. Figure 3 Encryption task After the encryption is complete, only encrypted data can be queried by unauthorized users.
As shown in Figure 8, if you have renamed a database table, you are not advised to encrypt the table. Figure 8 Analysis and suggestions Parent topic: System administrator operation guide
In this case, encrypt the table first. For details about how to encrypt a table, see Configuring an Encryption Task. Figure 1 Adding a decrypted task Select Start Task. After the creation is complete, the decryption task is automatically started. Click Complete.