检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
It is recommended that you view locked or encrypted objects in an isolated forensic environment, for example, removing network access permissions from infected ECS instances. Delete all malware identified during forensic analysis and identify intrusion metrics.
Enabling Encrypted Storage of Log Files When dumping audit logs to OBS, you can configure encrypted storage to prevent unauthorized access to files.
AK/SK authentication: Requests are encrypted using AK/SK pairs. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.
No Yes Storage SecMaster uses encryption algorithms to encrypt users' sensitive data and stores encrypted data. Emails are encrypted before storage. Login locations are not sensitive data and stored in plaintext.
One-click Blocking WAF clear Non-domain Policy Unified buy CIS_Creating a VPC Flow Log Policy Management – Policy Delivery IAM Decapsulation CIS_Enabling Log File Integrity Verification CIS_Configuring an ACL Alert statistics Notify Server vulnerability notification CIS_Enabling Encrypted
sensitive_data_type String[] Sensitive data type privacy_detail String Personal privacy data details file_type String File type mimetypes String File type rule_list List<Map<String,String>> List of matched rules keyword String Keyword for matching sensitive data rules available_zone String AZ encrypted
penetration scan Encrypted Penetration Scan Encrypted penetration scan Common scan event General Scanner Common scan event Database detection Database Recon Database detection Mail detection Mail Recon Mail detection Server scan Host Scan Server scan Combined detection Misc Recon
string true No Encrypted SASL mechanism sasl_mechanism string PLAIN No sasl_mechanism Set sasl_jaas_config based on the Kafka specifications.
Protection for data in transit Data is encrypted when it is transmitted between microservices to prevent leakage or tampering during transmission. SecMaster keeps your configuration data secure as the configuration data is transmitted over HTTPS.