检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
If logging is not enabled for a dedicated APIG gateway, this gateway is considered non-compliant. as-group-elb-healthcheck-required as If an AS group is not using Elastic Load Balancing health check, this rule is noncompliant. cts-kms-encrypted-check cts If a CTS tracker is not encrypted
been stopped for longer than the time allowed, and no operations have been performed on it, this ECS is noncompliant. volume-unused-check evs If an EVS disk is not mounted to any cloud server, this disk is noncompliant. volumes-encrypted-check ecs, evs If a mounted EVS disk is not encrypted
Encrypted communication: Key pairs use asymmetric encryption technology to ensure SSH communication security and prevent man-in-the-middle (MITM) attacks. Solution On the management console, create a key pair and clear the password for an ECS. For details, see Key Pairs.
Solution Configure TLS security policies for encrypted communication. Rule Logic If a specified security policy is not configured for the HTTPS listener of a load balancer, this load balancer is non-compliant.
Encrypted communication: Key pairs use asymmetric encryption technology to ensure SSH communication security and prevent man-in-the-middle (MITM) attacks. Solution Create a key pair for the bare metal server on the management console and server's password.
Rule Rule Name C.CS.FOUNDATION.G_5_1.R_5 obs-bucket-ssl-requests-only OBS Buckets Should Deny Requests Not Encrypted with SSL C.CS.FOUNDATION.G_5_2.R_1 volumes-encrypted-check-by-default Disk Encryption Are Enabled C.CS.FOUNDATION.G_5_3.R_1 sfsturbo-encrypted-check KMS Encryption
System Data Security Login security: Image encryption, SSH remote login security hardening, kernel parameter security hardening, strong passwords for system accounts, and lockout of login after three consecutive login failures Data security: Encrypted sensitive information and independently
With a VPN gateway, a secure, reliable, and encrypted connection can be established between a VPC and an on-premises data center or between VPCs in different regions.
With a VPN gateway, a secure, reliable, and encrypted connection can be established between a VPC and an on-premises data center or between VPCs in different regions.
With a VPN gateway, a secure, reliable, and encrypted connection can be established between a VPC and an on-premises data center or between VPCs in different regions.
With a VPN gateway, a secure, reliable, and encrypted connection can be established between a VPC and an on-premises data center or between VPCs in different regions.
With a VPN gateway, a secure, reliable, and encrypted connection can be established between a VPC and an on-premises data center or between VPCs in different regions.
With a VPN gateway, a secure, reliable, and encrypted connection can be established between a VPC and an on-premises data center or between VPCs in different regions.
VPN VPN establishes a secure, encrypted communication tunnel between the VPN gateway of the VPC on HUAWEI CLOUD and the VPN gateway of your local data center, allowing you to directly use resources in the VPC through the VPN.
= authTokenArray && authTokenArray.length > 0) { authToken = authTokenArray[0]; } // Sort the remaining parameters and combine them to form the encrypted content.
You used an encrypted OBS bucket, but the agency assigned to the resource recorder did not contain related KMS permissions. For more details, see Storing Resource Change Notifications and Resource Snapshots to an Encrypted OBS Bucket.
Error cause: DAS does not allow you to connect to the database whose password is encrypted with SHA-256.
If you want to store resource change messages and resource snapshots in an OBS bucket encrypted using KMS, you will also need the KMS Administrator permission.
Status code: 400 Table 6 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection
The old key is not deleted, and it is used to decrypt data encrypted using the old key. After security information is modified, for example, a database user password is changed, the new password is encrypted using the new key.