检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
This relieves servers from decrypting or encrypting data. SSL encryption/decryption is performed on backend servers, compromising server performance.
For details, see Encrypting Data over SSL for a GeminiDB Influx Instance. For details about how to disable SSL, see Encrypting Data over SSL for a GeminiDB Influx Instance. Table 6 Tags Parameter Description Tags The setting is optional.
Table 7 SseKmsHeader Parameter Type Mandatory (Yes/No) Description encryption ServerEncryption Yes Explanation: SSE-KMS used for encrypting objects. Explanation: SSE-KMS is used for encrypting objects on the server side. Value range: kms. For details, see Table 9.
Default value: None sseKms str Explanation: SSE-KMS is used for encrypting objects on the server side.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
► SSL certificate management improves user privacy and payment data security by encrypting data transmission. ► Host Security Service (HSS) provides host-level protection, such as intrusion detection, antivirus, and patch management, and real-time monitoring to prevent service interruption
Preparations Before encrypting data in OBS, register a Huawei Cloud account and enable Huawei Cloud services. For details, see Signing Up for a HUAWEI ID and Enabling Huawei Cloud Services. If you have enabled Huawei Cloud, skip this step.
Certificate Source: source of a certificate for encrypting and authenticating HTTPS data transmission. If you select a TLS key, you must create a key certificate of the IngressTLS or kubernetes.io/tls type beforehand. For details, see Creating a Secret.
Value range: 40 GB to 2048 GB cmk_id No String Specifies a custom key used for encrypting an image. For its value, see the Key Management Service User Guide. tags No Array of strings Lists the image tags. This parameter is left blank by default.
Value range: 40 GB to 2048 GB cmk_id No String Specifies a custom key used for encrypting an image. For its value, see the Key Management Service User Guide. tags No Array of strings Lists the image tags. This parameter is left blank by default.
For details, see Encrypting Images. Constraints If you use a full-ECS image to create an ECS, the EVS disks associated with the full-ECS image do not support the function of creating disks from a data disk image.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Data security Encrypting data during transmission and storage, as well as embedding video watermarks, Also supporting dynamic privacy masking and end-to-end traceability further enhances the security and reliability of the data processing pipeline.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Using TDE RDS for SQL Server uses Transparent Data Encryption (TDE) to protect data at rest by encrypting data files and backup files. Encryption in TDE is transparent to applications and meets compliance requirements.