检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Using an Existing OBS Bucket Through a Static PV Using an OBS Bucket Through a Dynamic PV Configuring OBS Mount Options Using a Custom Access Key (AK/SK) to Mount an OBS Volume Automatically Applying Updated Access Keys (AK/SK) for an OBS Volume Using OBS Buckets Across Regions Encrypting
The key used for encrypting an image cannot be changed. How Do I Check the Encryption Status of a Disk in an Encrypted Full-ECS Image? Access the IMS console. On the Private Images tab page, click an image name to go to its details page. Click the Backups tab.
Connection Information Management Setting Security Group Rules for a GeminiDB Redis Instance Viewing the IP Address and Port Number of a GeminiDB Redis Instance Changing the Port of a GeminiDB Redis Instance Binding an EIP to a GeminiDB Redis Instance Node Encrypting Data over SSL
events Distributed cluster-based deployment with 99.99% availability and strong disaster recovery (DR) Security and Reliability Connected to Identity and Access Management (IAM), Log Tank Service (LTS), Cloud Eye, and Cloud Trace Service (CTS) for secure event storage and access Encrypting
The key used for encrypting the cloud server is the same as that used for encrypting the image. An image created from an encrypted cloud server is also encrypted. The key used for encrypting the image is the same as that used for encrypting the cloud server.
Table 1 KMS operations supported by CTS Operation Resource Type Event Name Creating a key CMK createKey Creating a DEK CMK createDataKey Creating a plaintext-free DEK CMK createDataKeyWithoutPlaintext Enabling a key CMK enableKey Disabling a key CMK disableKey Encrypting a DEK CMK
DWS)'s Automatic Partition Management Feature Improving Development Efficiency by Leveraging GaussDB(DWS)'s View Decoupling and Rebuilding Function Best Practices for Using HStore Tables Best Practice of Converting a Time Series Table to an HStore Table Best Practices of GIN Index Encrypting
Encrypting data at rest Medium obs:::bucket N/A RGC-GR_RFS_OBS_BUCKET_VERSIONING_ENABLED_CHECK Requires versioning to be enabled for an OBS bucket.
Periodically back up data (VM internal backup, remote backup, and backup on and off the cloud) to protect data against encrypting ransomware attacks. Parent topic: Service Usage
Periodically back up data (VM internal backup, remote backup, and backup on and off the cloud) to protect data against encrypting ransomware attacks. Parent topic: Service Usage
Encrypting the plaintext of CEKs does not change the ciphertext of the encrypted columns. Syntax ALTER COLUMN ENCRYPTION KEY column_encryption_key_name WITH VALUES ( CLIENT_MASTER_KEY = client_master_key_name ); Parameters column_encryption_key_name Specifies the key name.
Encrypting the plaintext of CEKs does not change the ciphertext of the encrypted columns. Syntax ALTER COLUMN ENCRYPTION KEY column_encryption_key_name WITH VALUES ( CLIENT_MASTER_KEY = client_master_key_name ); Parameters column_encryption_key_name Specifies the key name.
Encrypting the plaintext of CEKs does not change the ciphertext of the encrypted columns. Syntax ALTER COLUMN ENCRYPTION KEY column_encryption_key_name WITH VALUES ( CLIENT_MASTER_KEY = client_master_key_name ); Parameters column_encryption_key_name Specifies the key name.
Encrypting the plaintext of CEKs does not change the ciphertext of the encrypted columns. Syntax ALTER COLUMN ENCRYPTION KEY column_encryption_key_name WITH VALUES ( CLIENT_MASTER_KEY = client_master_key_name ); Parameters column_encryption_key_name Specifies the key name.
Policies Configuring Hadoop Data Encryption During Transmission Configuring Kafka Data Encryption During Transmission Configuring HDFS Data Encryption During Transmission Configuring Spark Data Encryption During Transmission Configuring ZooKeeper Data Encryption During Transmission Encrypting
parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.
Table 1 Header fields used for encrypting objects in SSE-C mode Element Description x-obs-server-side-encryption-customer-algorithm Indicates the encryption algorithm for the object when SSE-C is used.
parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.
Figure 1 Network Mode Encrypting Data The system supports data encryption and integrity verification, meeting the evaluation requirements of graded protection and sub-protection as well as the evaluation requirements of storage data integrity and confidentiality assurance in the application
For details, see Encrypting and Decrypting Data Columns. Parent topic: Data Protection Technologies