检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Server-Side Encryption Overview If you have any questions during development, post them on the Issues page of GitHub. For details about parameters and usage of each API, see API Reference. OBS supports server-side encryption. For more information, see Server-Side Encryption. Parent
Server-Side Encryption Overview If you have any questions during development, post them on the Issues page of GitHub. For details about parameters and usage of each API, see the API Reference. OBS provides server-side encryption for objects, so that they will be encrypted or decrypted
Rotating Encryption Keys If you have enabled the Encrypt DataStore function in Advanced Settings during cluster creation, you can rotate the encryption keys for the cluster after the cluster is created successfully. When a normal cluster is converted to an encrypted cluster, you can
Configuring SSL Encryption SSL is enabled by default when you create an RDS for PostgreSQL DB instance and cannot be disabled after the instance is created. SSL encryption ensures that all communications between a client and server are encrypted, preventing data leakage and tampering
HFile and WAL Encryption HFile and Write ahead log (WAL) in HBase are not encrypted by default. To encrypt them, perform the operations provided in this topic. Setting the HFile and WAL encryption mode to SMS4 or AES has a great impact on the system and will cause data loss in case
Configuring SSL Encryption SSL is enabled by default when you create an RDS for PostgreSQL DB instance and cannot be disabled after the instance is created. SSL encryption ensures that all communications between a client and server are encrypted, preventing data leakage and tampering
Creating an Encryption Task You can create an encryption task by creating an MPC client instance and configuring related parameters. Prerequisites You have purchased OBS and uploaded source videos for media processing in the region of MPC (for example, CN North-Beijing4) by referring
Querying Encryption Tasks Notes You can query encryption tasks by task ID, task status, time range, or page number, or perform compound query. If there are more than 10 records and the page number and maximum number of records on each page are not specified, 10 records are displayed
Canceling an Encryption Task Notes To cancel a task, you need to provide the task ID. The task to be canceled must be in the task queue. Ongoing or completed encryption tasks cannot be canceled. Core Code 1 2 3 4 5 // Send a request to MPC. DeleteEncryptTaskRequest req = new DeleteEncryptTaskRequest
HLS Encryption Settings Hotlink protection prevents unauthorized users from downloading and playing videos, but cannot prevent malicious paid users from downloading videos to their local PCs for secondary distribution. For this purpose, VOD provides HLS encryption. Encrypted videos
Setting Encryption Parameters Set ciphertext encoding mode after encryption. The encoding mode can be hexadecimal or BASE64. If you want to support fuzzy search, the encryption parameter must be set to hexadecimal format. Constraint You can change the ciphertext encoding mode only
Configuring an Encryption Task If you are familiar with the database table structure, add it on the Encryption Task Management page. After encryption is configured, unauthorized users can view only the ciphertext when querying the database information. If you are not familiar with
Data Encryption and Decryption Setting Encryption Parameters Checking the Encryption Algorithm Simulated Encryption Test Configuring an Encryption Task Managing Authorization Simulated Decryption Test Configuring a Decryption Task Encryption Table Management Rolling Back the Table
Checking the Encryption Algorithm After a key is initialized, the system generates the corresponding encryption algorithm. You can view the encryption algorithms supported by the system on the View Algorithm page. Prerequisites Ensure that the key has been initialized. For details
Simulated Encryption Test Before configuring the encryption task, you are advised to perform a simulated encryption test to check whether the encryption is normal. Procedure Log in to a database encryption and access control instance as the sysadmin user. In the navigation tree, choose
Encryption Table Management For encrypted tables, functions such as Edit Index and Edit Non-encrypted Column are supported on the web page. Editing Index When the data volume is large (for example, more than 10 million rows), querying encrypted columns is time-consuming. You can add
Data Encryption Workshop Key Status Check Key Rotation Has Been Enabled CSMS Secrets Are Rotated CSMS Secrets Have Enabled Automatic Rotation CSMS Secrets Have Been Configured with Specified KMS Keys CSMS Secrets Have Been Rotated Within the Specified Period Parent topic: Built-In
KMS Encryption Check Rule Details Table 1 Rule details Parameter Description Rule Name dws-enable-kms Identifier dws-enable-kms Description If KMS encryption is not enabled for a DWS cluster, this cluster is noncompliant. Tag dws Trigger Type Configuration change Filter Type dws.clusters
Disk Encryption Are Enabled Rule Details Table 1 Rule details Parameter Description Rule Name volumes-encrypted-check-by-default Identifier volumes-encrypted-check-by-default Description If an EVS disk is not encrypted, this disk is noncompliant. Tag evs Trigger Type Configuration
Backup Encryption Check Rule Details Table 1 Rule details Parameter Description Rule Name cbr-backup-encrypted-check Identifier cbr-backup-encrypted-check Description If a CBR backup is not encrypted, this backup is noncompliant. Tag cbr Trigger Type Configuration change Filter Type