检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
DROP COLUMN ENCRYPTION KEY Description Drops a CEK. Precautions Only the CEK owner or a user who has been granted the DROP permission can run this command. System administrators have this permission by default. Syntax 1 DROP COLUMN ENCRYPTION KEY [ IF EXISTS ] client_column_key_name
SEC07-04 Static Data Encryption Encryption prevents unauthorized users from accessing and stealing data. Sensitive static data should be encrypted by default to ensure confidentiality even if the data is accessed or disclosed without authorization. Risk level High Key strategies Enable
SEC07-05 Transmission Data Encryption Encrypt data during transmission to prevent data from being stolen, tampered with, or viewed by unauthorized users. Risk level High Key strategies Using encryption protocols: Ensure that secure encryption protocols are used to encrypt data and
Database Security Encryption Management Instance Management Database Security Encryption Instance Management System administrator operation guide Security Administrator Operation Guide Operation Guide for Audit Administrators
CREATE COLUMN ENCRYPTION KEY Description Creates a CEK that can be used to encrypt a specified column in a table. Precautions This syntax is specific to a fully-encrypted database. When using gsql to connect to a database server, you need to use the -C parameter to enable the fully-encrypted
DROP COLUMN ENCRYPTION KEY Description Deletes a column encryption key (CEK). Precautions Only the CEK owner or a user who has been granted the DROP permission can run this command. System administrators have this permission by default. Syntax 1 DROP COLUMN ENCRYPTION KEY [ IF EXISTS
CREATE COLUMN ENCRYPTION KEY Description Creates a CEK that can be used to encrypt a specified column in a table. Precautions This syntax is specific to a fully-encrypted database. When using gsql to connect to a database server, you need to use the -C parameter to enable the fully-encrypted
Querying SSL Encryption of an Instance Function This API is used to query SSL encryption of an instance. This API is only supported by DCS Redis 6.0 basic edition instances. Calling Method For details, see Calling APIs. URI GET /v2/{project_id}/instances/{instance_id}/ssl Table 1
DROP COLUMN ENCRYPTION KEY Description Deletes a column encryption key (CEK). Precautions Only the CEK owner or a user who has been granted the DROP permission can run this command. By default, the system administrator has this permission. Syntax 1 DROP COLUMN ENCRYPTION KEY [ IF
Project Parameter Encryption Check Rule Details Table 1 Rule details Parameter Description Rule Name cloudbuildserver-encryption-parameter-check Identifier cloudbuildserver-encryption-parameter-check Description If encryption is not enabled for custom parameters of a CodeArts project
Data Transmission Encryption Is Enabled Rule Details Table 1 Rule details Parameter Description Rule Name gaussdb-instance-ssl-enable Identifier gaussdb-instance-ssl-enable Description If a GaussDB instance does not have SSL enabled, this instance is noncompliant. Tag gaussdb Trigger
Data Transmission Encryption Is Enabled Rule Details Table 1 Rule details Parameter Description Rule Name gaussdb-mysql-instance-ssl-enable Identifier gaussdb-mysql-instance-ssl-enable Description If a TaurusDB instance does not have SSL enabled, this instance is noncompliant. Tag
Generating a Character String Encryption Files Function Generates character string encryption files on the IDE Daemon server, including the .secu and .store files. These two files are used during certificate replacement. Syntax IDE-daemon-client --key Parameter Table 1 Parameter description
Generating a Character String Encryption Files Function Generates character string encryption files on the IDE Daemon server, including the .secu and .store files. These two files are used during certificate replacement. Syntax IDE-daemon-client --key Parameter Table 1 Parameter description
API Operations Related to Server-Side Encryption This section lists the operations related to server-side encryption and describes HTTP protocols applicable to the operations. The following table describes the requirements on the transmission protocols used by the API operation related
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported. This
Using the Encryption Tool of the Flume Client You can use the encryption tool provided by the Flume client to encrypt some parameter values in the configuration file. Install the Flume client. Log in to the Flume client node and go to the client installation directory, for example
SSL Encryption Function Used by a Client Prerequisites Before enabling the SSL function on the client, ensure that the SSL function on the server has been enabled (ssl.mode.enable on the server has been set to true). The SSL function requires APIs. For details, see Safety Instructions
Configuring Hive Data Storage and Encryption Using HDFS Colocation to Store Hive Tables Configuring Cold-Hot Separation for Hive Partition Metadata Hive Supporting ZSTD Compression Formats Configuring the Hive Column Encryption Parent topic: Using Hive
Using the Encryption Tool of the Flume Client You can use the encryption tool provided by the Flume client to encrypt some parameter values in the configuration file. Install the Flume client. Log in to the Flume client node and go to the client installation directory, for example