检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Connecting to a Database (Using SSL) When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
You may use existing CMKs or create new CMKs to encrypt disks. For details, see Key Management Service > Creating a CMK in the Data Encryption Workshop User Guide.
Creating a Secret Version Function Creates a new secret version in the specified secret to encrypt and keep the new secret value. By default, The latest secret version in SYSCURRENT state. The previous version is in the SYSPREVIOUS state.
It can be used to encrypt a small amount of data or DEKs. An asymmetric key is a RSA key or an ECC key pair (including SM2 key pair). It can be used for data encryption and decryption, digital signature, and signature verification.
Only enabled custom keys can be used to encrypt or decrypt data. A new custom key is in the Enabled state by default. Prerequisites The custom key you want to enable is in Disabled status. Procedure Log in to the management console.
File System Encryption SFS enables you to encrypt data on the new file systems as required. Keys for encrypting file systems are provided by Key Management Service (KMS), which is secure and convenient. You do not need to establish and maintain key management infrastructure.
File System Encryption You can encrypt data on the newly created file systems if needed. Keys used by encrypted file systems are provided by the Key Management Service (KMS), which is secure and convenient.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Connecting to an RDS for PostgreSQL Instance Through JDBC Although the SSL certificate is optional if you choose to connect to a database through Java database connectivity (JDBC), download an SSL certificate to encrypt the connections for security.
For symmetric keys, the same key is used to encrypt and decrypt data, which is fast and efficient, suitable for encrypting a large amount of data. For asymmetric keys, a key pair, that is, a public key and a private key, are used for encryption and decryption.
The value can contain up to 128 characters. type Yes String Configuration file format. yaml properties sensitive Yes Boolean Whether to encrypt the configuration file. true: Encrypt. false: Not encrypt.
You can create custom keys on KMS to encrypt your objects. If you do not specify a key, OBS creates a default key the first time you upload an object to the bucket. Custom keys or default keys are used to encrypt and decrypt data encryption keys (DEKs).
Encrypting Data in RDS When a user purchases a database instance from Relational Database Service (RDS), the user can select Disk encryption and use the key provided by KMS to encrypt the disk of the database instance.
Enabling or Disabling Encrypted Backup Scenarios GaussDB(for MySQL) can encrypt backups. After encrypted backup is enabled, a key is required, which is generated and managed by Data Encryption Workshop (DEW).
Advantages Extensive Service Integration By integrating with OBS, EVS, and IMS, you can use KMS to manage the keys of the services or use KMS APIs to encrypt and decrypt local data.
Data Protection Encryption SFS Turbo supports server-side encryption, which allows you to encrypt the data stored in SFS Turbo file systems. When data is accessed, SFS Turbo automatically decrypts the data and returns it to you.
Encrypting Data in OBS When using Object Storage Service (OBS) to upload data with server-side encryption, you can select SEE-KMS encryption and use the key provided by KMS to encrypt the files to be uploaded. For details, see Figure 1.