检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
When creating an ECS, you can encrypt its system disk. When creating an ECS, you can encrypt added data disks. For more information about EVS disk encryption, see EVS Encryption.
DEW uses a data encryption key (DEK) to encrypt data and uses a customer master key (CMK) to encrypt the DEK. Figure 1 Data encryption process Table 1 describes the keys involved in the data encryption process.
KMS uses a data encryption key (DEK) to encrypt data and uses a customer master key (CMK) to encrypt the DEK. Figure 1 Data encryption process Table 1 describes the keys involved in the data encryption process.
DEW uses a data encryption key (DEK) to encrypt data and uses a customer master key (CMK) to encrypt the DEK. Figure 1 Data encryption process Table 1 describes the keys involved in the data encryption process.
You can choose to encrypt the system disk of an ECS during OS reinstallation. Constraints The EVS disk quotas must be greater than 0. If the target ECS is created using a private image, ensure that the private image is available.
You can choose to encrypt the system disk of an ECS during OS reinstallation. Constraints The EVS disk quotas must be greater than 0. If the target ECS is created using a private image, ensure that the private image is available.
You can choose to encrypt the system disk of an ECS during OS reinstallation. Constraints The EVS disk quotas must be greater than 0. If the target ECS is created using a private image, ensure that the private image is available. Prerequisites The target ECS is stopped.
You can choose to encrypt the system disk of an ECS during OS change.
You can choose to encrypt the system disk of an ECS during OS change.
The data security administrator uses KMS keys to encrypt a piece of sensitive data, for example, bank card information. For details, see Example 1: Encrypting or Decrypting Small Volumes of Data.