正在生成
详细信息:
检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
规则类型,包括预定义合规规则(builtin)和用户自定义合规规则(custom) id String 规则ID。 name String 规则名称。 description String 规则描述。 policy_filter PolicyFilterDefinition object 规则过滤器。 period
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
objects 标签列表,没有标签默认为空数组 resource_name String 资源名称,资源没有名称时默认为空字符串,eip返回ip地址。 表8 ResourceTag 参数 参数类型 描述 key String 键。最大长度128个unicode字符。 key符合3
创建并启用CTS追踪器 规则详情 表1 规则详情 参数 说明 规则名称 cts-tracker-exists 规则展示名 创建并启用CTS追踪器 规则描述 账号未创建CTS追踪器,视为“不合规”。 标签 cts 规则触发方式 周期触发 规则评估的资源类型 account 规则参数
"organization_policy_assignment_name" : "allowed-images-by-id", "description" : "The ECS resource is non-compliant if the image it used is not in the
CTS追踪器启用事件分析 规则详情 表1 规则详情 参数 说明 规则名称 cts-lts-enable 规则展示名 CTS追踪器启用事件分析 规则描述 CTS追踪器未启用事件分析,视为“不合规”。 标签 cts 规则触发方式 配置变更 规则评估的资源类型 cts.trackers
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted