检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
合规” ecs-instance-in-vpc ECS资源属于指定虚拟私有云ID ecs,vpc 指定虚拟私有云ID,不属于此VPC的ECS资源,视为“不合规” ecs-instance-no-public-ip ECS资源不能公网访问 ecs ECS资源具有弹性公网IP,视为“不合规”
limit 否 Integer 最大的返回数量。 最小值:1 最大值:200 缺省值:200 marker 否 String 分页参数,通过上一个请求中返回的marker信息作为输入,获取当前页。 最小长度:4 最大长度:400 请求参数 表3 请求Body参数 参数 是否必选 参数类型
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
"regionid1", "count" : 5 } ] } ] }, { "provider" : "ecs", "types" : [ { "type" : "cloudservers", "regions" : [ {
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
CTS追踪器未通过KMS进行加密,视为“不合规” C.CS.FOUNDATION.G_3_1.R_1 使用密钥对安全登录 ECS ecs-instance-key-pair-login ECS资源配置密钥对 ecs ECS未配置密钥对,视为“不合规” C.CS.FOUNDATION.G_3_1.R_4 确保私有镜像开启了加密
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
轮换访问密钥可以通过创建两个访问密钥进行,将两个访问密钥作为一主一备,一开始先使用主访问密钥一,一段时间后,使用备访问密钥二,然后在控制台删除主访问密钥一,并重新生成一个访问密钥,在您的应用程序中定期轮换使用,详见定期修改身份凭证。 检测逻辑 IAM用户未配置AccessKey,视为“合规”。 IAM用户为“停用”状态,视为“合规”。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
当Config提供的系统内置预设策略不能满足检测资源合规性的需求时,您可以通过编写函数代码,添加组织类型的自定义策略来完成复杂场景的资源审计。 自定义策略是一个用户开发并发布在函数工作流(FunctionGraph)上的函数。将合规规则和函数相关联,函数接收Config发布的事件,从事件中接收到规
规则触发方式 配置变更 规则评估的资源类型 iam.users 规则参数 无 应用场景 确保IAM用户不能同时通过控制台和API访问云服务,同时赋予一个IAM用户两种访问方式将增加安全风险。访问方式分为如下两种: 编程访问:启用访问密钥,用户仅能通过API、CLI、SDK等开发工具访问华为云服务。
本文为您介绍如何通过配置审计服务查询未绑定指定标签的资源。 应用场景 企业上云后,云上创建的资源不断增加,有些大型企业资源数量达到十万、百万级别,一个账号内存在大量资源,企业需要进行分类管理。华为云推荐您使用标签对资源进行标记,进而实现资源的分组分类。通过标签对资源的业务归属、财务归属等
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted