Updated on 2023-04-27 GMT+08:00

Overview

IMS allows you to create encrypted images to ensure data security.

To use the image encryption function, you must apply for KMS Administrator permissions. For details, see Creating a User and Granting Permissions.

Constraints

  • DEW must be enabled.
  • Encrypted images cannot be shared with others.
  • The system disk of an ECS created from an encrypted image is also encrypted, and its key is the same as the image key.
  • If an ECS has an encrypted system disk, private images created from the ECS are also encrypted.
  • The key used for encrypting an image cannot be changed.
  • If the key used for encrypting an image is disabled or deleted, the image is unavailable.