Updated on 2024-08-21 GMT+08:00
Security
Data Collection
- Controlled collection duration: Collection tasks run for a limited period. This prevents collection tasks from occupying system resources for too long.
- Encrypted storage of credentials: All credentials used for data collection are encrypted to ensure security. Credentials used for online collection are only stored on MgC.
- Least privilege principle: The principle of least privilege is enforced not matter which collection method is used.
- MgC permissions control: To use MgC or access the data collected by MgC, you must have certain permissions. For details, see Permissions Management.
- Transparency of collection items: You can see what data MgC collects in Collection Items.
Local Data Export
- Audit logs: Export actions are logged. You can use these logs to audit and trace export actions.
- Transparency of exported data: You can view what data is exported in Collection Items.
Data Upload
- Encrypted transmission: When data is uploaded to MgC, an encrypted channel is used to protect data in transit.
- Channel authentication: You must be authenticated before you can upload data to MgC. This enhances data transmission security.
- Audit logs: Upload actions are logged. You can use these logs for auditing and tracing.
- Least privilege principle: The principle of least privilege is enforced not matter which collection method is used.
- MgC permissions control: To use MgC or access the data collected by MgC, you must have certain permissions. For details, see Permissions Management.
Online Data Storage
- Encrypted storage of credentials: All credentials used for data collection are encrypted to ensure security. Credentials used for online collection are only stored on MgC.
- Data storage isolated by tenant: Data stored on MgC is isolated by tenant. Other tenants cannot access your data.
- Transparent data storage: You can view what data is collected and stored in Collection Items.
Data Analysis and Presence
- Audit logs: All query actions are logged to ensure action traceability and transparency.
- Least privilege principle: The principle of least privilege is enforced not matter which collection method is used.
- MgC permissions control: To use MgC or access the data collected by MgC, you must have certain permissions. For details, see Permissions Management.
Parent topic: Collection Security
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot