Help Center/ Config/ User Guide/ Resource Compliance/ Built-In Policies/ Cloud Trace Service (CTS)/ CTS Trackers Comply with Security Best Practices
Updated on 2024-07-29 GMT+08:00

CTS Trackers Comply with Security Best Practices

Rule Details

Table 1 Rule details

Parameter

Description

Rule Name

cts-tracker-enabled-security

Identifier

cts-tracker-enabled-security

Description

If there is no tracker that complies with security best practices, the result is noncompliant.

Tag

cts

Trigger Type

Periodic

Filter Type

account

Rule Parameter

Regions: Regions where CTS trackers reside. If no regions are specified, this rule will be applied to all regions.

Rule Logic

  • If Verify Trace File, Encrypt Trace File, and Transfer to LTS are all enabled for a CTS tracker, this tracker is considered to comply with security best practices. For details, see Configuring a Tracker.
  • If there is a CTS tracker that complies with security best practices in any of the specified regions, the result is compliant. If no region is specified, this rule applies to all regions.
  • If there is no CTS tracker that complies with security best practices in any of the specified regions, the result is noncompliant. If no region is specified, this rule applies to all regions.