Help Center/ Config/ User Guide/ Conformance Packages/ Conformance Package Templates/ Best Practices for Static Data Encryption
Updated on 2024-12-10 GMT+08:00

Best Practices for Static Data Encryption

The following table lists the rules and solutions included in this conformance package template.

Table 1 Conformance package description

Rule

Cloud Service

Description

cbr-backup-encrypted-check

cbr

If a CBR backup is not encrypted, this backup is noncompliant.

css-cluster-disk-encryption-check

css

If disk encryption is not enabled for a CSS cluster, this cluster is noncompliant.

cts-kms-encrypted-check

cts

If a CTS tracker does not have KMS encryption enabled, this tracker is noncompliant.

dws-enable-kms

dws

If KMS encryption is not enabled for a DWS cluster, this cluster is noncompliant.

gaussdb-nosql-enable-disk-encryption

gemini db

If a GeminiDB instance does not have disk encryption enabled, this instance is noncompliant.

ims-images-enable-encryption

ims

If a private image does not have encryption enabled, this image is noncompliant.

kms-rotation-enabled

kms

If key rotation is not enabled for a KMS key, this key is noncompliant.

mrs-cluster-encrypt-enable

mrs

If KMS encryption is not enabled for an MRS cluster, this cluster is noncompliant.

rds-instances-enable-kms

rds

If KMS encryption is not enabled for an RDS instance, this instance is noncompliant.

sfsturbo-encrypted-check

sfsturbo

If KMS encryption is not enabled for an SFS Turbo file system, this file system is noncompliant.

volumes-encrypted-check

ecs, evs

If a mounted EVS disk is not encrypted, this disk is noncompliant.