Best Practices for Static Data Encryption
The following table lists the rules and solutions included in this conformance package template.
Rule |
Cloud Service |
Description |
---|---|---|
cbr-backup-encrypted-check |
cbr |
If a CBR backup is not encrypted, this backup is noncompliant. |
css-cluster-disk-encryption-check |
css |
If disk encryption is not enabled for a CSS cluster, this cluster is noncompliant. |
cts-kms-encrypted-check |
cts |
If a CTS tracker does not have KMS encryption enabled, this tracker is noncompliant. |
dws-enable-kms |
dws |
If KMS encryption is not enabled for a DWS cluster, this cluster is noncompliant. |
gaussdb-nosql-enable-disk-encryption |
gemini db |
If a GeminiDB instance does not have disk encryption enabled, this instance is noncompliant. |
ims-images-enable-encryption |
ims |
If a private image does not have encryption enabled, this image is noncompliant. |
kms-rotation-enabled |
kms |
If key rotation is not enabled for a KMS key, this key is noncompliant. |
mrs-cluster-encrypt-enable |
mrs |
If KMS encryption is not enabled for an MRS cluster, this cluster is noncompliant. |
rds-instances-enable-kms |
rds |
If KMS encryption is not enabled for an RDS instance, this instance is noncompliant. |
sfsturbo-encrypted-check |
sfsturbo |
If KMS encryption is not enabled for an SFS Turbo file system, this file system is noncompliant. |
volumes-encrypted-check |
ecs, evs |
If a mounted EVS disk is not encrypted, this disk is noncompliant. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot