Updated on 2024-08-21 GMT+08:00

Security

Data Collection

  • Controlled collection duration: Collection tasks run for a limited period. This prevents collection tasks from occupying system resources for too long.
  • Encrypted storage of credentials: All credentials used for data collection are encrypted to ensure security. Credentials used for online collection are only stored on MgC.
  • Least privilege principle: The principle of least privilege is enforced not matter which collection method is used.
  • MgC permissions control: To use MgC or access the data collected by MgC, you must have certain permissions. For details, see Permissions Management.
  • Transparency of collection items: You can see what data MgC collects in Collection Items.

Local Data Export

  • Audit logs: Export actions are logged. You can use these logs to audit and trace export actions.
  • Transparency of exported data: You can view what data is exported in Collection Items.

Data Upload

  • Encrypted transmission: When data is uploaded to MgC, an encrypted channel is used to protect data in transit.
  • Channel authentication: You must be authenticated before you can upload data to MgC. This enhances data transmission security.
  • Audit logs: Upload actions are logged. You can use these logs for auditing and tracing.
  • Least privilege principle: The principle of least privilege is enforced not matter which collection method is used.
  • MgC permissions control: To use MgC or access the data collected by MgC, you must have certain permissions. For details, see Permissions Management.

Online Data Storage

  • Encrypted storage of credentials: All credentials used for data collection are encrypted to ensure security. Credentials used for online collection are only stored on MgC.
  • Data storage isolated by tenant: Data stored on MgC is isolated by tenant. Other tenants cannot access your data.
  • Transparent data storage: You can view what data is collected and stored in Collection Items.

Data Analysis and Presence

  • Audit logs: All query actions are logged to ensure action traceability and transparency.
  • Least privilege principle: The principle of least privilege is enforced not matter which collection method is used.
  • MgC permissions control: To use MgC or access the data collected by MgC, you must have certain permissions. For details, see Permissions Management.