Esta página ainda não está disponível no idioma selecionado. Estamos trabalhando para adicionar mais opções de idiomas. Agradecemos sua compreensão.
Elective Governance Policies
*
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_REGULAR_MATCHING_OF_NAMES |
Checks whether a resource name matches a regular expression pattern. This policy is non-compliant if the resource name does not match. |
Protecting configurations |
Low |
* |
|
RGC-GR_CONFIG_RESOURCE_IN_ENTERPRISE_PROJECT |
Checks whether a resource is for a specified enterprise project. This policy is non-compliant if the resource is not for a specified enterprise project. |
Protecting configurations |
Low |
* |
|
RGC-GR_CONFIG_RESOURCES_IN_ALLOWED_TYPES |
Checks whether a user creates a resource of an unspecified type. This policy is non-compliant if the user creates such resources. |
Protecting configurations |
Low |
* |
|
RGC-GR_CONFIG_RESOURCES_IN_NOT_ALLOWED_TYPES |
Checks whether a user creates a resource of a specified type. This policy is non-compliant if the user creates such resources. |
Protecting configurations |
Low |
* |
|
RGC-GR_CONFIG_RESOURCES_IN_SUPPORTED_REGION |
Checks whether a resource is in a specified region. This policy is non-compliant if the resource is not in the specified region. |
Protecting configurations |
Low |
* |
APIG
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_APIG_INSTANCES_EXECUTION_LOGGING_ENABLED |
Checks whether a dedicated API gateway is configured with access logs. This policy is non-compliant if the gateway is not configured with access logs. |
Establishing logging and monitoring |
Medium |
apig:::instance |
N/A |
Auto Scaling
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_AS_CAPACITY_REBALANCING |
Checks whether the scaling policy of EQUILIBRIUM_DISTRIBUTE is applied when an AS group scales in or out. This policy is non-compliant if this scaling policy is not applied. |
Improving availability |
Medium |
as:::group |
N/A |
RGC-GR_CONFIG_AS_GROUP_ELB_HEALTHCHECK_REQUIRED |
Checks whether ELB health check is enabled for an AS group associated with load balancers. This policy is non-compliant if health check is not enabled. |
Improving availability |
Low |
as:::group |
N/A |
RGC-GR_CONFIG_AS_MULTIPLE_AZ |
Checks whether an auto scaling (AS) group is deployed in multiple AZs. This policy is non-compliant if the group is not deployed in multiple AZs. |
Improving availability |
Medium |
as:::group |
N/A |
RGC-GR_CONFIG_AS_GROUP_IPV6_DISABLED |
Checks whether an IPv6 shared bandwidth is assigned to an AS group. This policy is non-compliant if an IPv6 shared bandwidth is assigned. |
Optimizing costs |
Low |
as:::group |
N/A |
RGC-GR_RFS_AS_GROUP_MULTIPLE_AZ_CHECK |
Requires an AS group to have multiple AZs. |
Improving availability |
Medium |
as:::group |
N/A |
CBR
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_CBR_POLICY_MINIMUM_FREQUENCY_CHECK |
Checks whether the execution frequency of a backup policy is within the specified range. This policy is non-compliant if the frequency is lower than the specified range. |
Preparing for disaster recovery |
Medium |
cbr:::policy |
N/A |
RGC-GR_CONFIG_CBR_VAULT_MINIMUM_RETENTION_CHECK |
Checks whether a CBR vault has policies attached or has any policies that can be retained within the required number of days. This policy is non-compliant if the vault has no policies attached or has no such policies. |
Preparing for disaster recovery |
Medium |
cbr:::vault |
N/A |
CBR and ECS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ECS_PROTECTED_BY_CBR |
Checks whether an ECS has backup vaults attached. This policy is non-compliant if the ECS has no backup vaults attached. |
Preparing for disaster recovery |
Medium |
ecs:::instanceV1 |
N/A |
RGC-GR_CONFIG_ECS_LAST_BACKUP_CREATED |
Checks whether an ECS has a backup created within the specified time period. This policy is non-compliant if the ECS has a backup created beyond the specified time period. |
Preparing for disaster recovery |
Low |
ecs:::instanceV1 |
N/A |
CBR and EVS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_EVS_PROTECTED_BY_CBR |
Checks whether an EVS disk has backup vaults attached. This policy is non-compliant if the disk has no backup vaults attached. |
Preparing for disaster recovery |
Medium |
evs:::volume |
N/A |
RGC-GR_CONFIG_EVS_LAST_BACKUP_CREATED |
Checks whether an EVS disk has a backup created within the specified time period. This policy is non-compliant if the disk has a backup created beyond the specified time period. |
Preparing for disaster recovery |
Low |
evs:::volume |
N/A |
CBR and SFS Turbo
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_SFSTURBO_PROTECTED_BY_CBR |
Checks whether an SFS Turbo system has backup vaults attached. This policy is non-compliant if the system has no backup vaults attached. |
Preparing for disaster recovery |
Medium |
sfs:::turbo |
N/A |
CCE
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_CCE_CLUSTER_END_OF_MAINTENANCE_VERSION |
Checks whether a CCE cluster version is end of maintenance (EOM). This policy is non-compliant if the version is EOM. |
Managing vulnerabilities |
Medium |
cce:::cluster |
N/A |
RGC-GR_CONFIG_CCE_CLUSTER_OLDEST_SUPPORTED_VERSION |
Checks whether a CCE cluster is using the oldest supported version. This policy is non-compliant if the cluster is using the oldest supported version. |
Managing vulnerabilities |
Medium |
cce:::cluster |
N/A |
RGC-GR_CONFIG_ALLOWED_CCE_FLAVORS |
Checks whether the flavors of a CCE cluster match any of the specified flavors. This policy is non-compliant if the flavors do not match. |
Protecting configurations |
Low |
cce:::cluster |
|
RGC-GR_RFS_CCE_SECRETS_ENCRYPTED_CHECK |
Requires a CCE cluster to be encrypted using KMS keys. |
Encrypting data at rest |
Medium |
cce:::cluster |
N/A |
CCM
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_PCA_CERTIFICATE_AUTHORITY_ROOT_DISABLE |
Checks whether private root CAs are disabled. This policy is non-compliant if CAs are not disabled. |
Managing confidentiality |
Medium |
scm:::certificate |
N/A |
RGC-GR_CONFIG_PCA_ALGORITHM_CHECK |
Checks whether CCM uses a prohibited key algorithm or signature hash algorithm. This policy is non-compliant if CCM uses such algorithms. |
Encrypting data in transit |
High |
ccm:::privateCertificate |
Cloud Eye
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ALARM_ACTION_ENABLED_CHECK |
Checks whether Cloud Eye alarming is enabled. This policy is non-compliant if alarming is not enabled. |
Establishing logging and monitoring |
Medium |
ces:::alarmRule |
N/A |
RGC-GR_CONFIG_ALARM_RESOURCE_CHECK |
Checks whether a resource has specified metrics associated for alarming. This policy is non-compliant if the resource has no specified metrics associated. |
Establishing logging and monitoring |
Low |
ces:::alarmRule |
|
RGC-GR_CONFIG_ALARM_SETTINGS_CHECK |
Checks whether the settings of a specified metric meet the requirements. This policy is non-compliant if the requirements are not met. |
Establishing logging and monitoring |
Low |
ces:::alarmRule |
|
RGC-GR_RFS_CES_ALARM_ACTION_CHECK |
Requires an action to be configured for a Cloud Eye alarming state. |
Establishing logging and monitoring |
High |
ces:::alarmRule |
N/A |
RGC-GR_RFS_CES_ALARM_ACTION_ENABLED_CHECK |
Requires a Cloud Eye alarming action to be enabled. |
Establishing logging and monitoring |
Critical |
ces:::alarmRule |
N/A |
Cloud Eye and DEW
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ALARM_KMS_DISABLE_OR_DELETE_KEY |
Checks whether alarms are configured to monitor the operation of disabling KMS or scheduling to delete a key. This policy is non-compliant if no alarms are configured. |
Establishing logging and monitoring |
Critical |
ces:::alarmRule |
N/A |
Cloud Eye and OBS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ALARM_OBS_BUCKET_POLICY_CHANGE |
Checks whether alarms are configured to monitor the changes of OBS bucket policies. This policy is non-compliant if no alarms are configured. |
Establishing logging and monitoring |
Critical |
ces:::alarmRule |
N/A |
Cloud Eye and VPC
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ALARM_VPC_CHANGE |
Checks whether alarms are configured to monitor VPC changes. This policy is non-compliant if no alarms are configured. |
Establishing logging and monitoring |
High |
ces:::alarmRule |
N/A |
CFW
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_CFW_POLICY_RULE_GROUP_ASSOCIATED_CHECK |
Requires any firewall policy to be associated with a rule group. |
Controlling network access |
Medium |
cfw:::aclRule |
N/A |
CodeArts Deploy
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_CODEARTSDEPLOY_HOST_CLUSTER_RESOURCE_STATUS |
Checks whether a host cluster in the CodeArts project is available. This policy is non-compliant if the cluster is unavailable. |
Improving availability |
Low |
codeartsDeploy:::host |
N/A |
Config
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_TRACKER_CONFIG_ENABLED_CHECK |
Checks whether the resource recorder is enabled for an account. This policy is non-compliant if the resource recorder is not enabled. |
Establishing logging and monitoring |
Medium |
rms:::resourceRecorder |
N/A |
CSS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_CSS_CLUSTER_BACKUP_AVAILABLE |
Checks whether the snapshot function is enabled for a CSS cluster. This policy is non-compliant if this function is not enabled. |
Improving resiliency |
Medium |
css:::cluster |
N/A |
RGC-GR_CONFIG_CSS_CLUSTER_MULTIPLE_AZ_CHECK |
Checks whether a CSS cluster is deployed in multiple AZs for disaster recovery. This policy is non-compliant if the cluster is not deployed in multiple AZs. |
Improving availability |
Medium |
css:::cluster |
N/A |
RGC-GR_CONFIG_CSS_CLUSTER_MULTIPLE_INSTANCES_CHECK |
Checks whether a CSS cluster has multiple nodes deployed for disaster recovery. This policy is non-compliant if the cluster does not have multiple nodes deployed. |
Improving availability |
Medium |
css:::cluster |
N/A |
RGC-GR_CONFIG_CSS_CLUSTER_IN_VPC |
Checks whether a CSS cluster is in the specified VPC. This policy is non-compliant if the cluster is not in the specified VPC. |
Controlling network access |
Critical |
css:::cluster |
|
RGC-GR_CONFIG_CSS_CLUSTER_SLOWLOG_ENABLE |
Checks whether slow query log is enabled for a CSS cluster. This policy is non-compliant if this function is not enabled. |
Establishing logging and monitoring |
Medium |
css:::cluster |
N/A |
CTS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_MULTI_REGION_CTS_TRACKER_EXISTS |
Checks whether a CTS tracker has been created and enabled for the specified region list for an account. This policy is non-compliant if no trackers are created and enabled for the specified region list. |
Establishing logging and monitoring |
High |
cts:::tracker |
|
RGC-GR_CONFIG_CTS_OBS_BUCKET_TRACK |
Checks whether all CTS trackers in an account track specified OBS buckets. This policy is non-compliant if all trackers do not track specified OBS buckets. |
Establishing logging and monitoring |
High |
cts:::tracker |
|
RGC-GR_CONFIG_CTS_TRACKER_ENABLED_SECURITY |
Checks whether there are CTS trackers that comply with security best practices. This policy is non-compliant if no such trackers exist. |
Establishing logging and monitoring |
High |
cts:::tracker |
|
RGC-GR_RFS_CTS_LOG_FILE_VALIDATION_ENABLED_CHECK |
Requires log file verification to be enabled for a CTS tracker. |
Protecting data integrity |
High |
cts:::tracker |
N/A |
RGC-GR_RFS_CTS_LOGS_ENABLED_CHECK |
Requires a CTS tracker to be configured with an LTS log group. |
Establishing logging and monitoring |
Low |
cts:::tracker |
N/A |
DDS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_DDS_INSTANCE_HAMODE |
Checks whether a DDS instance matches the specified type. This policy is non-compliant if the instance does not match. |
Protecting configurations |
Low |
dds:::instance |
|
RGC-GR_CONFIG_DDS_INSTANCE_ENGINE_VERSION_CHECK |
Checks whether a DDS instance uses the specified version or higher. This policy is non-compliant if the instance uses an unspecified version or earlier. |
Managing vulnerabilities |
Low |
dds:::instance |
|
RGC-GR_RFS_DDS_INSTANCE_ENCRYPTED_CHECK |
Requires a DDS instance to be encrypted at rest. |
Encrypting data at rest |
Medium |
dds:::instance |
N/A |
DEW
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_DEW_KEY_ROTATION_ENABLED_CHECK |
Requires rotation to be configured for all KMS keys. |
Encrypting data at rest |
Medium |
kms:::key |
N/A |
RGC-GR_CONFIG_CSMS_SECRETS_AUTO_ROTATION_ENABLED |
Checks whether automatic rotation is enabled for CSMS secrets. This policy is non-compliant if automatic rotation is not enabled. |
Managing confidentiality |
Medium |
csms:::secret |
N/A |
RGC-GR_CONFIG_CSMS_SECRETS_PERIODIC_ROTATION |
Checks whether a CSMS secret is rotated within the specified number of days. This policy is non-compliant if the secret is not rotated within the specified number of days. |
Managing confidentiality |
Medium |
csms:::secret |
N/A |
RGC-GR_CONFIG_CSMS_SECRETS_USING_CMK |
Checks whether a CSMS secret uses the specified KMS keys. This policy is non-compliant if the secret does not use such keys. |
Encrypting data at rest |
High |
csms:::secret |
DMS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_KAFKA_MULTIPLE_AZ_CHECK |
Requires a Kafka instance to be configured in multiple AZs to achieve HA. |
Improving availability |
Low |
dms:::kafkaInstance |
N/A |
RGC-GR_RFS_ROCKETMQ_MULTIPLE_AZ_CHECK |
Requires a RocketMQ instance to be configured in multiple AZs to achieve HA. |
Improving availability |
Low |
dms:::rocketmqInstance |
N/A |
RGC-GR_RFS_RABBITMQ_MULTIPLE_AZ_CHECK |
Requires a RabbitMQ instance to be configured in multiple AZs to achieve HA. |
Improving availability |
Low |
dms:::rabbitmqInstance |
N/A |
RGC-GR_RFS_KAFKA_INSTANCE_TLS_CHECK |
Requires a Kafka instance to provide TLS connections for supported engines. |
Encrypting data in transit |
Medium |
dms:::kafkaInstance |
N/A |
RGC-GR_RFS_RABBITMQ_INSTANCE_TLS_CHECK |
Requires a RabbitMQ instance to provide TLS connections for supported engines. |
Encrypting data in transit |
Medium |
dms:::rabbitmqInstance |
N/A |
RGC-GR_RFS_ROCKETMQ_INSTANCE_TLS_CHECK |
Requires a RocketMQ instance to provide TLS connections for supported engines. |
Encrypting data in transit |
Medium |
dms:::rocketmqInstance |
N/A |
RGC-GR_RFS_RABBITMQ_DLQ_CHECK |
Requires all RabbitMQ queues to be configured with dead letter queues. |
Improving resiliency |
High |
dms:::rabbitmqInstance |
N/A |
DWS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_DWS_ENABLE_SNAPSHOT |
Checks whether automated snapshots are enabled for a DWS cluster. This policy is non-compliant if automated snapshots are not enabled. |
Improving resiliency |
Medium |
dws:::cluster |
N/A |
RGC-GR_CONFIG_DWS_MAINTAIN_WINDOW_CHECK |
Checks whether the O&M time window of a DWS cluster is consistent with the specified time window. This policy is non-compliant if the time window is not consistent with the specified one. |
Preparing for incident response |
Medium |
dws:::cluster |
N/A |
RGC-GR_CONFIG_DWS_ENABLE_LOG_DUMP |
Checks whether log dump is enabled for a DWS cluster. This policy is non-compliant if log dump is not enabled. |
Establishing logging and monitoring |
Medium |
dws:::cluster |
N/A |
RGC-GR_RFS_DWS_CLUSTER_ENCRYPTION_ENABLED_CHECK |
Requires all DWS clusters to be encrypted at rest. |
Encrypting data at rest |
Medium |
dws:::cluster |
N/A |
ECS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ALLOWED_ECS_FLAVORS |
Checks whether an ECS flavor matches the specified one. This policy is non-compliant if the flavor does not match. |
Protecting configurations |
Low |
ecs:::instanceV1 |
|
RGC-GR_CONFIG_ALLOWED_IMAGES_BY_NAME |
Checks whether the name of an ECS image matches one of the specified names. This policy is non-compliant if the image name does not match. |
Managing vulnerabilities |
High |
ecs:::instanceV1 |
|
RGC-GR_CONFIG_STOPPED_ECS_DATE_DIFF |
Checks whether the period during which no operations are performed on stopped ECSs exceeds the specified number of days. This policy is non-compliant if this period exceeds. |
Optimizing costs |
Medium |
ecs:::instanceV1ecs:::instanceV1 |
|
RGC-GR_CONFIG_ECS_ATTACHED_HSS_AGENTS_CHECK |
Checks whether an ECS has an HSS agent attached and has protection enabled. This policy is non-compliant if the ECS has no HSS agent attached and has no protection enabled. |
Managing vulnerabilities |
Medium |
ecs:::instanceV1 |
N/A |
ECS and IMS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ALLOWED_IMAGES_BY_ID |
Checks whether the image ID of an ECS matches one of the specified image IDs. This policy is non-compliant if the image ID does not match. |
Managing vulnerabilities |
High |
ecs:::instanceV1 |
|
RGC-GR_CONFIG_APPROVED_IMS_BY_TAG |
Checks whether an ECS uses any of the IMS images with the specified tag. This policy is non-compliant if the ECS does not use such images. |
Managing vulnerabilities |
Medium |
ecs:::instanceV1 |
EIP
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_EIP_USE_IN_SPECIFIED_DAYS |
Checks whether an EIP is bound to any instances in specified number of days. This policy is non-compliant if the EIP is not bound in specified number of days. |
Optimizing costs |
Medium |
vpc:::eipAssociate |
N/A |
ELB
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ELB_MULTIPLE_AZ_CHECK |
Checks whether the load balancer has registered with instances in multiple AZs. This policy is non-compliant if the load balancer has registered with instances in fewer than two AZs. |
Balancing loads |
Medium |
elb:::loadbalancer |
N/A |
RGC-GR_CONFIG_ELB_MEMBERS_WEIGHT_CHECK |
Checks whether the weight of a backend server is 0 and the load balancing algorithm used by its associated backend server group is not SOURCE_IP. This policy is non-compliant if the weight is 0 and the algorithm is not SOURCE_IP. |
Improving availability |
Low |
elb:::member |
N/A |
RGC-GR_RFS_ELB_PREDEFINED_SECURITY_POLICY_CHECK |
Requires a predefined security policy to be configured for the HTTPS listener of a dedicated load balancer. |
Controlling network access |
Medium |
elb:::listener |
N/A |
RGC-GR_RFS_LB_TLS_HTTPS_LISTENERS_ONLY_CHECK |
Requires HTTPS termination to be configured for the listener of a load balancer on a private network. |
Encrypting data in transit |
Medium |
lb:::listener |
N/A |
RGC-GR_RFS_ELB_TLS_HTTPS_LISTENERS_ONLY_CHECK |
Requires HTTPS termination to be configured for the listener of a dedicated load balancer application or a classic load balancer. |
Encrypting data in transit |
Medium |
elb:::listener |
N/A |
RGC-GR_RFS_ELB_DELETION_PROTECTION_ENABLED_CHECK |
Requires deletion protection to be activated for an application load balancer. |
Improving availability |
Medium |
elb:::loadbalancer |
N/A |
RGC-GR_RFS_ELB_MULTIPLE_AZ_CHECK |
Requires all classic load balancers to be configured in multiple AZs. |
Improving availability |
Medium |
elb:::loadbalancer |
N/A |
ER
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_ER_INSTANCE_AUTO_VPC_ATTACH_DISABLED_CHECK |
Requires an enterprise router to reject the creation of automatically accepted shared attachments. |
Controlling network access |
High |
er:::instance |
N/A |
EVS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_EVS_USE_IN_SPECIFIED_DAYS |
Checks whether an EVS disk is bound to any instances in specified number of days. This policy is non-compliant if the disk is not bound in specified number of days. |
Optimizing costs |
Medium |
evs:::volume |
N/A |
RGC-GR_CONFIG_VOLUME_UNUSED_CHECK |
Checks whether an EVS disk is attached to a cloud server. This policy is non-compliant if the disk is not attached. |
Optimizing costs |
High |
evs:::volume |
N/A |
RGC-GR_CONFIG_ALLOWED_VOLUME_SPECS |
Checks whether the type of an EVS disk is within the allowed type list. This policy is non-compliant if the disk type is not within the list. |
Protecting configurations |
Low |
evs:::volume |
|
RGC-GR_EVS_ALL_OPERATION_PROHIBITED |
Prohibits EVS APIs from being called. |
Protecting configurations |
Critical |
evs:::volume |
N/A |
RGC-GR_ECS_ATTACH_NO_ENCRYPTED_EVS_PROHIBITED |
Prohibits an ECS from having an unencrypted EVS disk attached. |
Protecting configurations |
Critical |
evs:::volume |
N/A |
FunctionGraph
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_FUNCTION_GRAPH_CONCURRENCY_CHECK |
Checks whether the number of concurrent requests of a FunctionGraph function is within the specified range. This policy is non-compliant if the number is not within the specified range. |
Improving availability |
Medium |
fgs:::function |
N/A |
RGC-GR_CONFIG_FUNCTION_GRAPH_INSIDE_VPC |
Checks whether a FunctionGraph function is in the specified VPC. This policy is non-compliant if the function is not in the specified VPC. |
Controlling network access |
Low |
fgs:::function |
|
RGC-GR_CONFIG_FUNCTION_GRAPH_SETTINGS_CHECK |
Checks whether the runtime, timeout duration, or memory limit of a FunctionGraph function is within the specified range. This policy is non-compliant if they are not within the specified range. |
Managing vulnerabilities |
Medium |
fgs:::function |
|
RGC-GR_CONFIG_FUNCTION_GRAPH_LOGGING_ENABLED |
Checks whether logging is enabled for a FunctionGraph function. This policy is non-compliant if logging is not enabled. |
Establishing logging and monitoring |
Medium |
fgs:::function |
N/A |
GaussDB
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_GAUSSDB_INSTANCE_ENABLE_AUDITLOG |
Checks whether audit logging is enabled for a GaussDB instance. This policy is non-compliant if audit logging is not enabled. |
Establishing logging and monitoring |
Medium |
gaussdb:::opengaussInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_INSTANCE_ENABLE_BACKUP |
Checks whether backup is enabled for a GaussDB instance. This policy is non-compliant if backup is not enabled. |
Improving resiliency |
Medium |
gaussdb:::opengaussInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_INSTANCE_ENABLE_ERRORLOG |
Checks whether error log collection is enabled for a GaussDB instance. This policy is non-compliant if error log collection is not enabled. |
Establishing logging and monitoring |
Low |
gaussdb:::opengaussInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_INSTANCE_ENABLE_SLOWLOG |
Checks whether slow-query logging is enabled for a GaussDB instance. This policy is non-compliant if slow-query logging is not enabled. |
Establishing logging and monitoring |
Low |
gaussdb:::opengaussInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_INSTANCE_MULTIPLE_AZ_CHECK |
Checks whether a GaussDB resource is deployed across AZs. This policy is non-compliant if the resource is not deployed across AZs. |
Improving availability |
Medium |
gaussdb:::opengaussInstance |
N/A |
GeminiDB
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_GAUSSDB_NOSQL_DEPLOY_IN_SINGLE_AZ |
Checks whether GeminiDB is deployed in a single AZ. This policy is non-compliant if GeminiDB is deployed in a single AZ. |
Improving availability |
Medium |
gaussdb:::mongoInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_NOSQL_ENABLE_BACKUP |
Checks whether backup is enabled for GeminiDB. This policy is non-compliant if backup is not enabled. |
Improving resiliency |
Medium |
gaussdb:::mongoInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_NOSQL_ENABLE_ERROR_LOG |
Checks whether error logging is enabled for GeminiDB. This policy is non-compliant if error logging is not enabled. |
Establishing logging and monitoring |
Low |
gaussdb:::mongoInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_NOSQL_SUPPORT_SLOW_LOG |
Checks whether GeminiDB supports slow-query logging. This policy is non-compliant if slow-query logging is not supported. |
Establishing logging and monitoring |
Low |
gaussdb:::mongoInstance |
N/A |
RGC-GR_RFS_GAUSSDB_MONGO_INSTANCE_TLS_CHECK |
Requires a GaussDB(for Mongo) instance to provide TLS connections for supported engines. |
Encrypting data in transit |
Medium |
gaussdb:::mongoInstance |
N/A |
RGC-GR_RFS_GAUSSDB_MONGO_INSTANCE_AUTO_BACKUP_CHECK |
Requires automatic backup to be configured for a GaussDB(for Mongo) instance. |
Improving resiliency |
Medium |
gaussdb:::mongoInstance |
N/A |
RGC-GR_RFS_GAUSSDB_REDIS_INSTANCE_AUTO_BACKUP_CHECK |
Requires a GaussDB Redis instance to be automatically backed up. |
Improving resiliency |
Medium |
gaussdb:::redisInstance |
N/A |
RGC-GR_RFS_GAUSSDB_REDIS_INSTANCE_TLS_CHECK |
Requires a GaussDB Redis instance to provide TLS connections for supported engines. |
Encrypting data in transit |
Medium |
gaussdb:::redisInstance |
N/A |
GES
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_GES_GRAPHS_LTS_ENABLE |
Checks whether LTS is enabled for GES graphs. This policy is non-compliant if LTS is not enabled. |
Establishing logging and monitoring |
Medium |
ges:::graph |
N/A |
RGC-GR_CONFIG_GES_GRAPHS_MULTI_AZ_SUPPORT |
Checks whether GES supports cross-AZ HA. This policy is non-compliant if cross-AZ HA is not supported. |
Improving availability |
Medium |
ges:::graph |
N/A |
IAM
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_IAM_CUSTOMER_POLICY_BLOCKED_KMS_ACTIONS |
Checks whether an IAM policy allows any blocked action on KMS keys. This policy is non-compliant if the IAM policy allows such actions. |
Enforcing the least privilege |
Medium |
|
N/A |
RGC-GR_CONFIG_IAM_USER_CHECK_NON_ADMIN_GROUP |
Checks whether a non-root user is added to the admin user group. This policy is non-compliant if such users are added. |
Enforcing the least privilege |
Low |
identity:::user |
N/A |
RGC-GR_CONFIG_IAM_USER_NO_POLICIES_CHECK |
Checks whether an IAM user is directly assigned a policy or permission. This policy is non-compliant if the user is directly assigned a policy or permission. |
Enforcing the least privilege |
Low |
identity:::user |
N/A |
LTS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_LTS_GROUP_RETENTION_PERIOD_CHECK |
Requires a log group to be retained for at least 180 days. |
Establishing logging and monitoring |
Medium |
lts:::group |
N/A |
MRS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_MRS_CLUSTER_MULTIAZ_DEPLOYMENT |
Checks whether an MRS cluster is deployed in multiple AZs. This policy is non-compliant if the cluster is not deployed in multiple AZs. |
Improving availability |
Medium |
mrs:::cluster |
N/A |
RGC-GR_CONFIG_MRS_CLUSTER_ENCRYPT_ENABLE |
Requires KMS keys be not in a "pending deletion" state. |
Protecting data integrity |
Medium |
mrs:::cluster |
N/A |
Network and ACL
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_NACL_NO_UNRESTRICTED_SSH_RDP_CHECK |
Requires any network ACL to prevent access to port 22 or 3389 from 0.0.0.0/0. |
Controlling network access |
Medium |
network:::aclRule |
N/A |
RDS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_RDS_INSTANCE_ENABLE_BACKUP |
Checks whether backup is enabled for an RDS instance. This policy is non-compliant if backup is not enabled. |
Improving resiliency |
Medium |
rds:::instance |
N/A |
RGC-GR_CONFIG_RDS_INSTANCE_ENABLE_ERRORLOG |
Checks whether error log collection is enabled for an RDS instance. This policy is non-compliant if error log collection is not enabled. |
Establishing logging and monitoring |
Low |
rds:::instance |
N/A |
RGC-GR_CONFIG_RDS_INSTANCE_ENABLE_SLOWLOG |
Checks whether slow-query logging is enabled for an RDS instance. This policy is non-compliant if slow-query logging is not enabled. |
Establishing logging and monitoring |
Low |
rds:::instance |
N/A |
RGC-GR_CONFIG_RDS_INSTANCE_LOGGING_ENABLED |
Checks whether logs are collected for an RDS instance. This policy is non-compliant if no logs are collected. |
Establishing logging and monitoring |
Medium |
rds:::instance |
N/A |
RGC-GR_CONFIG_RDS_INSTANCE_MULTI_AZ_SUPPORT |
Checks whether an RDS instance can only be deployed in one AZ. This policy is non-compliant if the instance can only be deployed in one AZ. |
Improving availability |
Medium |
rds:::instance |
N/A |
RGC-GR_CONFIG_ALLOWED_RDS_FLAVORS |
Checks whether the flavor of an RDS instance is within the specified range. This policy is non-compliant if the flavor is not within the specified range. |
Protecting configurations |
Low |
rds:::instance |
N/A |
RGC-GR_CONFIG_RDS_INSTANCES_IN_VPC |
Checks whether an RDS resource is in the specified VPC. This policy is non-compliant if the resource is not in the specified VPC. |
Controlling network access |
High |
rds:::instance |
|
RGC-GR_CONFIG_RDS_INSTANCE_ENABLE_AUDITLOG |
Checks whether an RDS resource has audit logging enabled or the audit logs can be stored for a specified period of time. This policy is non-compliant if audit logging is not enabled or audit logs cannot be stored for a specified period of time. |
Establishing logging and monitoring |
Medium |
rds:::instance |
N/A |
RGC-GR_CONFIG_RDS_INSTANCE_ENGINE_VERSION_CHECK |
Checks whether the version of the database engine for an RDS instance is earlier than the specified version. This policy is non-compliant if the version is earlier than the specified one. |
Managing vulnerabilities |
Low |
rds:::instance |
|
RGC-GR_RFS_RDS_INSTANCE_DEPLOYED_IN_VPC_CHECK |
Requires a VPC to be configured for an RDS instance. |
Controlling network access |
High |
rds:::instance |
N/A |
RGC-GR_RFS_RDS_DB_SECURITY_GROUP_NOT_ALLOWED_CHECK |
Requires a database security group to be configured for an RDS instance. |
Controlling network access |
Medium |
rds:::instance |
N/A |
RGC-GR_RFS_RDS_INSTANCE_MULTIPLE_AZ_CHECK |
Requires an RDS instance to be configured in multiple AZs to achieve HA. |
Improving availability |
Medium |
rds:::instance |
N/A |
RGC-GR_RFS_RDS_INSTANCE_TLS_CHECK |
Requires an RDS instance to provide TLS connections for supported engines. |
Encrypting data in transit |
Medium |
rds:::instance |
N/A |
RGC-GR_RFS_RDS_INSTANCE_BACKUP_ENABLED_CHECK |
Requires automatic backup to be configured for an RDS instance. |
Improving resiliency |
Medium |
rds:::instance |
N/A |
OBS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_OBS_BUCKET_DEFAULT_ENCRYPTION_KMS_CHECK |
Requires an OBS bucket to use KMS keys to configure server-side encryption. |
Encrypting data at rest |
Medium |
obs:::bucket |
N/A |
RGC-GR_RFS_OBS_BUCKET_VERSIONING_ENABLED_CHECK |
Requires versioning to be enabled for an OBS bucket. |
Improving availability |
Low |
obs:::bucket |
N/A |
RGC-GR_RFS_OBS_BUCKET_LOGGING_ENABLED_CHECK |
Requires logging to be enabled for an OBS bucket. |
Establishing logging and monitoring |
Medium |
obs:::bucket |
N/A |
OBS and Access Analyzer
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_OBS_BUCKET_BLACKLISTED_ACTIONS_PROHIBITED |
Checks whether an OBS bucket policy allows any blacklisted action to external users. This policy is non-compliant if the bucket policy allows such actions. |
Enforcing the least privilege |
High |
obs:::bucket |
|
RGC-GR_CONFIG_OBS_BUCKET_SSL_REQUESTS_ONLY |
Checks whether an OBS bucket policy allows actions without SSL encryption. This policy is non-compliant if the bucket policy allows such actions. |
Encrypting data in transit |
Medium |
obs:::bucket |
N/A |
Organizations
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_ACCOUNT_PART_OF_ORGANIZATIONS |
Checks whether an account joins an organization. This policy is non-compliant if the account does not join an organization. |
Enforcing the least privilege |
High |
organizations:::accountAssociate |
SFS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_SFS_ENCRYPTED_CHECK |
Requires an SFS file system to use KMS keys to encrypt file data at rest. |
Encrypting data at rest |
Medium |
sfs:::fileSystem |
N/A |
SMN
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_SMN_LTS_ENABLE |
Checks whether trace analysis is enabled for an SMN topic. This policy is non-compliant if trace analysis is not enabled. |
Establishing logging and monitoring |
Medium |
smn:::topic |
N/A |
SWR
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_SWR_PRIVATE_IMAGE_CHECK |
Requires SWR to provide private image repositories. |
Managing vulnerabilities |
High |
swr:::repository |
N/A |
TMS
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_REQUIRED_ALL_TAGS |
Checks whether the tag keys of a resource match the specified ones. This policy is non-compliant if the tag keys do not match. |
Protecting configurations |
Low |
tms:::resourceTags |
|
RGC-GR_CONFIG_REQUIRED_TAG_CHECK |
Checks whether a resource is attached with a specified tag. This policy is non-compliant if the resource is not attached with a specified tag. |
Protecting configurations |
Low |
tms:::resourceTags |
|
RGC-GR_CONFIG_REQUIRED_TAG_EXIST |
Checks whether a resource is attached with any of the specified tags. This policy is non-compliant if the resource is not attached with any of the specified tags. |
Protecting configurations |
Low |
tms:::resourceTags |
|
RGC-GR_CONFIG_RESOURCE_TAG_KEY_PREFIX_SUFFIX |
Checks whether a resource is attached with any tag keys with the specified tag prefix and suffix. This policy is non-compliant if the resource is not attached with any such tag keys. |
Protecting configurations |
Low |
tms:::resourceTags |
|
RGC-GR_CONFIG_RESOURCE_TAG_NOT_EMPTY |
Checks whether a resource is tagged. This policy is non-compliant if the resource is not tagged. |
Protecting configurations |
Low |
tms:::resourceTags |
N/A |
TaurusDB
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_GAUSSDB_MYSQL_INSTANCE_ENABLE_AUDITLOG |
Checks whether audit logging is enabled for a TaurusDB instance. This policy is non-compliant if audit logging is not enabled. |
Establishing logging and monitoring |
Medium |
gaussdb:::mysqlInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_MYSQL_INSTANCE_ENABLE_BACKUP |
Checks whether backup is enabled for a TaurusDB instance. This policy is non-compliant if backup is not enabled. |
Improving resiliency |
Medium |
gaussdb:::mysqlInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_MYSQL_INSTANCE_ENABLE_ERRORLOG |
Checks whether error logging is enabled for a TaurusDB instance. This policy is non-compliant if error logging is not enabled. |
Establishing logging and monitoring |
Low |
gaussdb:::mysqlInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_MYSQL_INSTANCE_ENABLE_SLOWLOG |
Checks whether slow-query logging is enabled for a TaurusDB instance. This policy is non-compliant if slow-query logging is not enabled. |
Establishing logging and monitoring |
Low |
gaussdb:::mysqlInstance |
N/A |
RGC-GR_CONFIG_GAUSSDB_MYSQL_INSTANCE_MULTIPLE_AZ_CHECK |
Checks whether a TaurusDB instance is deployed across AZs. This policy is non-compliant if the instance is not deployed across AZs. |
Improving availability |
Medium |
gaussdb:::mysqlInstance |
N/A |
VPC
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_EIP_UNBOUND_CHECK |
Checks whether an EIP is bound to any resources. This policy is non-compliant if the EIP is not bound. |
Optimizing costs |
Medium |
vpc:::eipAssociate |
N/A |
RGC-GR_CONFIG_VPC_FLOW_LOGS_ENABLED |
Checks whether flow logs are enabled for a VPC. This policy is non-compliant if flow logs are not enabled. |
Establishing logging and monitoring |
Medium |
vpc:::flowLog |
N/A |
RGC-GR_CONFIG_EIP_BANDWIDTH_LIMIT |
Checks whether the bandwidth of an EIP is less than the specified value. This policy is non-compliant if the bandwidth is less than the specified value. |
Improving availability |
Medium |
vpc:::eip |
|
RGC-GR_RFS_VPC_SG_OPEN_ONLY_TO_AUTHORIZED_PORTS_CHECK |
Prohibits any VPC security group rule from using the source IP address ranges (0.0.0.0/0 or ::/0) for ports other than ports 80 and 443. |
Controlling network access |
High |
networking:::secgroupRule |
N/A |
RGC-GR_RFS_VPC_SG_RESTRICTED_COMMON_PORTS_CHECK |
Prohibits any VPC security group rule from using the source IP address ranges (0.0.0.0/0 or ::/0) for specific high-risk ports. |
Controlling network access |
Critical |
networking:::secgroupRule |
N/A |
VPCEP
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_VPCEP_ENDPOINT_ENABLED |
Checks whether there are VPC endpoints for the specified services. This policy is non-compliant if there are no VPC endpoints. |
Controlling network access |
Medium |
vpcep:::endpoint |
VPN
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_CONFIG_VPN_CONNECTIONS_ACTIVE |
Checks whether the VPN connection is normal. This policy is non-compliant if the connection is not normal. |
Improving availability |
Medium |
vpnaas:::siteConnectionV2 |
N/A |
RGC-GR_VPN_CONNECTION_PROHIBITED |
Prohibits VPN subscriptions. |
Protecting configurations |
Critical |
|
N/A |
WAF
Policy Name |
Function |
Scenario |
Severity |
Resource |
Mandatory |
---|---|---|---|---|---|
RGC-GR_RFS_WAF_GLOBAL_ACL_NOT_EMPTY_CHECK |
Requires all WAF global web to have valid ACL rules. |
Controlling network access |
Medium |
waf:::ruleGlobalProtectionWhitelist |
N/A |
RGC-GR_RFS_WAF_RULEGROUP_NOT_EMPTY_CHECK |
Prohibits WAF rule groups from being empty. |
Controlling network access |
Medium |
waf:::addressGroup |
N/A |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot