Bu sayfa henüz yerel dilinizde mevcut değildir. Daha fazla dil seçeneği eklemek için yoğun bir şekilde çalışıyoruz. Desteğiniz için teşekkür ederiz.
CloudPond
CloudPond
- Service Overview
- Getting Started
-
User Guide
- CloudPond Console Overview
- Edge Site
- Network Connectivity
- Cloud Resources
- Monitoring Data
- Enterprise Project Management
- Quota Adjustment
- Auditing
-
FAQs
- Popular Questions
- CloudPond Overview
- Security
- Billing
- Region and Edge site
-
Rack Installation
- How Do I Know Whether My On-premises Data Center Meets the CloudPond Location Requirements?
- Can I Install Third-Party Devices in the Racks?
- Who Will Install the Hardware and Software After the Racks Are Delivered to the Location?
- What Do I Need to Do Before, During, and After an Edge Site Is Deployed?
- Network Connectivity
- O&M
- Upgrade and Capacity Expansion
- Best Practices
- General Reference
On this page
Show all
Copied.
How Do I Ensure Data Security for CloudPond?
You can take measures in the following aspects:
- Ensure the security of your premises and infrastructure as well as network security and availability between your edge site and the cloud.
- Classify your data, encrypt sensitive data, and use security groups or network ACLs to control access to resources. In addition, you can use CTS to audit access data.
- Dump the data to be retained before you stop using an edge site.
- Create IAM users for fine-grained permission control and periodically review the permissions.
Parent topic: Security
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot