Security Auditing

Scenario

You can query operation records matching specified conditions and check whether operations have been performed by authorized users for security analysis.

Prerequisites

You have enabled CTS and trackers are running properly.

Procedure

The following takes the records of EVS disk creation and deletion in the last two weeks as an example.

  1. Log in to the management console as a CTS administrator.

  2. Click image1 in the upper left corner and choose Management & Deployment > Cloud Trace Service. The CTS console is displayed.

  3. Choose Trace List in the navigation pane on the left.

  4. Set filters in sequence and click Query.

    Note

    Select Management for Trace Type, EVS for Trace Source, evs for Resource Type, Trace name for Search By, select createVolume or deleteVolume, and click Query. By default, all EVS disk creation or deletion operations in the last hour are queried. You can also set the time range to query all EVS creation or deletion operations performed in the last 7 days at most.

  5. Choose Tracker List in the navigation pane on the left.

  6. Download traces older than seven days or all traces by following the instructions in Querying Archived Traces.

  7. In the trace files, search traces using keywords createVolume or deleteVolume.

  8. Check the traces obtained from steps 5 and 7 to see whether there are any unauthorized operations or operations that do not conform to security rules.