• Cloud Trace Service

cts
  1. Help Center
  2. Cloud Trace Service
  3. User Guide
  4. Application Examples
  5. Security Auditing

Security Auditing

Scenarios

This section describes how to query records matching a specified characteristic and to perform security analysis on records of operations to check whether the operations are performed by authorized users.

Prerequisites

You have enabled CTS and the tracker is normal. For details about how to enable CTS, see Enabling CTS.

Procedure

The following steps take the creation and deletion of EVS disks in the last two weeks as an example:

  1. Log in to the management console using the administrator account.
  2. Click in the upper left corner and select a region and project.
  3. Click Service List and choose Management & Deployment > Cloud Trace Service.
  4. Choose Trace List in the navigation pane on the left.
  5. On the trace list page, click Filter. In the displayed box, specify Trace Source, Resource Type, and Search By, and click Query to query the specified traces.

    For example, you can select EVS for Trace Source, evs for Resource Type, and Trace name for Search By, select createVolume or deleteVolume in the right text box, and click Query to query all creation or deletion operations performed on EVS in the last seven days.

  6. Choose Tracker from the left pane to switch to the Tracker page and obtain the OBS bucket name.
  7. Download traces generated in the last seven days or all traces. For details, see Querying Archived Traces.
  8. In the trace files, search traces using keywords createVolume or deleteVolume.
  9. Obtain information about the user who performs the operation from the results in 5 and 8. Check whether the user performs any unauthorized operation or any operation that does not conform to the security operation rules.