Overview¶
IMS allows you to create encrypted images to ensure data security.
Note
To use the image encryption function, you must apply for KMS Administrator permissions. For details, see Creating a User and Granting Permissions.
Constraints¶
KMS must be enabled.
Encrypted images cannot be shared with others.
The system disk of an ECS created from an encrypted image is also encrypted, and its key is the same as the image key.
If an ECS has an encrypted system disk, private images created from the ECS are also encrypted.
The key used for encrypting an image cannot be changed.
If the key used for encrypting an image is disabled or deleted, the image is unavailable.