tencent cloud

Feature Overview
Last updated:2025-09-17 21:28:59
Feature Overview
Last updated: 2025-09-17 21:28:59
The Cloud Security Center (CSC) monitors API access key (AK) information in real-time, sorts AK permission configurations and call paths, and identifies breaches, abnormal calls, and permission configuration risks based on Tencent Cloud's unique intelligence, then triggers an alarm.
Note:
Note: It is recommended that you pay attention to AK call details and abnormal alarms in time, and modify permission policies according to relevant guidelines. This can help you address issues such as loss of control over AK permissions, misconfiguration, leakage, slow response, and difficulty in tracing abnormal calls, better manage AK, reduce potential security risks, prevent threat spread, and guarantee Cloud Security.

Feature Sorting

Functional Module
Feature
Problem Solving
Operation Guide
Statistics Dashboard
Asset Overview Security Overview
Quickly understand AK asset status, locate abnormal AKs, pending alarms, and pending risks that require attention.
Locate high-priority issues, check how many AKs require attention, count pending problems, and analyze recent security operation trends.
Asset List
AK asset
View AK basic info, security advice, associated alarms and risks, invocation records and associated assets from the AK asset perspective. (Both permanent keys and temporary keys are supported.)
Sort the number of AKs, learn whether each AK is being called, which IPs accessed this AK and which APIs were called, whether there is an exception in the calls, and which policies are related.
Source IP call
View IP region, type, AK call condition, associated alarms, and call records based on the source IP perspective.
Sort the number of IPs requesting permanent AKs, if the IP is an internal asset, the IP jurisdiction, how many AKs were called, whether there are alarms, and support customer notes for the IP's associated business.
Account list
Display basic account information, security advice, associated alarms and risks, latest login time, and account protection status based on the account perspective.
Summarize the number of existing security issues, alarm and risk entries for each account, provide security recommendations, and support one-click activation of account protection.
Alarm List
Monitor AK leakage and abnormal calls in real time:
hacker tool CloudExplorer Manager COSBrowser identification
GitHub leakage (GitHub collaboration + IP check).
Abnormal IP calls to sensitive APIs.
View alarm content (leakage, abnormal calls) from the alarm rule perspective, associate AK with abnormal call records, and provide permission policy configuration recommendations.
Real-time alerting for breaches, comprehensive analysis and trace the source of abnormal calls.
Learn about leaked addresses and abnormal call traces (calling IP, access services and APIs, related policies), provide governance recommendations, and guide disposal.
Alarm
Configuration Risk List
Automated scanning of AK permission configuration, check if AK has high-permission policies, view configuration risk description and risk evaluation evidence from a risk rule perspective, and provide permission policy configuration recommendations.
Support sorting high-risk policy configurations before events, converging sensitive permissions, and reducing potential security risks.
Policy Management
Alarm policy
Managing System Alarm Policy
Manage Alarm policies that require attention and create a custom allowlist based on business needs.
Allowlist policy
Manage the Alarm allowlist to add, delete, modify, and check allowlisted entries based on IP, calling method, AK, or API.
IP hiding policy
By configuring an allowlist policy for the specified AK, all subsequent access IPs will be automatically hidden and not displayed in the call source IP list.
Note:
Note: Since the AK anomaly detection feature is sensitive, providing API may expose more risk API interfaces. Temporary not provide API interface.
Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback