The overview page in the CAM console has six modules: CAM Resources, Login URL, Sensitive Operations, Last Login Info, Security Analysis Report, and Security Guide.
QcloudCamSummaryAccess
policy can view the information of all modules when they log in to the console.QcloudCamSummaryAccess
policy will only see the Login URL and Last Login Info modules.QcloudCamSummaryAccess
policy.QcloudCamSummaryAccess
policy with sub-accounts as needed to allow them to view the information on the overview page in the console. For more information on the authorization method, please see Authorization Management.The CAM resources module displays the numbers of users, user groups, custom policies, roles, and identity providers created under the current root account. You can create more resources by clicking the button below each resource quantity.
The login URL module displays the login URL for the sub-user. Both the root account and the sub-account can copy the URL by clicking the "Copy" icon on the right of the URL.
The sensitive operations module displays the overview information of all sensitive operations under the current root account in the last 3 days (up to 50 entries). The displayed information includes account ID, operator ID, sensitive operation details, and operation time. You can also click View All Records to enter the Cloud Audit console to view more detailed sensitive operation records.
The last login info module displays the last login time, last login IP, identity security status, and shortcuts to manage API keys and manage MFA settings.
The security analysis report module provides a Download report button. Click this button to get the security status of the current root account and sub-account, security risks discovered based on best practices, and recommended solutions. Each generated report will be cached for 4 hours.
Note:For the security of your accounts and assets in Tencent Cloud, we strongly recommend you complete all the configurations in the security guide.
The security guide module provides basic CAM feature descriptions and necessary security operation guidance, such as binding MFA devices to root accounts, enabling account protection for root accounts, creating sub-accounts, and creating groups and adding sub-accounts.
Was this page helpful?