Advanced
Тема интерфейса

Encrypting Images

Язык статьи: Английский
Перевести

You can create encrypted images to securely store data.

Note
  • To use image encryption, you must apply for KMS Administrator permissions.
  • An encrypted full-ECS image may contain multiple disks. The encryption status of each disk may be different. So, the encryption status of a full-ECS image is displayed as - in the image list.
  • An encrypted full-ECS image inherits the encryption status of each disk of the ECS used to create the image. The inherited status cannot be changed.
  • For how to check the encryption status of a disk in an encrypted full-ECS image, see

Constraints

  • DEW must be enabled.
  • An image encrypted using the default key cannot be shared with other users.
  • The system disk of an ECS created from an encrypted image is also encrypted, and its key is the same as the image key.
  • If an ECS has an encrypted system disk, private images created from the ECS are also encrypted.
  • The key used for encrypting an image cannot be changed.
  • If the key used for encrypting an image is disabled or deleted, the image is unavailable.
  • Encrypted full-ECS images cannot be replicated across regions.

Introduction

You can create an encrypted image from an image file or an encrypted ECS.