Overview
IMS allows you to create encrypted images to ensure data security.
Note
To use the image encryption function, you must apply for KMS Administrator permissions.
Constraints
- DEW must be enabled.
- Encrypted images cannot be shared with others.
- The system disk of an ECS created from an encrypted image is also encrypted, and its key is the same as the image key.
- If an ECS has an encrypted system disk, private images created from the ECS are also encrypted.
- The key used for encrypting an image cannot be changed.
- If the key used for encrypting an image is disabled or deleted, the image is unavailable.
Parent topic: Encrypting Images
- Constraints