Distributed Cache Service (DCS) Redis supports CTIAM authentication and multiple access control measures to ensure your data security from multiple dimensions.
Authentication
l CTIAM
Identity and Access Management (CTIAM) is a basic service that provides users with permission management capabilities, which can help you securely control the access and operation permissions of your eSurfing Cloud services and resources, including user authentication, permission granting, and access control.
For detailed information, see Identity and Access Management - Product Introduction.
You can create an IAM user and grant the user permissions on DCS Redis instances. Then, the user can access the authorized instance resources by using the username and password. For details, see Identity and Access Management - Quick Start - Creating an IAM User.
Access Control
l Permission Control
After you purchase a DCS Redis instance, you can use CTIAM to set different access permissions for employees in the enterprise to isolate permissions between different employees and perform finer-grained permission management with CTIAM.
l VPCs and Subnets
A virtual private cloud (VPC) builds an isolated and private network environment for DCS Redis, improving database security and streamlining your network deployment. You have full control over your VPCs. VPC's ample features allow you to flexibly manage your cloud networks, including creating subnets, configuring security groups and network ACLs, managing route tables, and applying for elastic IP addresses (EIPs) and bandwidth. Provide dedicated network resources that are isolated from other networks through subnets to promote network security. For detailed information, see Virtual Private Cloud (VPC) - User Guide - Creating a VPC and a Subnet.
l Security Group
A security group is a logical group that provides the same access policy for Redis instances that have the same security requirements and trust each other in the same VPC. You can configure security groups for database instances and specify the IP address and port to access the Redis instance to ensure the security and stability of its running environment. For details, see Modifying an Instance Security Group.