06_Handout_1(80)
06_Handout_1(80)
Types of Database
• A relational database organizes data using a relational model. Data is stored in rows and columns. A
user retrieves data from a database through a query, which is a type of command that qualifies certain
areas of the database. A relational model can be simply understood as a two-dimensional table model,
and a relational database is a way of organizing data consisting of two-dimensional tables and their
relationships.
• A non-relational database refers to a non-relational data storage system not compliant with ACID
properties.
Deployment Modes
• Cluster: Cluster instances are recommended for service systems that require both high availability and
scalability.
• Replica set: Replica set instance suits small- and medium-sized service systems that require high
availability.
• Single node: Single node instances are useful for R&D, testing, and non-core data storage of
enterprises.
Security Services
Security services are developed to address different aspects of information security.
Host Security Service (HSS) helps you identify and manage the assets on your servers, eliminate risks, and
defend against intrusions and web page tampering. There are also advanced protection and security
operations functions available to help you easily detect and prevent threats.
Web Application Firewall (WAF) keeps web services stable and secure. It examines all HTTP and HTTPS
requests to detect and block the following attacks: Structured Query Language (SQL) injection, cross-site
scripting (XSS), web shells, command and code injections, file inclusion, sensitive file access, third-party
vulnerability exploits, Challenge Collapsar (CC) attacks, malicious crawlers, and cross-site request forgery
(CSRF).
Data Encryption Workshop (DEW) is a cloud data encryption service. It consists of the following services: Key
Management Service (KMS), Cloud Secret Management Service (CSMS), Key Pair Service (KPS), and Dedicated
Hardware Security Module (Dedicated HSM). It helps you secure your data and keys, simplifying key
management.
• Key Management Service (KMS) is a secure, reliable, and easy-to-use service for managing your keys
on the cloud. It helps you easily create, manage, and protect keys.
• Cloud Service Management Service (CSMS) is a secure, reliable, and easy-to-use secret hosting
service.
• Key Pair Service (KPS) is a secure, reliable, and easy-to-use cloud service designed to manage and
protect your SSH key pairs.
• Dedicated Hardware Security Module enables data encryption on the cloud, specifically, encrypting
and decrypting data, verifying signature, generating keys, and storing keys.
Identity and Access Management (IAM) provides permissions management to help you securely control
access to your cloud services and resources. IAM offers the following advantages:
• Fine-grained access control for Huawei Cloud resources: If you purchase multiple Huawei Cloud
resources, such as Elastic Cloud Servers (ECSs), Elastic Volume Services (EVSs), and Bare Metal Servers
(BMSs), for different teams or applications in your enterprise, you can use your account to create IAM
users for the team members or applications and grant them permissions required to complete specific
tasks. The IAM users use their own usernames and passwords to log in to Huawei Cloud and access
resources in your account.
• Cross-account resource access delegation: If you purchase multiple Huawei Cloud resources, you can
delegate another account to manage some of your resources for efficient O&M. For example, you can
create an agency for a professional O&M company to enable the company to manage specific
resources with the company's own account. If the delegation changes, you can modify or revoke the
delegated permissions at any time. In the following figure, account A is the delegating party, and
account B is the delegated party.
• Federated access to Huawei Cloud with existing enterprise accounts: If your enterprise has an
identity system, you can create an identity provider (IdP) in IAM to provide single sign-on (SSO) access
to Huawei Cloud for employees in your enterprise. The identity provider establishes a trust
relationship between your enterprise and Huawei Cloud, allowing the employees to access Huawei
Cloud using their existing accounts.