Tagged articles
5 articles
Page 1 of 1
Alibaba Cloud Observability
Alibaba Cloud Observability
Nov 3, 2025 · Information Security

Do You Really Know Your AccessKey? Reveal Hidden Risks and Management Tips

In cloud environments AccessKey and RAM roles act as digital keys, but their rapid growth makes management complex; this article explains how CloudMonitor 2.0’s log audit and Umodel entity modeling provide comprehensive observability, relationship mapping, dashboards, alerts, and root‑AK detection to secure and streamline credential management.

AccessKeyAlertingLog Auditing
0 likes · 10 min read
Do You Really Know Your AccessKey? Reveal Hidden Risks and Management Tips
Alibaba Cloud Observability
Alibaba Cloud Observability
Aug 18, 2025 · Information Security

How to Use MCP Server for Real‑Time AccessKey Security Audits in Cloud Native Environments

This guide walks through a real‑time security investigation of suspicious AccessKey activity using Alibaba Cloud's MCP server, detailing environment setup, JSON configuration, natural‑language queries, and four practical audit scenarios—including tracking AK usage, identifying high‑risk operations, monitoring root account activity, and summarizing recent cloud service events.

AccessKeyAlibaba CloudCloud Native
0 likes · 8 min read
How to Use MCP Server for Real‑Time AccessKey Security Audits in Cloud Native Environments
Alibaba Cloud Native
Alibaba Cloud Native
Aug 13, 2025 · Information Security

Investigating Suspicious AccessKey Activity with Alibaba Cloud Observability MCP

This guide walks through a real‑world AccessKey security incident, showing how to configure the Alibaba Cloud Observability MCP server, import JSON settings into Cherry Studio, and use natural‑language queries to audit logs, identify risky operations, monitor root account usage, and summarize overall system activity.

AccessKeyAlibaba CloudLog Auditing
0 likes · 8 min read
Investigating Suspicious AccessKey Activity with Alibaba Cloud Observability MCP
Java Architect Essentials
Java Architect Essentials
Nov 25, 2020 · Information Security

API Interface Security: AccessKey/SecretKey, Token/AppKey, Signature Generation and Replay‑Attack Prevention

The article explains how to secure API interfaces by using AccessKey/SecretKey or Token/AppKey for identity verification, generating request signatures to prevent parameter tampering, and applying timestamp‑nonce mechanisms to defend against replay attacks, while providing concrete implementation examples in code.

API SecurityAccessKeyAuthentication
0 likes · 8 min read
API Interface Security: AccessKey/SecretKey, Token/AppKey, Signature Generation and Replay‑Attack Prevention
Architect
Architect
Oct 1, 2020 · Information Security

API Authentication and Request Signing with AccessKey/SecretKey, Token, and AppKey

The article explains how to secure API interfaces by using AccessKey/SecretKey, token, and AppKey for identity verification, parameter signing, and replay‑attack prevention through timestamp‑nonce mechanisms, and provides step‑by‑step client and server implementation examples.

API SecurityAccessKeyReplay attack
0 likes · 7 min read
API Authentication and Request Signing with AccessKey/SecretKey, Token, and AppKey