
Field Name | Example | Description |
Alarm Name/Type | abnormal behavior leakage monitoring | Click to pull up the Alarm Details drawer. |
Alarm level | High High-risk Medium Risk Low-risk Note. Invalid | The alarm level is determined based on Tencent Cloud security practice. |
AK name/remark | AKID75XXX Department 1 AK | AK name and custom remarks. AK retains the first 6 and last 11 digits, with the middle omitted, supporting one-click copy; click to pull up the AK detail drawer. Remarks can be custom edited with no more than 20 characters. If empty, display "-". |
Account Name Identity | Account A Root Account/Sub-account (belonging to main account: Root Account B) | AK cloud service provider and account, if it is a sub-account show info belonging to main account. Hover over to view account ID and APPID; support filtering root account/sub-account. |
Alarm Time | 2025-01-12 18:00:00 | Alarm generation time. Format: YYYY-MM-DD HH:MM:SS. Support sorting. |
Processing Status | Unprocessed processed ignored | Show alarm handling status, manually done tag, processing status supports filtering. |

Operation Type | Description | |
Details | | Click to pull up the Alarm Details drawer. |
Others | tag disposal | Click post-processing and the status changes to "Processed". |
| marked as ignored | Click post-processing and the status changes to "Ignored". |
| Allowlist policy | Click to pull up the allowlist policy drawer and fill in the corresponding AK. |
| API Key Management | Click to navigate to Cloud Access Management > Access Keys > API Key Management. |
Rule Name | Rule Description |
Root key calls a high-risk API | Root account access key calls a high-risk API. High-risk APIs cover 30+ interfaces across 20+ services such as cam, sts, tat, scf, tke, cdb, cvm, cbs. Example: cam.ListAccessKeys,cam.DeleteUser... |
Non-console calls to high-risk APIs | Call high-risk APIs via non-console methods (primarily obtaining via TencentCloud API through SDK). |
Unauthorized service invocation | Unauthorized service invocation via API call requires permission convergence for that account/role. |
Create a key | A new key is created. |
Permission escalation act | The user permission gets promoted by calling some APIs of sts and cam. |
Sensitive behavior during not normal time period | Perform sensitive operations such as resource deletion via console or API between 10 PM and 6 AM. |
New user calls a high-risk API | A created user called a high-risk API within 1 day. Need to pay attention. |
GitHub key confirmation request | Check whether the request originates from the egress IP of a GitHub callback. If hit, it means the ak exists in a GitHub public/private repository. |
Hacker tool detection | Check if the behavior of the same ak is similar to a hacker tool. |
Long-term inactive access keys with API calls | Inactive access keys never used in the past month have API calls. Pay attention. |
Invoke cloud API via cos browser | Call TencentCloud API via cos-browser. Attackers may use cos-browser to perform file downloads. Need to determine whether it is proper usage. |
Create Tencent Cloud resources through API | Create Tencent Cloud resources through TencentCloud API, such as Cloud Virtual Machine (CVM) and cloud database (CDB). |
Cloud Manager behavior | This part of calls comes from the Cloud Manager invocation source. Attention required. Cloud Manager is a multi-cloud management platform that visually manages cloud CVM, network, mirror and more. It may also be used by attackers. O&M personnel must check whether to use Cloud Manager. |
High-risk operations in Cloud Automation Tools | By calling some APIs of tat, directly execute commands on the machine. |


Field Name | Example | Description |
Source IP/Region/Remark | 1.1.1.1 China-Beijing | Department 1 AK | Source IP, region, and custom remarks. IP content supports one-click copy. Remarks can be custom edited with no more than 20 characters. If empty, display "-". |
IP type | within the account (with remark) within the account (no remark) outside the account (with remark) outside the account (no remark) LAN (with remark) LAN (no remark) | within the account (with remark): the source IP of calls identified in the CSC asset list, with remark. within the account (without remark): the source IP of calls detected in the CSC asset list, no remark. outside the account (with remark): IPs not within the account but with remark. outside the account (without remark): IPs not within the account and without remark. LAN (with remark): Local Area Network IP Address, with remark. LAN (without remark): Local Area Network IP Address, without remark. |
AK name/remark | AKID75XXX Department 1 AK | AK name and custom remarks. AK retains the first 6 and last 11 digits, with the middle omitted, supporting one-click copy; click to pull up the AK detail drawer. Remarks can be custom edited with no more than 20 characters. If empty, display "-". |
Calling Method | API Console | Access the service via API call or console operations. |
Call API/Service | DescribeAccountPrivileges cdb | API and its associated service. |
CAM Policy User (Role)/Policy | 1 username: xxx Policy: 1 | The number of CAM policies associated with this AK. Click the number to open the CAM policy details popup. Temporary key is displayed in an aggregated manner, so display users (role). |
Call status Number of invocations | Successful. (x times) Failed. (x times) | Call the AK successfully/failed state and count. |
First call time Most recent call time | 2025-01-01 18:00:00 2025-01-12 18:00:00 | First call time and most recent call time. Format: YYYY-MM-DD HH:MM:SS. Support sorting. |
IP asset (ID/name) | ins-xxx Machine 1 | Show AK asset. |



Feedback