- Security analysis: Traces generated by CTS record users who perform operations, the time when operations are performed, and IP addresses used to perform operations. You can use the information to conduct security analysis.
- Operation troubleshooting: Traces generated by CTS record the causes of failed operations, using which you can troubleshoot operation faults. For example, you will fail to create an ECS if you delete the system disk during creation.
- Resource change tracing: Traces generated by CTS record resource changes and the results. You can track the resource use using the records.
- Compliance audit: CTS provides operation records and the operation query capability, and helps financial and payment enterprises pass authentications, such as PCI DSS.
CTS is free, but you need to pay a fee for OBS buckets.