Data Security Center
Data Security Center
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Service Overview
Infographics
What Is DSC?
Specifications of Different DSC Editions
Functions
Advantages
Applicable Scenarios
DSC and Related Services
Constraints
Personal Data Protection Mechanism
Permissions Management
Billing
Overview
Billing Modes
Overview of Billing Modes
Yearly/Monthly Billing
Pay-Per-Use
Billing Items
Billing Examples
Renewal
Renewal Overview
Manual Renewal
Auto-Renewal
Bills
Arrears
Stopping Billing
Billing FAQs
How Is DSC Billed?
How Do I Renew the Purchased DSC Before It Expires?
How Do I Unsubscribe from DSC?
Getting Started
Procedure for Using DSC
Classification and Grading of Data Assets on the Cloud
Getting Started with Common Practices
User Guide
Service Provisioning
Buying DSC
Upgrading Edition and Specifications
Allowing or Disallowing Access to Cloud Assets
Asset Map
Asset Management
Asset Center
Overview
Adding OBS Assets
Authorizing Access to Database Assets
Authorizing Access to Big Data Assets
Adding a Log Stream
Managing Asset by Group
Metadata Tasks
Creating a Metadata Collection Task
Running a Metadata Collection Task
Data Exploration
Asset Catalog
Sensitive Data Identification
Overview of Sensitive Data Identification
Sensitive Data Identification Configuration
Creating an Identification Template
Managing Identification Templates
Customizing a Rule
Editing a Rule
Adding a Sensitive Level
Managing Levels
Sensitive Data Identification Tasks
Creating an Identification Task
Starting a Task
Identification Tasks
Identification Results
Data Asset Protection
Data Masking
Overview
Configuring a Data Masking Rule
Static Data Masking
Creating a Database Data Masking Task
Creating an Elasticsearch Data Masking Task
Creating an MRS Data Masking Task
Creating a Hive Masking Task
Creating an HBase Masking Task
Creating a DLI Masking Task
Data Watermarking
Overview
Injecting Watermarks
Injecting Watermarks to Databases
Injecting Watermarks to Documents
Injecting Watermarks to Images
Extracting Watermarks
Extracting Watermarks from Databases
Extracting Watermarks from Documents
Extracting Watermarks from Images
(Optional) Configuring GaussDB(DWS) and MRS Hive
Data Security Operations
Situational Awareness Dashboard
Event Management
Alarm Management
OBS Usage Audit
Watermarks
Extracting Watermarks from Databases
Extracting Watermarks from an OBS Bucket File
Extracting Watermarks from a Local File
Alarm Notifications
Permissions Management
Creating a User and Assigning DSC Permissions
DSC Custom Policies
DSC Permissions and Supported Actions
Key DSC Operations
Operations Recorded by CTS
Best Practices
How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
Best Practices of OBS Data Security Protection
API Reference
Before You Start
Overview
API Calling
Endpoints
Limitations and Constraints
Basic Concepts
Selecting an API Type
Calling APIs
Making an API Request
Authentication
Response
API Description
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
Resource Management
Instance Ordering
Querying Resource Provisioning Information
Dynamic Data Masking
Masking Sensitive Data
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Image Watermarking
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Editing a Data Asset Name
Querying the Data Asset Scanning Authorization
Adding a Data Asset Scanning Authorization
Deleting a Data Asset Scanning Authorization
Document Watermarking
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Sensitive Data Discovery
Querying the Identification Task List
Querying the Result of an Identification Task
Viewing the Rule List
Creating a Sensitive Data Scanning Rule
Modifying a Sensitive Data Scanning Rule
Deleting a Sensitive Data Scanning Rule
Querying Sensitive Data Scanning Rule Groups
Creating a Sensitive Data Scanning Rule Group
Deleting a Sensitive Data Scanning Rule Group
Creating a Sensitive Data Scanning Task
Deleting a Sensitive Data Scanning Task
Static Data Masking
Querying the Data Masking Task Execution List
Starting or Stopping a Data Masking Task
API Call Records
Querying OpenAPI Calls
Appendixes
Status Codes
Error Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
Change History
SDK Reference
SDK Overview
FAQs
Product Consulting
What is Data Security Center?
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Parse?
Regions and AZs
What Are Regions and AZs?
Can DSC Be Used Across Regions?
Asset Authorization
Agency Policies Obtained After the Access To Assets Is Allowed
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
What Are the Identification Templates Supported by DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Data Usage Audit
Which Types of Abnormal Events Can Be Identified by DSC?