Data Security Center
Data Security Center

    All results for "" in this service

      All results for "" in this service

      • What's New
      • Service Overview
        • Infographics
        • What Is DSC?
        • Specifications of Different DSC Editions
        • Functions
        • Advantages
        • Applicable Scenarios
        • DSC and Related Services
        • Constraints
        • Personal Data Protection Mechanism
        • Permissions Management
      • Billing
        • Overview
        • Data Security Center (DSC)
          • Billing Modes
            • Billing Mode Overview
            • Yearly/Monthly Billing
            • Pay-Per-Use
          • Billing Items
          • Billing Examples
        • Renewal
          • Renewal Overview
          • Manual Renewal
          • Auto-Renewal
        • Bills
        • Arrears
        • Stopping Billing
        • Billing FAQs
          • How Is DSC Billed?
          • How Do I Renew the Purchased DSC Before It Expires?
          • How Do I Unsubscribe from DSC?
      • Getting Started
        • Usage Process
        • Classification and Grading of Data Assets on the Cloud
        • Getting Started with Common Practices
      • User Guide
        • Buying DSC
        • Upgrading Edition and Specifications
        • Allowing or Disallowing Access to Cloud Assets
        • Asset Management
          • Adding and Authorizing Data Assets in DSC
            • Asset Center Overview
            • Adding an OBS Asset
            • Adding and Authorizing Database Assets
            • Adding and Authorizing Big Data Assets
            • Adding a Log Stream
          • Implementing Asset Classification and Grading Through Data Exploration
          • Managing Asset Groups
          • Managing Asset Catalogs
        • Sensitive Data Identification
          • Overview
          • Configuring Sensitive Data Identification Policies
          • Viewing Built-in Rules
          • Creating an Identification Task
          • Viewing and Downloading Sensitive Data Identification Results
        • Data Asset Protection
          • Data Asset Protection Overview
          • Data Masking
            • Data Masking Overview
            • Configuring and Viewing Masking Rules
            • Creating a Static Data Masking Task
          • Data Watermarking
            • Data Watermarking Overview
            • Injecting or Extracting Database Watermarks
            • Injecting or Extracting Document Watermarks
            • Injecting or Extracting Image Watermarks
          • (Optional) Configuring GaussDB(DWS) and MRS Hive
        • Data Security Operations
          • Viewing the Security Awareness Dashboard
          • Viewing Data Transfer Details
          • Event Management
          • Alarm Management
          • OBS Usage Audit
          • Watermarks
        • Viewing the Data Security Situation on the Asset Map
        • Policy Center
          • Policy Baseline
            • Policy Baseline Overview
            • Configuring a Data Collection Policy
            • Configuring a Data Transfer Policy
            • Configuring a Data Storage Policy
            • Configuring a Data Usage Policy
            • Configuring a Data Sharing Policy
            • Configuring a Data Destruction Policy
          • Policy Management
          • Transfer Log Collection
        • Alarm Notifications
        • Permissions Management
          • Creating a User and Assigning DSC Permissions
          • DSC Custom Policies
          • DSC Permissions and Supported Actions
        • Key DSC Operations
          • Operations Recorded by CTS
          • Viewing CTS Traces in the Trace List
      • Best Practices
        • How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
        • Best Practices of OBS Data Security Protection
      • API Reference
        • Before You Start
          • Overview
          • API Calling
          • Endpoints
          • Limitations and Constraints
          • Basic Concepts
          • Selecting an API Type
        • Calling APIs
          • Making an API Request
          • Authentication
          • Response
        • API Description
          • Data Watermarking
            • Injecting a Data Watermark
            • Extracting a Data Watermark
          • Resource Management
            • Instance Ordering
            • Querying Resource Provisioning Information
          • Dynamic Data Masking
            • Masking Sensitive Data
          • Alarm Notifications
            • Querying an Alarm Notification Topic
            • Modifying an Alarm Notification Topic
          • Image Watermarking
            • Injecting Invisible Watermarks into Images
            • Extracting Invisible Text Watermarks
            • Extracting Invisible Watermarks from Images
            • Injecting Invisible Watermarks into Images (Image Addresses)
            • Extracting Dark Watermarks from Images (Image Addresses)
            • Extracting Invisible Image Watermarks from Images (Image Addresses)
          • Asset Management
            • Editing a Data Asset Name
            • Querying the Data Asset Scanning Authorization
            • Adding a Data Asset Scanning Authorization
            • Deleting a Data Asset Scanning Authorization
          • Document Watermarking
            • Injecting Watermarks into Documents
            • Extracting Invisible Watermarks
            • Injecting Watermarks into Documents (Document Addresses)
            • Extracting Invisible Watermarks from Documents (Document Addresses)
          • Sensitive Data Discovery
            • Querying the Identification Task List
            • Querying the Result of an Identification Task
            • Viewing the Rule List
            • Creating a Sensitive Data Scanning Rule
            • Modifying a Sensitive Data Scanning Rule
            • Deleting a Sensitive Data Scanning Rule
            • Querying Sensitive Data Scanning Rule Groups
            • Creating a Sensitive Data Scanning Rule Group
            • Deleting a Sensitive Data Scanning Rule Group
            • Creating a Sensitive Data Scanning Task
            • Deleting a Sensitive Data Scanning Task
          • Static Data Masking
            • Querying the Data Masking Task Execution List
            • Starting or Stopping a Data Masking Task
          • API Call Records
            • Querying OpenAPI Calls
        • Appendixes
          • Status Codes
          • Error Codes
          • Obtaining a Project ID
          • Configuring a Dynamic Sensitive Data Masking Policy
            • SHA-256/512
            • AES
            • PRESNM
            • MASKNM
            • PRESXY
            • MASKXY
            • SYMBOL
            • KEYWORD
            • NUMERIC
        • Change History
      • SDK Reference
        • SDK Overview
      • FAQs
        • Product Consulting
          1. What is Data Security Center?
          2. Does DSC Store My Data Assets or Files?
          3. What Types of Unstructured Files Can DSC Parse?
        • Regions and AZs
          1. What Are Regions and AZs?
          2. Can DSC Be Used Across Regions?
        • Asset Authorization
          1. Agency Policies Obtained After the Access To Assets Is Allowed
          2. How Do I Troubleshoot the Failure in Connecting to the Added Database?
        • Sensitive Data Identification and Masking
          1. What Services Can Use DSC to Scan for Sensitive Data?
          2. How Long Does It Take for DSC to Identify and Mask Sensitive Data?
          3. What Are the Identification Templates Supported by DSC?
          4. Does Data Masking Affect My Raw Data?
          5. Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
        • Data Watermarking
          1. Will the Source Data Be Modified During Data Watermarking?
          2. Can the Watermark Be Extracted from a Damaged Document?
          3. What Are the Requirements on the Source Data To Be Watermarked?
        • Data Usage Audit
          1. Which Types of Abnormal Events Can Be Identified by DSC?