Data Security Center
Data Security Center

    All results for "" in this service

      All results for "" in this service

      • What's New
      • Function Overview
      • Service Overview
        • Infographics
        • What Is DSC?
        • Specifications of Different DSC Editions
        • Functions
        • Advantages
        • Applicable Scenarios
        • DSC and Related Services
        • Constraints
        • Personal Data Protection Mechanism
        • Permissions Management
      • Billing
        • Overview
        • Data Security Center (DSC)
          • Billing Modes
            • Billing Mode Overview
            • Yearly/Monthly Billing
            • Pay-Per-Use
          • Billing Items
          • Billing Examples
        • Renewal
          • Renewal Overview
          • Manual Renewal
          • Auto-Renewal
        • Bills
        • Arrears
        • Stopping Billing
        • Billing FAQs
          • How Is DSC Billed?
          • How Do I Renew the Purchased DSC Before It Expires?
          • How Do I Unsubscribe from DSC?
      • Getting Started
        • Procedure for Using DSC
        • Classification and Grading of Data Assets on the Cloud
        • Getting Started with Common Practices
      • User Guide
        • Service Provisioning
          • Buying DSC
          • Upgrading Edition and Specifications
        • Allowing or Disallowing Access to Cloud Assets
        • Asset Map
        • Asset Management
          • Asset Center
            • Overview
            • Adding OBS Assets
            • Authorizing Access to Database Assets
            • Authorizing Access to Big Data Assets
            • Adding a Log Stream
          • Managing Asset by Group
          • Metadata Tasks
            • Creating a Metadata Collection Task
            • Running a Metadata Collection Task
          • Data Exploration
          • Asset Catalog
        • Sensitive Data Identification
          • Overview of Sensitive Data Identification
          • Sensitive Data Identification Configuration
            • Creating an Identification Template
            • Managing Identification Templates
            • Customizing a Rule
            • Editing a Rule
            • Adding a Sensitive Level
            • Managing Levels
          • Sensitive Data Identification Tasks
            • Creating an Identification Task
            • Starting a Task
            • Identification Tasks
            • Identification Results
        • Data Asset Protection
          • Data Masking
            • Overview
            • Configuring a Data Masking Rule
            • Static Data Masking
              • Creating a Database Data Masking Task
              • Creating an Elasticsearch Data Masking Task
              • Creating an MRS Data Masking Task
              • Creating a Hive Masking Task
              • Creating an HBase Masking Task
              • Creating a DLI Masking Task
          • Data Watermarking
            • Overview
            • Injecting Watermarks
              • Injecting Watermarks to Databases
              • Injecting Watermarks to Documents
              • Injecting Watermarks to Images
            • Extracting Watermarks
              • Extracting Watermarks from Databases
              • Extracting Watermarks from Documents
              • Extracting Watermarks from Images
          • (Optional) Configuring GaussDB(DWS) and MRS Hive
        • Data Security Operations
          • Situational Awareness Dashboard
          • Event Management
          • Alarm Management
          • OBS Usage Audit
          • Watermarks
            • Extracting Watermarks from Databases
            • Extracting Watermarks from an OBS Bucket File
            • Extracting Watermarks from a Local File
        • Alarm Notifications
        • Permissions Management
          • Creating a User and Assigning DSC Permissions
          • DSC Custom Policies
          • DSC Permissions and Supported Actions
        • Key DSC Operations
          • Operations Recorded by CTS
      • Best Practices
        • How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
        • Best Practices of OBS Data Security Protection
      • API Reference
        • Before You Start
          • Overview
          • API Calling
          • Endpoints
          • Limitations and Constraints
          • Basic Concepts
          • Selecting an API Type
        • Calling APIs
          • Making an API Request
          • Authentication
          • Response
        • API Description
          • Data Watermarking
            • Injecting a Data Watermark
            • Extracting a Data Watermark
          • Resource Management
            • Instance Ordering
            • Querying Resource Provisioning Information
          • Dynamic Data Masking
            • Masking Sensitive Data
          • Alarm Notifications
            • Querying an Alarm Notification Topic
            • Modifying an Alarm Notification Topic
          • Image Watermarking
            • Injecting Invisible Watermarks into Images
            • Extracting Invisible Text Watermarks
            • Extracting Invisible Watermarks from Images
            • Injecting Invisible Watermarks into Images (Image Addresses)
            • Extracting Dark Watermarks from Images (Image Addresses)
            • Extracting Invisible Image Watermarks from Images (Image Addresses)
          • Asset Management
            • Editing a Data Asset Name
            • Querying the Data Asset Scanning Authorization
            • Adding a Data Asset Scanning Authorization
            • Deleting a Data Asset Scanning Authorization
          • Document Watermarking
            • Injecting Watermarks into Documents
            • Extracting Invisible Watermarks
            • Injecting Watermarks into Documents (Document Addresses)
            • Extracting Invisible Watermarks from Documents (Document Addresses)
          • Sensitive Data Discovery
            • Querying the Identification Task List
            • Querying the Result of an Identification Task
            • Viewing the Rule List
            • Creating a Sensitive Data Scanning Rule
            • Modifying a Sensitive Data Scanning Rule
            • Deleting a Sensitive Data Scanning Rule
            • Querying Sensitive Data Scanning Rule Groups
            • Creating a Sensitive Data Scanning Rule Group
            • Deleting a Sensitive Data Scanning Rule Group
            • Creating a Sensitive Data Scanning Task
            • Deleting a Sensitive Data Scanning Task
          • Static Data Masking
            • Querying the Data Masking Task Execution List
            • Starting or Stopping a Data Masking Task
          • API Call Records
            • Querying OpenAPI Calls
        • Appendixes
          • Status Codes
          • Error Codes
          • Obtaining a Project ID
          • Configuring a Dynamic Sensitive Data Masking Policy
            • SHA-256/512
            • AES
            • PRESNM
            • MASKNM
            • PRESXY
            • MASKXY
            • SYMBOL
            • KEYWORD
            • NUMERIC
        • Change History
      • SDK Reference
        • SDK Overview
      • FAQs
        • Product Consulting
          1. What is Data Security Center?
          2. Does DSC Store My Data Assets or Files?
          3. What Types of Unstructured Files Can DSC Parse?
        • Regions and AZs
          1. What Are Regions and AZs?
          2. Can DSC Be Used Across Regions?
        • Asset Authorization
          1. Agency Policies Obtained After the Access To Assets Is Allowed
          2. How Do I Troubleshoot the Failure in Connecting to the Added Database?
        • Sensitive Data Identification and Masking
          1. What Services Can Use DSC to Scan for Sensitive Data?
          2. How Long Does It Take for DSC to Identify and Mask Sensitive Data?
          3. What Are the Identification Templates Supported by DSC?
          4. Does Data Masking Affect My Raw Data?
          5. Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
        • Data Watermarking
          1. Will the Source Data Be Modified During Data Watermarking?
          2. Can the Watermark Be Extracted from a Damaged Document?
          3. What Are the Requirements on the Source Data To Be Watermarked?
        • Data Usage Audit
          1. Which Types of Abnormal Events Can Be Identified by DSC?