All Documentation
Data Security Center
Data Security Center
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Service Overview
Infographics
What Is DSC?
Specifications of Different DSC Editions
Functions
Advantages
Applicable Scenarios
DSC and Related Services
Constraints
Personal Data Protection Mechanism
Permissions Management
Billing
Overview
Billing Modes
Overview of Billing Modes
Yearly/Monthly Billing
Pay-Per-Use
Billing Items
Billing Examples
Renewal
Renewal Overview
Manual Renewal
Auto-Renewal
Bills
Arrears
Stopping Billing
Billing FAQs
How Is DSC Billed?
How Do I Renew the Purchased DSC Before It Expires?
How Do I Unsubscribe from DSC?
Getting Started
Procedure for Using DSC
Getting Started with Common Practices
User Guide
Service Provisioning
Buying DSC
Upgrading Edition and Specifications
Asset Map
Asset Management
Assets
Allowing or Disallowing Access to Cloud Assets
Adding Assets in Batches
OBS Assets
Adding OBS Assets
Deleting OBS Assets
Database Assets
Authorizing RDS Databases
Adding a Cloud Database
Adding a Self-Built Database
Editing a Database
Deleting a Database
Big Data Assets
Adding a Cloud ES Data Source
Adding a Self-Built ES Data Source
Adding a DLI Data Source
Adding a Hive Data Source
Adding an HBase Data Source
MRS Assets
Adding MRS Assets
Deleting MRS Assets
Metadata Tasks
Creating a Metadata Collection Task
Running a Metadata Collection Task
Data Exploration
Asset Catalog
Sensitive Data Identification
Overview of Sensitive Data Identification
Sensitive Data Identification Configuration
Creating an Identification Template
Modifying an Identification Template
Customizing a Rule
Editing a Rule
Customizing a Level
Modifying Level Information
Disabling a Level
Sensitive Data Identification Tasks
Creating an Identification Task
Starting a Task
Identification Tasks
Viewing the Identification Result
Data Privacy Protection
Configuring GaussDB(DWS) and MRS Hive
Data Masking
Overview
Configuring a Data Masking Rule
Managing Static Data Masking Tasks
Creating and Running a Database Masking Task
Creating and Running an Elasticsearch Data Masking Task
Creating and Running an MRS Data Masking Task
Creating and Running a Hive Masking Task
Creating and Running an HBase Masking Task
Dynamic Data Masking
Data Watermarking
Overview
Database Watermarking
Inserting Watermarks
Extracting Watermarks
Document Watermarking
Inserting Watermarks
Extracting Watermarks
Data Risk Detection
Viewing Abnormal Behaviors Through Data Usage Audit
Handling Abnormal Behaviors Found in Data Usage Audit
Viewing and Handling Access Key Leaks
Alarm Notifications
Permissions Management
Creating a User and Assigning DSC Permissions
DSC Custom Policies
DSC Permissions and Supported Actions
Key DSC Operations
Operations Recorded by CTS
Viewing Audit Logs
Change History
Best Practices
How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
Best Practices of OBS Data Security Protection
Change History
API Reference
Before You Start
Overview
API Calling
Endpoints
Limitations and Constraints
Basic Concepts
Selecting an API Type
Calling APIs
Making an API Request
Authentication
Response
API Description
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
Resource Management
Instance Ordering
Querying Resource Provisioning Information
Dynamic Data Masking
Masking Sensitive Data
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Image Watermarking
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Editing a Data Asset Name
Querying the Data Asset Scanning Authorization
Adding a Data Asset Scanning Authorization
Deleting a Data Asset Scanning Authorization
Document Watermarking
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Sensitive Data Discovery
Querying the Identification Task List
Querying the Result of an Identification Task
Viewing the Rule List
Creating a Sensitive Data Scanning Rule
Modifying a Sensitive Data Scanning Rule
Deleting a Sensitive Data Scanning Rule
Querying Sensitive Data Scanning Rule Groups
Creating a Sensitive Data Scanning Rule Group
Deleting a Sensitive Data Scanning Rule Group
Creating a Sensitive Data Scanning Task
Deleting a Sensitive Data Scanning Task
Static Data Masking
Querying the Data Masking Task Execution List
Starting or Stopping a Data Masking Task
API Call Records
Querying OpenAPI Calls
Appendixes
Status Codes
Error Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
Change History
SDK Reference
SDK Overview
FAQs
Product Consulting
What is Data Security Center?
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Parse?
Regions and AZs
What Are Regions and AZs?
Can DSC Be Used Across Regions?
Adding Data Assets
Agency Policies Obtained After the Access To Assets Is Allowed
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
Which Types of Sensitive Data Can Be Identified by DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Data Usage Audit
Which Types of Abnormal Events Can Be Identified by DSC?
How Do I Audit DSC Operation Records?
Change History