- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- Change History
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Identification Templates Supported by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Data Watermarking
- Data Usage Audit
Alarm Management
When a system or service alarm is generated from the DBSS service, the alarm is pushed to the DSC in real time. Users can check and handle the alarm. Alarms are stored in the DSC for 30 days.
Prerequisites
DBSS has been enabled and there are assets on it.
Procedure
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation tree on the left, choose Data Security Operations > Alarm Management. The Alarm Management page is displayed.
- You can view the unhandled alarms, alarm sources, and total number of alarms.
Figure 1 Alarm doughnut chart
- View the alarm list. For details about the parameters, see Table 1.
Table 1 Data risk alarm parameters Parameter
Description
Alarm Name/ID
Indicates the name of the alarm source. An alarm should denote the content of the alarm. You can click an alarm name to view details about the alarm, including basic alarm information, handling suggestions, and attack information.
Alarm Level
There are 5 alarm severity levels:
- Suggestion
- Low
- Medium
- High
- Critical
Subcategory/Category
Alarm source types are as follows:
- Database attacks
- API attacks
Source
Database Audit, Database Security Gateway, and API Security Gateway instances
Status
The status options are:
- Open
- Blocked
- Closed
Affected Assets
Affected database assets or APIs.
Verification Status
Its value can be:
- Unknown
- Confirmed
- False
Owner
Username.
Created
Time the alarm was created.
Occurred On
Time when an alarm occurs for the first time.
Related Operations
- Convert to event.
- Click Convert to Event in the Operation column of the alarm list. The Convert to Event page is displayed.
- Enter the parameters, as shown in Table 2.
- Click OK to convert an alarm to an event. You can view the converted event on the Event Management page.
- Close
Click Close in the Operation column of the alarm list to disable the alarm.
- Edit
Click More > Edit in the Operation column of the alarm list to edit the alarm.
- Delete
Click More > Delete in the Operation column of the alarm list to delete the alarm.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.