Updated on 2023-03-02 GMT+08:00

Identification Results

After the sensitive data identification task is complete, you can view the risk distribution, risk level, and sensitive data location on the Identification Result page.

Prerequisites

At least one sensitive data identification task has been executed.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. In the navigation pane on the left, click and choose Security > Data Security Center.
  4. In the navigation pane, choose Sensitive Data Identification > Identification Result.

    DSC collects statistics on the quantity and distribution of objects at different risk levels such as High, Medium, and Low in big data, database, and OBS assets.

    In addition, DSC provides detailed identification results. In the upper right corner of the identification result list, view the desired result by risk level, task name, data type, or object name. Table 1 describes the parameters in the identification result list.
    Figure 1 Identification results
    Table 1 Identification result parameters

    Parameter

    Description

    Asset

    Name of the asset that can be identified

    Data Type

    • OBS
    • Database
    • Big Data
    • MRS

    Task

    Name of the sensitive data identification task

    Unknown Risk

    Number of assets for which no risk is detected based on the identification rules you set

    Low Risk

    Number of low-risk assets (Level 1 to 3) detected based on the identification rules you set

    Medium Risk

    Number of medium-risk assets (Level 4 to 7) detected based on the identification rules you set

    High Risk

    Number of high-risk assets (Level 8 to 10) detected based on the identification rules you set

    Last Identified

    Latest time when the asset was identified

    Operation

    Click View Details to view the identification results.

  5. Locate the row that contains the identified data asset, click View Details in the Operation column.

    In the upper left corner of the page, select a task name, data type, or object name from the drop-down list box to view the identification result of a specific data asset.

    In the upper right corner of the page, click Download to download the risk result report.

    • Sensitive information distribution
      View the risk distribution of sensitive information, number and proportion of assets at each risk level, and top 10 hit rules.
      Figure 2 Sensitive information distribution
    • Lineage diagram
      View the names, paths, and risk levels of sensitive data in assets.
      Figure 3 Lineage diagram