Data Security Center
Data Security Center

    All results for "" in this service

      All results for "" in this service

      • What's New
      • Service Overview
        • Infographics
        • What Is DSC?
        • Specifications of Different DSC Editions
        • Features
        • Advantages
        • Billing
        • Applicable Scenarios
        • DSC and Related Services
        • Security
          • Shared Responsibilities
          • Identity Authentication and Access Control
          • Data Protection Technologies
          • Audit Logs
          • Fault Recovery
          • Update Management
        • Constraints
        • Personal Data Protection Mechanism
        • DSC Permissions Management
        • Concepts
      • Billing
        • Billing Overview
        • Data Security Center (DSC)
          • Billing Modes
            • Billing Mode Overview
            • Yearly/Monthly Billing
            • Pay-Per-Use
          • Billing Items
          • Billing Examples
        • API Data Security Protection Instance
          • Billing Modes
            • Billing Mode Overview
            • Yearly/Monthly Billing
          • Billing Items
          • Billing Examples
        • Renewal
          • Renewal Overview
          • Manual Renewal
          • Auto-Renewal
        • Bills
        • Arrears
        • Stopping Billing
        • Billing FAQs
          • How Is DSC Billed?
          • How Do I Renew the Purchased DSC Before It Expires?
          • How Do I Unsubscribe from DSC?
      • Getting Started
        • Usage Process
        • Classification and Grading of Data Assets on the Cloud
        • Getting Started with Common Practices
      • User Guide
        • Buying DSC
        • Upgrading Edition and Specifications
        • Allowing or Disallowing Access to Cloud Assets
        • Asset Management
          • Adding and Authorizing Data Assets in DSC
            • Asset Center Overview
            • Adding Unstructured OBS Data
            • Adding and Authorizing Database Assets
            • Adding and Authorizing Big Data Assets
            • Adding a Log Stream
          • Implementing Asset Classification and Grading Through Data Exploration
          • Managing Asset Groups
          • Managing Asset Catalogs
        • Sensitive Data Identification
          • Overview
          • Configuring Sensitive Data Identification Policies
          • Viewing Built-in Rules
          • Creating an Identification Task
          • Viewing and Downloading Sensitive Data Identification Results
        • Data Asset Protection
          • Data Asset Protection Overview
          • Data Masking
            • Data Masking Overview
            • Configuring and Viewing Masking Rules
            • Creating a Static Data Masking Task
          • Data Watermarking
            • Data Watermarking Overview
            • Injecting or Extracting Database Watermarks
            • Injecting or Extracting Document Watermarks
            • Injecting or Extracting Image Watermarks
          • (Optional) Configuring GaussDB(DWS) and MRS Hive
        • API Data Security Protection
          • Introduction
          • Purchasing an API Data Security Protection Instance and Binding It to an EIP
          • Logging In to the Instance Web Console
          • Applicable Scenarios
          • Instance Management
          • Function and Features
          • System Administrator Operation Guide
            • Viewing the Home Page
            • Assets
              • Overview
              • Application Services
              • Endpoints
              • Accounts
                • Configuring an Account Analysis Rule
                • Configuring an Account Group
              • Sensitive Data
            • Security Policies
              • Adding an Allowlist
              • Access Control
                • Adding a Basic Access Control Rule
                • Adding a Denylist
                • Adding a Traffic Limiting Rule
              • Enabling a Built-in Rule
              • Adding a Custom Rule
              • Adding a Content Replacement Rule
            • Data Masking
              • Overview
              • Adding a Custom Masking Algorithm
              • Configuring a Masking Template
              • Adding a Masking Rule
              • Viewing the Masking Result
            • Data Watermarking
              • Overview
              • Configuring a Watermark Template
              • Adding a Watermark Rule
              • Viewing the Watermarking Result
              • Performing Watermark Tracing
            • Log Center
              • Alerts
                • Viewing Alert Details
                • Reviewing Alert Logs
                • Configuring a Policy on the Alerts Page
              • Retrieval
                • Viewing Audit Logs
                • Configuring a Policy on the Retrieval Page
            • Service Configuration
              • Adding a Sensitive Data Label
              • Configuring Client IP Address Parsing Parameters
              • Managing Certificates
              • Adding a Classification Label
              • Adding a Grading Label
            • System Management
              • Creating an Account
              • Switching the Language
              • Modifying Alarm Settings
              • Modifying the Page Logo and Copyright Information
              • Viewing the Device Status
              • Restarting the Service or Device
                • Restarting the Service
                • Restarting a Device
                • Powering Off a Device
              • Real-time System Diagnosis
              • Upgrading the System
              • Setting Overload Configurations
              • Network Management
                • Enabling Bypass
                • Configuring NIC and Route Information
              • Viewing HA Information
              • Backup and Restoration
                • Backing Up Audit Logs and Configuration Data
                • Restoring Audit Logs and Configuration Data
              • Message Notifications
              • Clearing Data
                • Automatically Clearing Business Data
                • Manually Clearing Business Data
                • Clearing System Run Logs
                • Viewing Clearance Records
          • Operation Guide for Security Administrators
            • User Management
              • Reviewing an Account
                • Manually Reviewing an Account
                • Enabling Automatic Review
              • Viewing Roles
            • System O&M
              • Enabling Security Configurations
                • Setting Platform Login Security
                • Updating a Certificate
                • Setting Account Password Security
                • Setting Network Access Security
              • Message Notifications
          • Operation Guide for Audit Administrators
            • Viewing Operation Logs
            • Message Notifications
        • Data Security Operations
          • Viewing the Security Awareness Dashboard
          • Viewing Data Transfer Details
          • Event Management
          • Alarm Management
          • OBS Usage Audit
          • Watermarks
        • Viewing the Data Security Situation on the Asset Map
        • Policy Center
          • Policy Baseline
            • Policy Baseline Overview
            • Configuring a Data Collection Policy
            • Configuring a Data Transfer Policy
            • Configuring a Data Storage Policy
            • Configuring a Data Usage Policy
            • Configuring a Data Sharing Policy
            • Configuring a Data Destruction Policy
          • Policy Management
          • Transfer Log Collection
        • Alarm Notifications
        • Device Management
          • Device Management Overview
          • Managing Third-Party Devices
          • Viewing Device Monitoring Data
          • Handling Device Alarms
          • Configuring a Device Management Policy
        • Multi-Account Management
          • Overview
          • Enabling Multi-Account Management
          • Adding a Member Account
        • Using IAM to Grant Access to DSC
          • Using IAM Roles or Policies to Grant Access to DSC
          • Using IAM Identity Policies to Grant Access to DSC
        • Key DSC Operations
          • Operations Recorded by CTS
          • Viewing CTS Traces in the Trace List
      • Best Practices
        • How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
        • Best Practices of OBS Data Security Protection
        • DSC Security Best Practices
      • API Reference
        • Before You Start
        • Calling APIs
          • Making an API Request
          • Authentication
          • Response
        • API Description
          • Database Watermarking
            • Editing a Watermark Embedding Task
            • Deleting a Single Watermark Embedding Task
            • Retrying or Stopping a Watermark Embedding Task
            • Obtaining the Watermark Embedding Task List
            • Creating a Watermark Embedding Task
            • Obtaining the Supported Field Types of the Current UDF
            • Obtaining the List of Database Watermark Extraction Tasks
            • Creating a Database Watermark Extraction Task
            • Deleting Database Watermark Extraction Tasks in Batches
            • Deleting a Database Watermark Extraction Task
          • Resource Management
            • Obtaining the Resource Provisioning Information
            • Instance Ordering
          • Asset Map
            • Updating the Security Protection Policy for Data Assets
            • Obtaining All Security Group Policies (Including Risks)
            • Obtaining Details About an Asset on the Asset Map
            • Obtaining Data Egress Details
            • Obtaining Data Risk Policy Details
            • Querying Dynamic Resources on the Asset Map
            • Obtaining the Security Level of the Current Region
            • Obtaining Asset Map Scoring Details
            • Updating the Asset Map Score
            • Obtaining Assets of All Risk Levels from the Navigation Pane on the Left
            • Obtaining the Asset List on the Asset Map
            • Obtaining the Feature List
            • Setting the Encryption Status of an OBS Bucket
          • Data Security Operations
            • Obtaining OBS Audit Log Details
            • Obtaining the Security Score
            • Obtaining Task Statistics
            • Obtain the User Information List
            • Querying the Threat Trend
            • Obtaining the Alarm Information List
            • Obtaining the Event List
            • Querying Top 5 Risky Assets
            • Obtaining the Asset Overview
            • Obtaining the Alarm Overview
            • Obtaining the Alarm and Event Handling Statistics
            • Querying Top 5 Attacked Assets
            • Obtaining Instances of Security Services Integrated with DSC
            • Obtaining the Event Overview
            • Obtaining Asset Metadata
            • Viewing the Alarm List
            • Viewing the OBS Audit Log List
            • Obtaining Link Information
          • Alarm Notifications
            • Querying an Alarm Notification Topic
            • Modifying an Alarm Notification Topic
          • Dynamic Data Masking
            • Masking Sensitive Data
          • Image Watermarking
            • Previewing an Embedded Image Watermark by Address
            • Injecting Invisible Watermarks into Images
            • Extracting Invisible Text Watermarks
            • Extracting Invisible Watermarks from Images
            • Injecting Invisible Watermarks into Images (Image Addresses)
            • Extracting Dark Watermarks from Images (Image Addresses)
            • Extracting Invisible Image Watermarks from Images (Image Addresses)
          • Asset Management
            • Obtaining the Number of User Assets
            • Updating the Database Instance Information
            • Updating a Database Asset
            • Adding a Database Instance Asset
            • Deleting a Database Asset
            • Obtaining the ECS Instance List
            • Obtaining Server NIC Information
            • Obtaining OBS Storage Information
            • Obtaining Asset Quotas
            • Obtaining the VPC Subnet List
            • Obtaining Tag Information About Files in an OBS Bucket
            • Performing Operations on Metadata of a Data Instance
            • Asset Center Statistics
            • Obtaining the Asset Instance List
            • Obtaining the LTS Log Group List
            • Obtaining the Log Stream List in an LTS Log Group
            • Obtaining the Big Data Instance List in the Asset Center
            • Querying Database Instances in the Asset Center
            • Querying Databases of a Big Data Instance in the Asset Center
            • Querying Databases of a Database Instance in the Asset Center
            • Querying Authorized Databases of a Database Instance in the Asset Center
            • Adding Database Assets in Batches
            • Deleting OBS Assets in Batches
            • Obtaining the Latest Scan Task Details of an Asset
            • Viewing the OBS Asset List
            • Adding an OBS Asset
            • Querying User Authorization Information
            • Authorizing or De-authorizing an Asset
            • Querying the Big Data Asset List
            • Adding a Big Data Asset
            • Updating a Big Data Asset
            • Deleting a Big Data Asset
            • Testing Asset Connectivity
            • Configuring Operation Audit for an OBS Bucket Asset
            • Editing an Asset Name
            • Deleting an OBS Asset
          • Sensitive Data Discovery
            • Querying the Scan Rule Group List (To Be Discontinued)
            • Creating a Scan Rule Group (To Be Discontinued)
            • Obtaining the Status of the Task for Exporting the Identification Template
            • Downloading the Excel Template for Adding Rules in Batches
            • Obtaining the Scan Scope Configurations of a Specified Job
            • Obtaining the Filtering Data of the User Check Results
            • Viewing the Rule List (To Be Discontinued)
            • Creating a Scan Rule (To Be Discontinued)
            • Modifying a Scan Rule (To Be Discontinued)
            • Deleting a Scan Rule Group (To Be Discontinued)
            • Deleting a Scan Rule (To Be Discontinued)
            • Querying the Scan Task List (To Be Deprecated)
            • Querying the Scan Result of a Specified Task (To Be Brought Offline)
          • Document Watermarking
            • Adding Watermarks to Multiple Documents
            • Extracting Watermarks from Multiple Documents
            • Obtaining the File Information of the Current Bucket
            • Obtaining Log Details of a Specified Watermark Embedding Task
            • Logs of Watermark Embedding Tasks
            • Deleting a Watermark Embedding Task Log
            • Obtaining Log Details of a Specified Watermark Extraction Task
            • Logs of Watermark Extraction Tasks
            • Deleting a Watermark Extraction Task Log
            • Obtaining Information About All Buckets Under an Account
            • Injecting Watermarks into Documents
            • Extracting Invisible Watermarks
            • Injecting Watermarks into Documents (Document Addresses)
            • Extracting Invisible Watermarks from Documents (Document Addresses)
          • Static Data Masking
            • Querying the Database Masking Task Execution
            • Enabling or Disabling the Database Masking Task
            • Check whether the masking task name already exists.
            • Querying Encryption and Masking Configurations
            • Creating an Encryption and Masking Configuration
            • Updating the Encryption and Masking Configuration
            • Deleting the Encryption and Masking Configuration
            • Obtaining the Mapping Between Fields and Algorithms
            • Updating the Enabling or Disabling Status of an Elasticsearch Data Masking Task
            • Updating the Status of the Database Masking Function
            • Updating the Enabling/Disabling Status of a Database Masking Task
            • Obtaining the Masking Switch Status
            • Updating the Status of the Masking Function
            • Creating a Masking Algorithm
            • Obtaining the Masking Algorithms by Field Type and Algorithm Type
            • Editing a Masking Algorithm
            • Deleting a Masking Algorithm
            • Testing the Algorithm and Returning the Masking Result
            • Obtaining the Type List of All ESs of a Tenant
            • Obtaining the Field List of the Elasticsearch Index
            • Obtaining Elasticsearch Data Masking Tasks
            • Adding an Elasticsearch Data Masking Task
            • Obtaining Details of a Specified Elasticsearch Data Masking Task
            • Deleting an Elasticsearch Data Masking Task
            • Editing an Elasticsearch Data Masking Task
            • Start/Stop an Elasticsearch Data Masking Task
            • Obtaining the Column List of a Database Table
            • Querying the Database Masking Task List
            • Creating a Database Masking Task
            • Querying the Database Masking Task Details
            • Deleting a Database Masking Task
            • Editing a Database Masking Task
            • Querying the Masking Algorithm List of a Specified Type
          • Industrial Drawing Watermark
            • Adding Watermarks to Industrial Drawings
            • Extracting Invisible Watermarks from Industrial Drawings
            • Adding Watermarks to Industrial Drawings in Batches
            • Obtaining Details About a Task for Adding Watermarks to Industrial Drawings in Batches
            • Extracting Watermarks from Industrial Drawings in Batches
            • Obtaining Details About a Task for Extracting Watermarks from Industrial Drawings in Batches
          • Data Watermarking
            • Injecting a Data Watermark
            • Extracting a Data Watermark
          • API Call Records
            • Querying OpenAPI Calls
          • Metadata and Asset Catalogs
            • Querying Databases in an Asset Catalog
            • Obtaining the Metadata Scan Instance List
            • Querying OBS Buckets in an Asset Catalog
            • Obtaining the Download Task Status in the Asset Catalog
            • Obtaining the Progress of Uploading Classification and Grading Results
            • Obtaining the Download URL in the Asset Catalog
            • Reanalyzing and Updating Data Classification and Grading Labels
            • Batch Updating Metadata Fields
            • Managing Metadata Tasks
            • Creating Metadata Labels
            • Batch Deleting Metadata Labels
            • Querying Top 5 Asset Catalogs
            • Querying the Status of a Task for Reanalyzing and Updating Data Classification and Grading Labels
            • Updating a Metadata Task
            • Querying Metadata Keyword Information
            • Obtaining the Tree Structure of Asset Group Labels
            • Creating an Asset Group Label
            • Deleting an Asset Group Label
            • Binding Assets to a Group by Label
            • Querying Sensitive Data Classification Dimensions
            • Querying the Sensitive Data in Databases
            • Querying Sensitive Data Grading Dimensions
            • Querying the Sensitive Data Details in OBS Buckets
            • Querying Data Volume Changes in an Asset Catalog
            • Querying Asset Catalog Statistics Charts
            • Querying Asset Catalog Statistics
            • Obtaining the Metadata General Information List
            • Batch Deleting Metadata Tasks
            • Creating a Metadata Scan Task
          • Sensitive Data Identification
            • Querying the List of Sensitive Data Identification Tasks
            • Querying the Sub-task List of a Sensitive Data Identification Task
            • Obtaining the List of Sensitive Data Levels
            • Obtaining the Sensitivity Level of Data
            • Obtaining the Security Level Distribution Information of the Sensitive Data Identification Result
            • Obtaining the Top 10 Matched Rules in the Sensitive Data Identification Result
            • Obtaining Details About Sensitive Data Classification Results
            • Obtaining the Classification and Grading Templates for Sensitive Data Identification
            • Obtaining the Scan Rules of a Specified Identification Template
            • Importing Rules in Batches
            • Exporting the Template Content
            • Creating an Export Task for Sensitive Data Identification Results
            • Querying the List of Buckets Available for Exporting Sensitive Data Results
            • Disabling/Enabling a Classification
            • Modifying Template Rule Associations in Batches
            • Modifying the Rule Status
            • Updating the Sensitive Data Identification Result
            • Adding a Scan Rule
            • Querying Scan Rule Details
            • Updating a Scan Rule
            • Deleting a Scan Rule
            • Testing Scan Rules
            • Adding a Sensitivity Level
            • Updating the Classification
            • Deleting a Sensitivity Level
            • Adjusting the Classification Sequence
            • Updating the Identification Template Information
            • Deleting an Identification Template
            • Adding a Category to a Specified Template
            • Modifying the Classification Information of a Specified Template
            • Deleting the Sensitivity Level of a Specified Template (To Be Discontinued)
            • Starting a Scan Task
            • Stopping a Scan Task
            • Stopping a Scan Job
            • Obtaining the Download URL for Exporting the Asset Classification and Grading Result (Generate the Result File First)
            • Deleting Sensitivity Levels of a Specified Template in Batches
            • Importing Sensitivity Levels in Batches
            • Deleting Template Rule Associations in Batches
            • Creating an Identification Template
            • Creating a Sensitive Data Scanning Task
            • Deleting a Scan Task
            • Deleting a Scan Job
          • Policy Center
            • Querying Protection Policy Baseline Configuration
            • Modifying Security Protection Measures in Batches
            • Modifying Security Protection Measures in Batches
            • Querying Data Protection Measures Based on Data Lifecycle
            • Adding a Protection Measure
            • Deleting a Protection Measure
            • Querying the VPC Endpoint Quota
            • Querying DBSS Instance Information
            • Querying DBSS Audit Instance Information
            • Obtaining the Security Policy List
            • Enabling or Disabling a Security Policy
            • Adding a Security Policy
            • Obtaining the Masking Algorithms (To Be Discontinued)
            • Obtaining the Asset Classification and Grading Result (To Be Discontinued)
            • Querying the Data Protection Type
          • Device Management
            • Editing a Policy
            • Deleting a Policy
            • Obtaining the Device Status List
            • Obtaining the Device List
            • Adding a Device
            • Obtaining the Policy List
            • Creating a Policy
            • Updating Device Information
            • Deleting a Device
            • Querying Masking Algorithms
            • Obtaining the Alarm Information
          • API Application Security Gateway Management
            • Resetting a Password
            • Querying Instance Resource Specifications
            • Obtaining the Instance List
            • Creating an Instance
            • Obtaining ADG Instance Details
            • Deleting an API Application Security Gateway Instance
            • Binding an EIP
            • Obtaining Node Metrics
            • Unbinding an EIP
            • Obtaining the AZ List of an ECS
          • Data Transfer
            • Enabling Data Transfer Monitoring for an Instance
            • Obtaining the Data Transfer Instance List
          • Deleting Database Instances in Batches
            • Deleting Database Instances in Batches
          • Data Identification
            • Updating a Task
            • Enabling or Disabling a Task
          • Delivering a Decryption Policy
            • Delivering a Decryption Policy
          • Multi-Account Management
            • Viewing the Organization Information of the Account
            • Obtaining the Accounts of an Organization
            • Enabling a Trusted Service
            • Obtaining the OU Tree by Account
            • Obtaining the Asset Statistics of an Account in an Organization
            • Obtaining the OU List of an Organization
          • Asset Center
            • Adding Big Data Instances to the Asset Center
          • Masking Rules
            • Obtaining Details About a KMS Key
          • Obtaining the Basic Rule Information List
            • Obtaining the Basic Rule Information List
        • Permissions and Supported Actions
          • Introduction to Permissions Policies and Supported Actions
          • Actions Supported by Policy-based Authorization
          • Actions Supported by Identity Policy-based Authorization
        • Appendix
          • Status Codes
          • Obtaining a Project ID
          • Configuring a Dynamic Sensitive Data Masking Policy
            • SHA-256/512
            • AES
            • PRESNM
            • MASKNM
            • PRESXY
            • MASKXY
            • SYMBOL
            • KEYWORD
            • NUMERIC
          • Error Codes
      • SDK Reference
        • SDK Overview
      • FAQs
        • Product Consulting
          1. Does DSC Store My Data Assets or Files?
          2. What Types of Unstructured Files Can DSC Identify?
        • Regions and AZs
          1. What Are Regions and AZs?
          2. Can DSC Be Used Across Regions?
        • Asset Authorization
          1. Agency Policies Obtained After the Access To Assets Is Allowed
          2. How Do I Troubleshoot the Failure in Connecting to the Added Database?
        • Sensitive Data Identification and Masking
          1. What Services Can Use DSC to Scan for Sensitive Data?
          2. How Long Does It Take for DSC to Identify and Mask Sensitive Data?
          3. What Are the Built-in Identification Rules of DSC?
          4. What Are the Identification Rules in the Built-in Identification Template of DSC?
          5. Does Data Masking Affect My Raw Data?
          6. Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
          7. Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
        • Data Watermarking
          1. Will the Source Data Be Modified During Data Watermarking?
          2. Can the Watermark Be Extracted from a Damaged Document?
          3. What Are the Requirements on the Source Data To Be Watermarked?
        • Data Usage Audit
          1. Which Types of Abnormal Events Can Be Identified by DSC?
          2. How Do I Audit DSC Operation Records?
      • Videos
      • More Documents
        • User Guide (ME-Abu Dhabi Region)
          • Service Overview
            • What Is DSC?
            • Specifications of Different DSC Editions
            • Functions
            • Advantages
            • Billing
            • Applicable Scenarios
            • DSC and Related Services
            • Constraints
            • Permissions Management
          • Service Provisioning
            • Buying DSC
            • Upgrading Specifications
            • Unsubscribing from DSC
          • Assets
            • Allowing or Disallowing Access to Cloud Assets
            • Adding Assets in Batches
            • OBS Assets
              • Adding OBS Assets
              • Deleting OBS Assets
            • Database Assets
              • Adding an RDS Database
              • Adding a Database
              • Adding a Self-Built Database
              • Editing a Database
              • Deleting a Database
            • Big Data Assets
              • Adding a Big Data Source
              • Adding a Self-Built Big Data Source
              • Editing a Big Data Source
              • Deleting a Big Data Asset
            • MRS Assets
              • Adding MRS Assets
              • Deleting MRS Assets
          • Overview
          • Sensitive Data Identification
            • Identification Rules
              • Adding a Rule
              • Viewing the Rule List
              • Editing a Rule
              • Deleting a Rule
              • Adding a Rule to a Rule Group
            • Identification Rule Groups
              • Adding a Rule Group
              • Viewing the Rule Group List
              • Editing a Rule Group
              • Deleting a Rule Group
            • Identification Tasks
              • Creating a Task
              • Viewing the Job List
              • Starting a Job
              • Editing a Task
              • Deleting a Task
              • Downloading a Report
            • Identification Results
          • Data Masking
            • Introduction
            • Configuring a Data Masking Rule
            • Static Data Masking
              • Creating a Data Masking Task
                • Creating a Database Data Masking Task
                • Creating a Data Masking Task for Elasticsearch
                • Creating a Data Masking Task for MRS
              • Executing a Data Masking Task
                • Executing a Database Data Masking Task
                • Executing an Elasticsearch Data Masking Task
                • Executing an MRS Data Masking Task
              • Managing a Data Masking Task
                • Managing a Database Data Masking Task
                • Managing an Elasticsearch Data Masking Task
                • Managing an MRS Data Masking Task
          • Data Watermarking
            • Overview
            • Watermark Injection
            • Watermark Extraction
          • Alarm Notifications
          • Permissions Management
            • Creating a User and Assigning DSC Permissions
            • DSC Custom Policies
            • DSC Permissions and Supported Actions
          • FAQs
            • Product Consulting
              • What is Data Security Center?
              • Does DSC Store My Data Assets or Files?
              • What Types of Unstructured Files Can DSC Parse?
            • Adding Data Assets
              • How Do I Troubleshoot the Failure in Connecting to the Added Database?
            • Sensitive Data Identification and Masking
              • What Services Can Use DSC to Scan for Sensitive Data?
              • How Long Does It Take for DSC to Identify and Mask Sensitive Data?
              • Which Types of Sensitive Data Can Be Identified by DSC?
              • Does Data Masking Affect My Raw Data?
              • Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
              • How Do I Add Multiple Identification Rule Groups?
            • Data Watermarking
              • Will the Source Data Be Modified During Data Watermarking?
              • Can the Watermark Be Extracted from a Damaged Document?
              • What Are the Requirements on the Source Data To Be Watermarked?
          • Change History
        • API Reference (ME-Abu Dhabi Region)
          • Before You Start
            • Overview
            • API Calling
            • Endpoints
            • Limitations and Constraints
            • Basic Concepts
            • Selecting an API Type
          • Calling APIs
            • Making an API Request
            • Authentication
            • Response
          • API Description
            • Data Watermarking
              • Injecting a Data Watermark
              • Extracting a Data Watermark
            • Resource Management
              • Instance Ordering
              • Querying Resource Provisioning Information
            • Dynamic Data Masking
              • Masking Sensitive Data
            • Alarm Notifications
              • Querying an Alarm Notification Topic
              • Modifying an Alarm Notification Topic
            • Image Watermarking
              • Injecting Invisible Watermarks into Images
              • Extracting Invisible Text Watermarks
              • Extracting Invisible Watermarks from Images
              • Injecting Invisible Watermarks into Images (Image Addresses)
              • Extracting Dark Watermarks from Images (Image Addresses)
              • Extracting Invisible Image Watermarks from Images (Image Addresses)
            • Asset Management
              • Editing a Data Asset Name
              • Querying the Data Asset Scanning Authorization
              • Adding a Data Asset Scanning Authorization
              • Deleting a Data Asset Scanning Authorization
            • Document Watermarking
              • Injecting Watermarks into Documents
              • Extracting Invisible Watermarks
              • Injecting Watermarks into Documents (Document Addresses)
              • Extracting Invisible Watermarks from Documents (Document Addresses)
            • Sensitive Data Discovery
              • Querying the Identification Task List
              • Querying the Result of an Identification Task
              • Viewing the Rule List
              • Creating a Sensitive Data Scanning Rule
              • Modifying a Sensitive Data Scanning Rule
              • Deleting a Sensitive Data Scanning Rule
              • Querying Sensitive Data Scanning Rule Groups
              • Creating a Sensitive Data Scanning Rule Group
              • Deleting a Sensitive Data Scanning Rule Group
              • Creating a Sensitive Data Scanning Task
              • Querying the Database Lineage Graph
              • Querying the Table Lineage Graph in Pages
              • Querying Data Linage Graph at the Column Level
              • Querying the OBS Bucket Lineage Graph
              • Querying the OBS File Linage Graph in Pages
            • Static Data Masking
              • Querying the Data Masking Task Execution List
              • Starting or Stopping a Data Masking Task
            • API Call Records
              • Querying OpenAPI Calls
          • Appendixes
            • Status Codes
            • Error Codes
            • Obtaining a Project ID
            • Configuring a Dynamic Sensitive Data Masking Policy
              • SHA-256/512
              • AES
              • PRESNM
              • MASKNM
              • PRESXY
              • MASKXY
              • SYMBOL
              • KEYWORD
              • NUMERIC
          • Change History
      • General Reference
        • Glossary
        • Shared Responsibilities
        • Service Level Agreement
        • White Papers
        • Endpoints
        • Permissions