Data Security Center
Data Security Center
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Service Overview
Infographics
What Is DSC?
Specifications of Different DSC Editions
Functions
Advantages
Billing
Applicable Scenarios
DSC and Related Services
Security
Shared Responsibilities
Identity Authentication and Access Control
Data Protection Technologies
Audit Logs
Fault Recovery
Update Management
Constraints
Personal Data Protection Mechanism
Permissions Management
Concepts
Billing
Billing Overview
Data Security Center (DSC)
Billing Modes
Billing Mode Overview
Yearly/Monthly Billing
Pay-Per-Use
Billing Items
Billing Examples
API Data Security Protection Instance
Billing Modes
Billing Mode Overview
Yearly/Monthly Billing
Billing Items
Billing Examples
Renewal
Renewal Overview
Manual Renewal
Auto-Renewal
Bills
Arrears
Stopping Billing
Billing FAQs
How Is DSC Billed?
How Do I Renew the Purchased DSC Before It Expires?
How Do I Unsubscribe from DSC?
Getting Started
Usage Process
Classification and Grading of Data Assets on the Cloud
Getting Started with Common Practices
User Guide
Buying DSC
Upgrading Edition and Specifications
Allowing or Disallowing Access to Cloud Assets
Asset Management
Adding and Authorizing Data Assets in DSC
Asset Center Overview
Adding an OBS Asset
Adding and Authorizing Database Assets
Adding and Authorizing Big Data Assets
Adding a Log Stream
Implementing Asset Classification and Grading Through Data Exploration
Managing Asset Groups
Managing Asset Catalogs
Sensitive Data Identification
Overview
Configuring Sensitive Data Identification Policies
Viewing Built-in Rules
Creating an Identification Task
Viewing and Downloading Sensitive Data Identification Results
Data Asset Protection
Data Asset Protection Overview
Data Masking
Data Masking Overview
Configuring and Viewing Masking Rules
Creating a Static Data Masking Task
Data Watermarking
Data Watermarking Overview
Injecting or Extracting Database Watermarks
Injecting or Extracting Document Watermarks
Injecting or Extracting Image Watermarks
(Optional) Configuring GaussDB(DWS) and MRS Hive
API Data Security Protection
Purchasing an API Data Security Protection Instance and Binding It to an EIP
API Data Security Protection Overview
Function and Features
Applicable Scenarios
Instance Management
Viewing Instance Details
Enabling an Instance
Disabling an Instance
Restarting an Instance
Restarting the Service
Unbinding an EIP
Resetting a Password
Upgrading a Version
Logging In to the Instance Web Console
System Administrator Operation Guide
Viewing the Home Page
Assets
Overview
Application Services
Endpoints
Accounts
Configuring an Account Analysis Rule
Configuring an Account Group
Sensitive Data
Security Policies
Adding an Allowlist
Access Control
Adding a Basic Access Control Rule
Adding a Denylist
Adding a Traffic Limiting Rule
Enabling a Built-in Rule
Adding a Custom Rule
Adding a Content Replacement Rule
Data Masking
Overview
Adding a Custom Masking Algorithm
Configuring a Masking Template
Adding a Masking Rule
Viewing the Masking Result
Data Watermarking
Overview
Configuring a Watermark Template
Adding a Watermark Rule
Viewing the Watermarking Result
Performing Watermark Tracing
Log Center
Alerts
Viewing Alert Details
Reviewing Alert Logs
Configuring a Policy on the Alerts Page
Retrieval
Viewing Audit Logs
Configuring a Policy on the Retrieval Page
Service Configuration
Adding a Sensitive Data Label
Configuring Client IP Address Parsing Parameters
Managing Certificates
Adding a Classification Label
Adding a Grading Label
System Management
Creating an Account
Switching the Language
Modifying Alarm Settings
Viewing the Device Status
Restarting the Service or Device
Restarting the Service
Restarting a Device
Powering Off a Device
Real-time System Diagnosis
Upgrading the System
Setting Overload Configurations
Network Management
Enabling Bypass
Configuring NIC and Route Information
Viewing HA Information
Backup and Restoration
Backing Up Audit Logs and Configuration Data
Restoring Audit Logs and Configuration Data
Message Notifications
Clearing Data
Automatically Clearing Business Data
Manually Clearing Business Data
Clearing System Run Logs
Viewing Clearance Records
Operation Guide for Security Administrators
User Management
Reviewing an Account
Manually Reviewing an Account
Enabling Automatic Review
Viewing Roles
System O&M
Enabling Security Configurations
Setting Platform Login Security
Updating a Certificate
Setting Account Password Security
Setting Network Access Security
Message Notifications
Operation Guide for Audit Administrators
Viewing Operation Logs
Message Notifications
Data Security Operations
Viewing the Security Awareness Dashboard
Viewing Data Transfer Details
Event Management
Alarm Management
OBS Usage Audit
Watermarks
Viewing the Data Security Situation on the Asset Map
Policy Center
Policy Baseline
Policy Baseline Overview
Configuring a Data Collection Policy
Configuring a Data Transfer Policy
Configuring a Data Storage Policy
Configuring a Data Usage Policy
Configuring a Data Sharing Policy
Configuring a Data Destruction Policy
Policy Management
Transfer Log Collection
Alarm Notifications
Multi-Account Management
Multi-Account Management Overview
Enabling Multi-Account Management
Viewing Multi-Account Management
Permissions Management
Creating a User and Assigning DSC Permissions
DSC Custom Policies
DSC Permissions and Supported Actions
Key DSC Operations
Operations Recorded by CTS
Viewing CTS Traces in the Trace List
Best Practices
How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
Best Practices of OBS Data Security Protection
DSC Security Best Practices
API Reference
Before You Start
Calling APIs
Making an API Request
Authentication
Response
API Description
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
Resource Management
Instance Ordering
Querying Resource Provisioning Information
Dynamic Data Masking
Masking Sensitive Data
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Image Watermarking
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Editing a Data Asset Name
Querying the Data Asset Scanning Authorization
Adding a Data Asset Scanning Authorization
Deleting a Data Asset Scanning Authorization
Sensitive Data Discovery
Querying the Identification Task List
Querying the Result of an Identification Task
Viewing the Rule List
Creating a Sensitive Data Scanning Rule
Modifying a Sensitive Data Scanning Rule
Deleting a Sensitive Data Scanning Rule
Querying Sensitive Data Scanning Rule Groups
Creating a Sensitive Data Scanning Rule Group
Deleting a Sensitive Data Scanning Rule Group
Creating a Sensitive Data Scanning Task
Deleting a Sensitive Data Scanning Task
Document Watermarking
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Static Data Masking
Querying the Data Masking Task Execution List
Starting or Stopping a Data Masking Task
API Call Records
Querying OpenAPI Calls
Sensitive Data Identification
Querying the List of Sensitive Data Identification Tasks
Querying the Sensitive Data Identification Subtask List of an Asset
Obtaining the Sensitive Data Level List
Obtaining the Security Level List of Sensitive Data
Obtaining the Top 10 Hit Rules in the Sensitive Data Identification Result
Obtaining the List of Sensitive Data Classification Results
Obtaining Classification and Grading Templates for Sensitive Data Identification
Querying the Classification Tree Structure for Sensitive Data Identification.
Querying the Association Relationship Between Template Rules
Appendixes
Status Codes
Error Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
SDK Reference
SDK Overview
FAQs
Product Consulting
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Identify?
Regions and AZs
What Are Regions and AZs?
Can DSC Be Used Across Regions?
Asset Authorization
Agency Policies Obtained After the Access To Assets Is Allowed
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
What Are the Built-in Identification Rules of DSC?
What Are the Identification Rules in the Built-in Identification Template of DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Data Usage Audit
Which Types of Abnormal Events Can Be Identified by DSC?
How Do I Audit DSC Operation Records?
Videos
More Documents
User Guide (ME-Abu Dhabi Region)
Service Overview
What Is DSC?
Specifications of Different DSC Editions
Functions
Advantages
Billing
Applicable Scenarios
DSC and Related Services
Constraints
Permissions Management
Service Provisioning
Buying DSC
Upgrading Specifications
Unsubscribing from DSC
Assets
Allowing or Disallowing Access to Cloud Assets
Adding Assets in Batches
OBS Assets
Adding OBS Assets
Deleting OBS Assets
Database Assets
Adding an RDS Database
Adding a Database
Adding a Self-Built Database
Editing a Database
Deleting a Database
Big Data Assets
Adding a Big Data Source
Adding a Self-Built Big Data Source
Editing a Big Data Source
Deleting a Big Data Asset
MRS Assets
Adding MRS Assets
Deleting MRS Assets
Overview
Sensitive Data Identification
Identification Rules
Adding a Rule
Viewing the Rule List
Editing a Rule
Deleting a Rule
Adding a Rule to a Rule Group
Identification Rule Groups
Adding a Rule Group
Viewing the Rule Group List
Editing a Rule Group
Deleting a Rule Group
Identification Tasks
Creating a Task
Viewing the Job List
Starting a Job
Editing a Task
Deleting a Task
Downloading a Report
Identification Results
Data Masking
Introduction
Configuring a Data Masking Rule
Static Data Masking
Creating a Data Masking Task
Creating a Database Data Masking Task
Creating a Data Masking Task for Elasticsearch
Creating a Data Masking Task for MRS
Executing a Data Masking Task
Executing a Database Data Masking Task
Executing an Elasticsearch Data Masking Task
Executing an MRS Data Masking Task
Managing a Data Masking Task
Managing a Database Data Masking Task
Managing an Elasticsearch Data Masking Task
Managing an MRS Data Masking Task
Data Watermarking
Overview
Watermark Injection
Watermark Extraction
Alarm Notifications
Permissions Management
Creating a User and Assigning DSC Permissions
DSC Custom Policies
DSC Permissions and Supported Actions
FAQs
Product Consulting
What is Data Security Center?
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Parse?
Adding Data Assets
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
Which Types of Sensitive Data Can Be Identified by DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
How Do I Add Multiple Identification Rule Groups?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Change History
API Reference (ME-Abu Dhabi Region)
Before You Start
Overview
API Calling
Endpoints
Limitations and Constraints
Basic Concepts
Selecting an API Type
Calling APIs
Making an API Request
Authentication
Response
API Description
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
Resource Management
Instance Ordering
Querying Resource Provisioning Information
Dynamic Data Masking
Masking Sensitive Data
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Image Watermarking
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Editing a Data Asset Name
Querying the Data Asset Scanning Authorization
Adding a Data Asset Scanning Authorization
Deleting a Data Asset Scanning Authorization
Document Watermarking
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Sensitive Data Discovery
Querying the Identification Task List
Querying the Result of an Identification Task
Viewing the Rule List
Creating a Sensitive Data Scanning Rule
Modifying a Sensitive Data Scanning Rule
Deleting a Sensitive Data Scanning Rule
Querying Sensitive Data Scanning Rule Groups
Creating a Sensitive Data Scanning Rule Group
Deleting a Sensitive Data Scanning Rule Group
Creating a Sensitive Data Scanning Task
Querying the Database Lineage Graph
Querying the Table Lineage Graph in Pages
Querying Data Linage Graph at the Column Level
Querying the OBS Bucket Lineage Graph
Querying the OBS File Linage Graph in Pages
Static Data Masking
Querying the Data Masking Task Execution List
Starting or Stopping a Data Masking Task
API Call Records
Querying OpenAPI Calls
Appendixes
Status Codes
Error Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
Change History
General Reference
Glossary
Service Level Agreement
White Papers
Endpoints
Permissions