Data Security Center
Data Security Center

    All results for "" in this service

      All results for "" in this service

      • What's New
      • Function Overview
      • Service Overview
        • Infographics
        • What Is DSC?
        • Specifications of Different DSC Editions
        • Functions
        • Advantages
        • Billing
        • Applicable Scenarios
        • DSC and Related Services
        • Security
          • Shared Responsibilities
          • Identity Authentication and Access Control
          • Data Protection Technologies
          • Audit Logs
          • Fault Recovery
          • Update Management
        • Constraints
        • Personal Data Protection Mechanism
        • Permissions Management
        • Concepts
      • Billing
        • Billing Overview
        • Data Security Center (DSC)
          • Billing Modes
            • Billing Mode Overview
            • Yearly/Monthly Billing
            • Pay-Per-Use
          • Billing Items
          • Billing Examples
        • API Data Security Protection Instance
          • Billing Modes
            • Billing Mode Overview
            • Yearly/Monthly Billing
          • Billing Items
          • Billing Examples
        • Renewal
          • Renewal Overview
          • Manual Renewal
          • Auto-Renewal
        • Bills
        • Arrears
        • Stopping Billing
        • Billing FAQs
          • How Is DSC Billed?
          • How Do I Renew the Purchased DSC Before It Expires?
          • How Do I Unsubscribe from DSC?
      • Getting Started
        • Usage Process
        • Classification and Grading of Data Assets on the Cloud
        • Getting Started with Common Practices
      • User Guide
        • Buying DSC
        • Upgrading Edition and Specifications
        • Allowing or Disallowing Access to Cloud Assets
        • Asset Management
          • Adding and Authorizing Data Assets in DSC
            • Asset Center Overview
            • Adding an OBS Asset
            • Adding and Authorizing Database Assets
            • Adding and Authorizing Big Data Assets
            • Adding a Log Stream
          • Implementing Asset Classification and Grading Through Data Exploration
          • Managing Asset Groups
          • Managing Asset Catalogs
        • Sensitive Data Identification
          • Overview
          • Configuring Sensitive Data Identification Policies
          • Viewing Built-in Rules
          • Creating an Identification Task
          • Viewing and Downloading Sensitive Data Identification Results
        • Data Asset Protection
          • Data Asset Protection Overview
          • Data Masking
            • Data Masking Overview
            • Configuring and Viewing Masking Rules
            • Creating a Static Data Masking Task
          • Data Watermarking
            • Data Watermarking Overview
            • Injecting or Extracting Database Watermarks
            • Injecting or Extracting Document Watermarks
            • Injecting or Extracting Image Watermarks
          • (Optional) Configuring GaussDB(DWS) and MRS Hive
        • API Data Security Protection
          • Purchasing an API Data Security Protection Instance and Binding It to an EIP
          • API Data Security Protection Overview
          • Function and Features
          • Applicable Scenarios
          • Instance Management
            • Viewing Instance Details
            • Enabling an Instance
            • Disabling an Instance
            • Restarting an Instance
            • Restarting the Service
            • Unbinding an EIP
            • Resetting a Password
            • Upgrading a Version
          • Logging In to the Instance Web Console
          • System Administrator Operation Guide
            • Viewing the Home Page
            • Assets
              • Overview
              • Application Services
              • Endpoints
              • Accounts
                • Configuring an Account Analysis Rule
                • Configuring an Account Group
              • Sensitive Data
            • Security Policies
              • Adding an Allowlist
              • Access Control
                • Adding a Basic Access Control Rule
                • Adding a Denylist
                • Adding a Traffic Limiting Rule
              • Enabling a Built-in Rule
              • Adding a Custom Rule
              • Adding a Content Replacement Rule
            • Data Masking
              • Overview
              • Adding a Custom Masking Algorithm
              • Configuring a Masking Template
              • Adding a Masking Rule
              • Viewing the Masking Result
            • Data Watermarking
              • Overview
              • Configuring a Watermark Template
              • Adding a Watermark Rule
              • Viewing the Watermarking Result
              • Performing Watermark Tracing
            • Log Center
              • Alerts
                • Viewing Alert Details
                • Reviewing Alert Logs
                • Configuring a Policy on the Alerts Page
              • Retrieval
                • Viewing Audit Logs
                • Configuring a Policy on the Retrieval Page
            • Service Configuration
              • Adding a Sensitive Data Label
              • Configuring Client IP Address Parsing Parameters
              • Managing Certificates
              • Adding a Classification Label
              • Adding a Grading Label
            • System Management
              • Creating an Account
              • Switching the Language
              • Modifying Alarm Settings
              • Viewing the Device Status
              • Restarting the Service or Device
                • Restarting the Service
                • Restarting a Device
                • Powering Off a Device
              • Real-time System Diagnosis
              • Upgrading the System
              • Setting Overload Configurations
              • Network Management
                • Enabling Bypass
                • Configuring NIC and Route Information
              • Viewing HA Information
              • Backup and Restoration
                • Backing Up Audit Logs and Configuration Data
                • Restoring Audit Logs and Configuration Data
              • Message Notifications
              • Clearing Data
                • Automatically Clearing Business Data
                • Manually Clearing Business Data
                • Clearing System Run Logs
                • Viewing Clearance Records
          • Operation Guide for Security Administrators
            • User Management
              • Reviewing an Account
                • Manually Reviewing an Account
                • Enabling Automatic Review
              • Viewing Roles
            • System O&M
              • Enabling Security Configurations
                • Setting Platform Login Security
                • Updating a Certificate
                • Setting Account Password Security
                • Setting Network Access Security
              • Message Notifications
          • Operation Guide for Audit Administrators
            • Viewing Operation Logs
            • Message Notifications
        • Data Security Operations
          • Viewing the Security Awareness Dashboard
          • Viewing Data Transfer Details
          • Event Management
          • Alarm Management
          • OBS Usage Audit
          • Watermarks
        • Viewing the Data Security Situation on the Asset Map
        • Policy Center
          • Policy Baseline
            • Policy Baseline Overview
            • Configuring a Data Collection Policy
            • Configuring a Data Transfer Policy
            • Configuring a Data Storage Policy
            • Configuring a Data Usage Policy
            • Configuring a Data Sharing Policy
            • Configuring a Data Destruction Policy
          • Policy Management
          • Transfer Log Collection
        • Alarm Notifications
        • Multi-Account Management
          • Multi-Account Management Overview
          • Enabling Multi-Account Management
          • Viewing Multi-Account Management
        • Permissions Management
          • Creating a User and Assigning DSC Permissions
          • DSC Custom Policies
          • DSC Permissions and Supported Actions
        • Key DSC Operations
          • Operations Recorded by CTS
          • Viewing CTS Traces in the Trace List
      • Best Practices
        • How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
        • Best Practices of OBS Data Security Protection
        • DSC Security Best Practices
      • API Reference
        • Before You Start
        • Calling APIs
          • Making an API Request
          • Authentication
          • Response
        • API Description
          • Data Watermarking
            • Injecting a Data Watermark
            • Extracting a Data Watermark
          • Resource Management
            • Instance Ordering
            • Querying Resource Provisioning Information
          • Dynamic Data Masking
            • Masking Sensitive Data
          • Alarm Notifications
            • Querying an Alarm Notification Topic
            • Modifying an Alarm Notification Topic
          • Image Watermarking
            • Injecting Invisible Watermarks into Images
            • Extracting Invisible Text Watermarks
            • Extracting Invisible Watermarks from Images
            • Injecting Invisible Watermarks into Images (Image Addresses)
            • Extracting Dark Watermarks from Images (Image Addresses)
            • Extracting Invisible Image Watermarks from Images (Image Addresses)
          • Asset Management
            • Editing a Data Asset Name
            • Querying the Data Asset Scanning Authorization
            • Adding a Data Asset Scanning Authorization
            • Deleting a Data Asset Scanning Authorization
          • Sensitive Data Discovery
            • Querying the Identification Task List
            • Querying the Result of an Identification Task
            • Viewing the Rule List
            • Creating a Sensitive Data Scanning Rule
            • Modifying a Sensitive Data Scanning Rule
            • Deleting a Sensitive Data Scanning Rule
            • Querying Sensitive Data Scanning Rule Groups
            • Creating a Sensitive Data Scanning Rule Group
            • Deleting a Sensitive Data Scanning Rule Group
            • Creating a Sensitive Data Scanning Task
            • Deleting a Sensitive Data Scanning Task
          • Document Watermarking
            • Injecting Watermarks into Documents
            • Extracting Invisible Watermarks
            • Injecting Watermarks into Documents (Document Addresses)
            • Extracting Invisible Watermarks from Documents (Document Addresses)
          • Static Data Masking
            • Querying the Data Masking Task Execution List
            • Starting or Stopping a Data Masking Task
          • API Call Records
            • Querying OpenAPI Calls
          • Sensitive Data Identification
            • Querying the List of Sensitive Data Identification Tasks
            • Querying the Sensitive Data Identification Subtask List of an Asset
            • Obtaining the Sensitive Data Level List
            • Obtaining the Security Level List of Sensitive Data
            • Obtaining the Top 10 Hit Rules in the Sensitive Data Identification Result
            • Obtaining the List of Sensitive Data Classification Results
            • Obtaining Classification and Grading Templates for Sensitive Data Identification
            • Querying the Classification Tree Structure for Sensitive Data Identification.
            • Querying the Association Relationship Between Template Rules
        • Appendixes
          • Status Codes
          • Error Codes
          • Obtaining a Project ID
          • Configuring a Dynamic Sensitive Data Masking Policy
            • SHA-256/512
            • AES
            • PRESNM
            • MASKNM
            • PRESXY
            • MASKXY
            • SYMBOL
            • KEYWORD
            • NUMERIC
      • SDK Reference
        • SDK Overview
      • FAQs
        • Product Consulting
          1. Does DSC Store My Data Assets or Files?
          2. What Types of Unstructured Files Can DSC Identify?
        • Regions and AZs
          1. What Are Regions and AZs?
          2. Can DSC Be Used Across Regions?
        • Asset Authorization
          1. Agency Policies Obtained After the Access To Assets Is Allowed
          2. How Do I Troubleshoot the Failure in Connecting to the Added Database?
        • Sensitive Data Identification and Masking
          1. What Services Can Use DSC to Scan for Sensitive Data?
          2. How Long Does It Take for DSC to Identify and Mask Sensitive Data?
          3. What Are the Built-in Identification Rules of DSC?
          4. What Are the Identification Rules in the Built-in Identification Template of DSC?
          5. Does Data Masking Affect My Raw Data?
          6. Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
          7. Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
        • Data Watermarking
          1. Will the Source Data Be Modified During Data Watermarking?
          2. Can the Watermark Be Extracted from a Damaged Document?
          3. What Are the Requirements on the Source Data To Be Watermarked?
        • Data Usage Audit
          1. Which Types of Abnormal Events Can Be Identified by DSC?
          2. How Do I Audit DSC Operation Records?
      • Videos
      • More Documents
        • User Guide (ME-Abu Dhabi Region)
          • Service Overview
            • What Is DSC?
            • Specifications of Different DSC Editions
            • Functions
            • Advantages
            • Billing
            • Applicable Scenarios
            • DSC and Related Services
            • Constraints
            • Permissions Management
          • Service Provisioning
            • Buying DSC
            • Upgrading Specifications
            • Unsubscribing from DSC
          • Assets
            • Allowing or Disallowing Access to Cloud Assets
            • Adding Assets in Batches
            • OBS Assets
              • Adding OBS Assets
              • Deleting OBS Assets
            • Database Assets
              • Adding an RDS Database
              • Adding a Database
              • Adding a Self-Built Database
              • Editing a Database
              • Deleting a Database
            • Big Data Assets
              • Adding a Big Data Source
              • Adding a Self-Built Big Data Source
              • Editing a Big Data Source
              • Deleting a Big Data Asset
            • MRS Assets
              • Adding MRS Assets
              • Deleting MRS Assets
          • Overview
          • Sensitive Data Identification
            • Identification Rules
              • Adding a Rule
              • Viewing the Rule List
              • Editing a Rule
              • Deleting a Rule
              • Adding a Rule to a Rule Group
            • Identification Rule Groups
              • Adding a Rule Group
              • Viewing the Rule Group List
              • Editing a Rule Group
              • Deleting a Rule Group
            • Identification Tasks
              • Creating a Task
              • Viewing the Job List
              • Starting a Job
              • Editing a Task
              • Deleting a Task
              • Downloading a Report
            • Identification Results
          • Data Masking
            • Introduction
            • Configuring a Data Masking Rule
            • Static Data Masking
              • Creating a Data Masking Task
                • Creating a Database Data Masking Task
                • Creating a Data Masking Task for Elasticsearch
                • Creating a Data Masking Task for MRS
              • Executing a Data Masking Task
                • Executing a Database Data Masking Task
                • Executing an Elasticsearch Data Masking Task
                • Executing an MRS Data Masking Task
              • Managing a Data Masking Task
                • Managing a Database Data Masking Task
                • Managing an Elasticsearch Data Masking Task
                • Managing an MRS Data Masking Task
          • Data Watermarking
            • Overview
            • Watermark Injection
            • Watermark Extraction
          • Alarm Notifications
          • Permissions Management
            • Creating a User and Assigning DSC Permissions
            • DSC Custom Policies
            • DSC Permissions and Supported Actions
          • FAQs
            • Product Consulting
              • What is Data Security Center?
              • Does DSC Store My Data Assets or Files?
              • What Types of Unstructured Files Can DSC Parse?
            • Adding Data Assets
              • How Do I Troubleshoot the Failure in Connecting to the Added Database?
            • Sensitive Data Identification and Masking
              • What Services Can Use DSC to Scan for Sensitive Data?
              • How Long Does It Take for DSC to Identify and Mask Sensitive Data?
              • Which Types of Sensitive Data Can Be Identified by DSC?
              • Does Data Masking Affect My Raw Data?
              • Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
              • How Do I Add Multiple Identification Rule Groups?
            • Data Watermarking
              • Will the Source Data Be Modified During Data Watermarking?
              • Can the Watermark Be Extracted from a Damaged Document?
              • What Are the Requirements on the Source Data To Be Watermarked?
          • Change History
        • API Reference (ME-Abu Dhabi Region)
          • Before You Start
            • Overview
            • API Calling
            • Endpoints
            • Limitations and Constraints
            • Basic Concepts
            • Selecting an API Type
          • Calling APIs
            • Making an API Request
            • Authentication
            • Response
          • API Description
            • Data Watermarking
              • Injecting a Data Watermark
              • Extracting a Data Watermark
            • Resource Management
              • Instance Ordering
              • Querying Resource Provisioning Information
            • Dynamic Data Masking
              • Masking Sensitive Data
            • Alarm Notifications
              • Querying an Alarm Notification Topic
              • Modifying an Alarm Notification Topic
            • Image Watermarking
              • Injecting Invisible Watermarks into Images
              • Extracting Invisible Text Watermarks
              • Extracting Invisible Watermarks from Images
              • Injecting Invisible Watermarks into Images (Image Addresses)
              • Extracting Dark Watermarks from Images (Image Addresses)
              • Extracting Invisible Image Watermarks from Images (Image Addresses)
            • Asset Management
              • Editing a Data Asset Name
              • Querying the Data Asset Scanning Authorization
              • Adding a Data Asset Scanning Authorization
              • Deleting a Data Asset Scanning Authorization
            • Document Watermarking
              • Injecting Watermarks into Documents
              • Extracting Invisible Watermarks
              • Injecting Watermarks into Documents (Document Addresses)
              • Extracting Invisible Watermarks from Documents (Document Addresses)
            • Sensitive Data Discovery
              • Querying the Identification Task List
              • Querying the Result of an Identification Task
              • Viewing the Rule List
              • Creating a Sensitive Data Scanning Rule
              • Modifying a Sensitive Data Scanning Rule
              • Deleting a Sensitive Data Scanning Rule
              • Querying Sensitive Data Scanning Rule Groups
              • Creating a Sensitive Data Scanning Rule Group
              • Deleting a Sensitive Data Scanning Rule Group
              • Creating a Sensitive Data Scanning Task
              • Querying the Database Lineage Graph
              • Querying the Table Lineage Graph in Pages
              • Querying Data Linage Graph at the Column Level
              • Querying the OBS Bucket Lineage Graph
              • Querying the OBS File Linage Graph in Pages
            • Static Data Masking
              • Querying the Data Masking Task Execution List
              • Starting or Stopping a Data Masking Task
            • API Call Records
              • Querying OpenAPI Calls
          • Appendixes
            • Status Codes
            • Error Codes
            • Obtaining a Project ID
            • Configuring a Dynamic Sensitive Data Masking Policy
              • SHA-256/512
              • AES
              • PRESNM
              • MASKNM
              • PRESXY
              • MASKXY
              • SYMBOL
              • KEYWORD
              • NUMERIC
          • Change History
      • General Reference
        • Glossary
        • Service Level Agreement
        • White Papers
        • Endpoints
        • Permissions