Data Security Center
Data Security Center
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Service Overview
Infographics
What Is DSC?
Specifications of Different DSC Editions
Functions
Advantages
Billing
Applicable Scenarios
DSC and Related Services
Security
Shared Responsibilities
Identity Authentication and Access Control
Service Access Control
Data Protection Technologies
Audit Logs
Fault Rectification
Update Management
Certificates
Constraints
Personal Data Protection Mechanism
Permissions Management
Billing
Overview
Billing Modes
Overview of Billing Modes
Yearly/Monthly Billing
Pay-Per-Use
Billing Items
Billing Examples
Renewal
Renewal Overview
Manual Renewal
Auto-Renewal
Bills
Arrears
Stopping Billing
Billing FAQs
How Is DSC Billed?
How Do I Renew the Purchased DSC Before It Expires?
How Do I Unsubscribe from DSC?
Getting Started
Classification and Grading of Data Assets on the Cloud
Getting Started with Common Practices
User Guide
Service Provisioning
Buying DSC
Upgrading Edition and Specifications
Allowing or Disallowing Access to Cloud Assets
Asset Map
Asset Management
Asset Center
Overview
Adding OBS Assets
Authorizing Access to Database Assets
Authorizing Access to Big Data Assets
Adding a Log Stream
Managing Asset by Group
Metadata Tasks
Creating a Metadata Collection Task
Running a Metadata Collection Task
Data Exploration
Asset Catalog
Sensitive Data Identification
Overview of Sensitive Data Identification
Sensitive Data Identification Configuration
Creating an Identification Template
Managing Identification Templates
Customizing a Rule
Editing a Rule
Viewing Built-in Rules
Adding a Sensitive Level
Managing Levels
Sensitive Data Identification Tasks
Creating an Identification Task
Starting a Task
Identification Tasks
Identification Results
Policy Center
Policy Baseline
Overview
Data Collection
Data Transmission
Data Storage
Data Use
Data Sharing
Data Destruction
Policy Management
Transfer Log Collection
Data Asset Protection
Data Masking
Overview
Configuring a Data Masking Rule
Static Data Masking
Creating a Database Data Masking Task
Creating an Elasticsearch Data Masking Task
Creating an MRS Data Masking Task
Creating a Hive Masking Task
Creating an HBase Masking Task
Creating a DLI Masking Task
Creating an OBS Masking Task
Data Watermarking
Overview
Injecting Watermarks
Injecting Watermarks to Databases
Injecting Watermarks to Documents
Injecting Watermarks to Images
Extracting Watermarks
Extracting Watermarks from Databases
Extracting Watermarks from Documents
Extracting Watermarks from Images
(Optional) Configuring GaussDB(DWS) and MRS Hive
Data Security Operations
Situational Awareness Dashboard
Data Transfer Details
Event Management
Alarm Management
OBS Usage Audit
Watermarks
Extracting Watermarks from Databases
Extracting Watermarks from an OBS Bucket File
Extracting Watermarks from a Local File
Alarm Notifications
Multi-Account Management
Multi-Account Management Overview
Enable Multi-account Management
Viewing Multi-Account Management
Permissions Management
Creating a User and Assigning DSC Permissions
DSC Custom Policies
DSC Permissions and Supported Actions
Key DSC Operations
Operations Recorded by CTS
Viewing Audit Logs
Best Practices
How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
Best Practices of OBS Data Security Protection
API Reference
Before You Start
Overview
API Calling
Endpoints
Limitations and Constraints
Basic Concepts
Selecting an API Type
Calling APIs
Making an API Request
Authentication
Response
API Description
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
Resource Management
Instance Ordering
Querying Resource Provisioning Information
Dynamic Data Masking
Masking Sensitive Data
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Image Watermarking
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Editing a Data Asset Name
Querying the Data Asset Scanning Authorization
Adding a Data Asset Scanning Authorization
Deleting a Data Asset Scanning Authorization
Document Watermarking
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Sensitive Data Discovery
Querying the Identification Task List
Querying the Result of an Identification Task
Viewing the Rule List
Creating a Sensitive Data Scanning Rule
Modifying a Sensitive Data Scanning Rule
Deleting a Sensitive Data Scanning Rule
Querying Sensitive Data Scanning Rule Groups
Creating a Sensitive Data Scanning Rule Group
Deleting a Sensitive Data Scanning Rule Group
Creating a Sensitive Data Scanning Task
Deleting a Sensitive Data Scanning Task
Static Data Masking
Querying the Data Masking Task Execution List
Starting or Stopping a Data Masking Task
API Call Records
Querying OpenAPI Calls
Appendixes
Status Codes
Error Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
SDK Reference
SDK Overview
FAQs
Product Consulting
What is Data Security Center?
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Identify?
Regions and AZs
What Are Regions and AZs?
Can DSC Be Used Across Regions?
Asset Authorization
Agency Policies Obtained After the Access To Assets Is Allowed
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
What Are the Built-in Identification Rules of DSC?
What Are the Identification Rules in the Built-in Template of DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Data Usage Audit
Which Types of Abnormal Events Can Be Identified by DSC?
How Do I Audit DSC Operation Records?
Videos
More Documents
User Guide (ME-Abu Dhabi Region)
Service Overview
What Is DSC?
Specifications of Different DSC Editions
Functions
Advantages
Billing
Applicable Scenarios
DSC and Related Services
Constraints
Permissions Management
Service Provisioning
Buying DSC
Upgrading Specifications
Unsubscribing from DSC
Assets
Allowing or Disallowing Access to Cloud Assets
Adding Assets in Batches
OBS Assets
Adding OBS Assets
Deleting OBS Assets
Database Assets
Adding an RDS Database
Adding a Database
Adding a Self-Built Database
Editing a Database
Deleting a Database
Big Data Assets
Adding a Big Data Source
Adding a Self-Built Big Data Source
Editing a Big Data Source
Deleting a Big Data Asset
MRS Assets
Adding MRS Assets
Deleting MRS Assets
Overview
Sensitive Data Identification
Identification Rules
Adding a Rule
Viewing the Rule List
Editing a Rule
Deleting a Rule
Adding a Rule to a Rule Group
Identification Rule Groups
Adding a Rule Group
Viewing the Rule Group List
Editing a Rule Group
Deleting a Rule Group
Identification Tasks
Creating a Task
Viewing the Job List
Starting a Job
Editing a Task
Deleting a Task
Downloading a Report
Identification Results
Data Masking
Introduction
Configuring a Data Masking Rule
Static Data Masking
Creating a Data Masking Task
Creating a Database Data Masking Task
Creating a Data Masking Task for Elasticsearch
Creating a Data Masking Task for MRS
Executing a Data Masking Task
Executing a Database Data Masking Task
Executing an Elasticsearch Data Masking Task
Executing an MRS Data Masking Task
Managing a Data Masking Task
Managing a Database Data Masking Task
Managing an Elasticsearch Data Masking Task
Managing an MRS Data Masking Task
Data Watermarking
Overview
Watermark Injection
Watermark Extraction
Alarm Notifications
Permissions Management
Creating a User and Assigning DSC Permissions
DSC Custom Policies
DSC Permissions and Supported Actions
FAQs
Product Consulting
What is Data Security Center?
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Parse?
Adding Data Assets
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
Which Types of Sensitive Data Can Be Identified by DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
How Do I Add Multiple Identification Rule Groups?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Change History
API Reference (ME-Abu Dhabi Region)
Before You Start
Overview
API Calling
Endpoints
Limitations and Constraints
Basic Concepts
Selecting an API Type
Calling APIs
Making an API Request
Authentication
Response
API Description
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
Resource Management
Instance Ordering
Querying Resource Provisioning Information
Dynamic Data Masking
Masking Sensitive Data
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Image Watermarking
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Editing a Data Asset Name
Querying the Data Asset Scanning Authorization
Adding a Data Asset Scanning Authorization
Deleting a Data Asset Scanning Authorization
Document Watermarking
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Sensitive Data Discovery
Querying the Identification Task List
Querying the Result of an Identification Task
Viewing the Rule List
Creating a Sensitive Data Scanning Rule
Modifying a Sensitive Data Scanning Rule
Deleting a Sensitive Data Scanning Rule
Querying Sensitive Data Scanning Rule Groups
Creating a Sensitive Data Scanning Rule Group
Deleting a Sensitive Data Scanning Rule Group
Creating a Sensitive Data Scanning Task
Querying the Database Lineage Graph
Querying the Table Lineage Graph in Pages
Querying Data Linage Graph at the Column Level
Querying the OBS Bucket Lineage Graph
Querying the OBS File Linage Graph in Pages
Static Data Masking
Querying the Data Masking Task Execution List
Starting or Stopping a Data Masking Task
API Call Records
Querying OpenAPI Calls
Appendixes
Status Codes
Error Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
Change History
General Reference
Glossary
Service Level Agreement
White Papers
Endpoints
Permissions