Data Security Center
Data Security Center
All results for "
" in this service
All results for "
" in this service
What's New
Service Overview
Infographics
What Is DSC?
Specifications of Different DSC Editions
Features
Advantages
Billing
Applicable Scenarios
DSC and Related Services
Security
Shared Responsibilities
Identity Authentication and Access Control
Data Protection Technologies
Audit Logs
Fault Recovery
Update Management
Constraints
Personal Data Protection Mechanism
DSC Permissions Management
Concepts
Billing
Billing Overview
Data Security Center (DSC)
Billing Modes
Billing Mode Overview
Yearly/Monthly Billing
Pay-Per-Use
Billing Items
Billing Examples
API Data Security Protection Instance
Billing Modes
Billing Mode Overview
Yearly/Monthly Billing
Billing Items
Billing Examples
Renewal
Renewal Overview
Manual Renewal
Auto-Renewal
Bills
Arrears
Stopping Billing
Billing FAQs
How Is DSC Billed?
How Do I Renew the Purchased DSC Before It Expires?
How Do I Unsubscribe from DSC?
Getting Started
Usage Process
Classification and Grading of Data Assets on the Cloud
Getting Started with Common Practices
User Guide
Buying DSC
Upgrading Edition and Specifications
Allowing or Disallowing Access to Cloud Assets
Asset Management
Adding and Authorizing Data Assets in DSC
Asset Center Overview
Adding Unstructured OBS Data
Adding and Authorizing Database Assets
Adding and Authorizing Big Data Assets
Adding a Log Stream
Implementing Asset Classification and Grading Through Data Exploration
Managing Asset Groups
Managing Asset Catalogs
Sensitive Data Identification
Overview
Configuring Sensitive Data Identification Policies
Viewing Built-in Rules
Creating an Identification Task
Viewing and Downloading Sensitive Data Identification Results
Data Asset Protection
Data Asset Protection Overview
Data Masking
Data Masking Overview
Configuring and Viewing Masking Rules
Creating a Static Data Masking Task
Data Watermarking
Data Watermarking Overview
Injecting or Extracting Database Watermarks
Injecting or Extracting Document Watermarks
Injecting or Extracting Image Watermarks
(Optional) Configuring GaussDB(DWS) and MRS Hive
API Data Security Protection
Introduction
Purchasing an API Data Security Protection Instance and Binding It to an EIP
Logging In to the Instance Web Console
Applicable Scenarios
Instance Management
Function and Features
System Administrator Operation Guide
Viewing the Home Page
Assets
Overview
Application Services
Endpoints
Accounts
Configuring an Account Analysis Rule
Configuring an Account Group
Sensitive Data
Security Policies
Adding an Allowlist
Access Control
Adding a Basic Access Control Rule
Adding a Denylist
Adding a Traffic Limiting Rule
Enabling a Built-in Rule
Adding a Custom Rule
Adding a Content Replacement Rule
Data Masking
Overview
Adding a Custom Masking Algorithm
Configuring a Masking Template
Adding a Masking Rule
Viewing the Masking Result
Data Watermarking
Overview
Configuring a Watermark Template
Adding a Watermark Rule
Viewing the Watermarking Result
Performing Watermark Tracing
Log Center
Alerts
Viewing Alert Details
Reviewing Alert Logs
Configuring a Policy on the Alerts Page
Retrieval
Viewing Audit Logs
Configuring a Policy on the Retrieval Page
Service Configuration
Adding a Sensitive Data Label
Configuring Client IP Address Parsing Parameters
Managing Certificates
Adding a Classification Label
Adding a Grading Label
System Management
Creating an Account
Switching the Language
Modifying Alarm Settings
Modifying the Page Logo and Copyright Information
Viewing the Device Status
Restarting the Service or Device
Restarting the Service
Restarting a Device
Powering Off a Device
Real-time System Diagnosis
Upgrading the System
Setting Overload Configurations
Network Management
Enabling Bypass
Configuring NIC and Route Information
Viewing HA Information
Backup and Restoration
Backing Up Audit Logs and Configuration Data
Restoring Audit Logs and Configuration Data
Message Notifications
Clearing Data
Automatically Clearing Business Data
Manually Clearing Business Data
Clearing System Run Logs
Viewing Clearance Records
Operation Guide for Security Administrators
User Management
Reviewing an Account
Manually Reviewing an Account
Enabling Automatic Review
Viewing Roles
System O&M
Enabling Security Configurations
Setting Platform Login Security
Updating a Certificate
Setting Account Password Security
Setting Network Access Security
Message Notifications
Operation Guide for Audit Administrators
Viewing Operation Logs
Message Notifications
Data Security Operations
Viewing the Security Awareness Dashboard
Viewing Data Transfer Details
Event Management
Alarm Management
OBS Usage Audit
Watermarks
Viewing the Data Security Situation on the Asset Map
Policy Center
Policy Baseline
Policy Baseline Overview
Configuring a Data Collection Policy
Configuring a Data Transfer Policy
Configuring a Data Storage Policy
Configuring a Data Usage Policy
Configuring a Data Sharing Policy
Configuring a Data Destruction Policy
Policy Management
Transfer Log Collection
Alarm Notifications
Device Management
Device Management Overview
Managing Third-Party Devices
Viewing Device Monitoring Data
Handling Device Alarms
Configuring a Device Management Policy
Multi-Account Management
Overview
Enabling Multi-Account Management
Adding a Member Account
Using IAM to Grant Access to DSC
Using IAM Roles or Policies to Grant Access to DSC
Using IAM Identity Policies to Grant Access to DSC
Key DSC Operations
Operations Recorded by CTS
Viewing CTS Traces in the Trace List
Best Practices
How Do I Prevent Personal Sensitive Data From Being Disclosed During Development and Testing?
Best Practices of OBS Data Security Protection
DSC Security Best Practices
API Reference
Before You Start
Calling APIs
Making an API Request
Authentication
Response
API Description
Database Watermarking
Editing a Watermark Embedding Task
Deleting a Single Watermark Embedding Task
Retrying or Stopping a Watermark Embedding Task
Obtaining the Watermark Embedding Task List
Creating a Watermark Embedding Task
Obtaining the Supported Field Types of the Current UDF
Obtaining the List of Database Watermark Extraction Tasks
Creating a Database Watermark Extraction Task
Deleting Database Watermark Extraction Tasks in Batches
Deleting a Database Watermark Extraction Task
Resource Management
Obtaining the Resource Provisioning Information
Instance Ordering
Asset Map
Updating the Security Protection Policy for Data Assets
Obtaining All Security Group Policies (Including Risks)
Obtaining Details About an Asset on the Asset Map
Obtaining Data Egress Details
Obtaining Data Risk Policy Details
Querying Dynamic Resources on the Asset Map
Obtaining the Security Level of the Current Region
Obtaining Asset Map Scoring Details
Updating the Asset Map Score
Obtaining Assets of All Risk Levels from the Navigation Pane on the Left
Obtaining the Asset List on the Asset Map
Obtaining the Feature List
Setting the Encryption Status of an OBS Bucket
Data Security Operations
Obtaining OBS Audit Log Details
Obtaining the Security Score
Obtaining Task Statistics
Obtain the User Information List
Querying the Threat Trend
Obtaining the Alarm Information List
Obtaining the Event List
Querying Top 5 Risky Assets
Obtaining the Asset Overview
Obtaining the Alarm Overview
Obtaining the Alarm and Event Handling Statistics
Querying Top 5 Attacked Assets
Obtaining Instances of Security Services Integrated with DSC
Obtaining the Event Overview
Obtaining Asset Metadata
Viewing the Alarm List
Viewing the OBS Audit Log List
Obtaining Link Information
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Dynamic Data Masking
Masking Sensitive Data
Image Watermarking
Previewing an Embedded Image Watermark by Address
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Obtaining the Number of User Assets
Updating the Database Instance Information
Updating a Database Asset
Adding a Database Instance Asset
Deleting a Database Asset
Obtaining the ECS Instance List
Obtaining Server NIC Information
Obtaining OBS Storage Information
Obtaining Asset Quotas
Obtaining the VPC Subnet List
Obtaining Tag Information About Files in an OBS Bucket
Performing Operations on Metadata of a Data Instance
Asset Center Statistics
Obtaining the Asset Instance List
Obtaining the LTS Log Group List
Obtaining the Log Stream List in an LTS Log Group
Obtaining the Big Data Instance List in the Asset Center
Querying Database Instances in the Asset Center
Querying Databases of a Big Data Instance in the Asset Center
Querying Databases of a Database Instance in the Asset Center
Querying Authorized Databases of a Database Instance in the Asset Center
Adding Database Assets in Batches
Deleting OBS Assets in Batches
Obtaining the Latest Scan Task Details of an Asset
Viewing the OBS Asset List
Adding an OBS Asset
Querying User Authorization Information
Authorizing or De-authorizing an Asset
Querying the Big Data Asset List
Adding a Big Data Asset
Updating a Big Data Asset
Deleting a Big Data Asset
Testing Asset Connectivity
Configuring Operation Audit for an OBS Bucket Asset
Editing an Asset Name
Deleting an OBS Asset
Sensitive Data Discovery
Querying the Scan Rule Group List (To Be Discontinued)
Creating a Scan Rule Group (To Be Discontinued)
Obtaining the Status of the Task for Exporting the Identification Template
Downloading the Excel Template for Adding Rules in Batches
Obtaining the Scan Scope Configurations of a Specified Job
Obtaining the Filtering Data of the User Check Results
Viewing the Rule List (To Be Discontinued)
Creating a Scan Rule (To Be Discontinued)
Modifying a Scan Rule (To Be Discontinued)
Deleting a Scan Rule Group (To Be Discontinued)
Deleting a Scan Rule (To Be Discontinued)
Querying the Scan Task List (To Be Deprecated)
Querying the Scan Result of a Specified Task (To Be Brought Offline)
Document Watermarking
Adding Watermarks to Multiple Documents
Extracting Watermarks from Multiple Documents
Obtaining the File Information of the Current Bucket
Obtaining Log Details of a Specified Watermark Embedding Task
Logs of Watermark Embedding Tasks
Deleting a Watermark Embedding Task Log
Obtaining Log Details of a Specified Watermark Extraction Task
Logs of Watermark Extraction Tasks
Deleting a Watermark Extraction Task Log
Obtaining Information About All Buckets Under an Account
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Static Data Masking
Querying the Database Masking Task Execution
Enabling or Disabling the Database Masking Task
Check whether the masking task name already exists.
Querying Encryption and Masking Configurations
Creating an Encryption and Masking Configuration
Updating the Encryption and Masking Configuration
Deleting the Encryption and Masking Configuration
Obtaining the Mapping Between Fields and Algorithms
Updating the Enabling or Disabling Status of an Elasticsearch Data Masking Task
Updating the Status of the Database Masking Function
Updating the Enabling/Disabling Status of a Database Masking Task
Obtaining the Masking Switch Status
Updating the Status of the Masking Function
Creating a Masking Algorithm
Obtaining the Masking Algorithms by Field Type and Algorithm Type
Editing a Masking Algorithm
Deleting a Masking Algorithm
Testing the Algorithm and Returning the Masking Result
Obtaining the Type List of All ESs of a Tenant
Obtaining the Field List of the Elasticsearch Index
Obtaining Elasticsearch Data Masking Tasks
Adding an Elasticsearch Data Masking Task
Obtaining Details of a Specified Elasticsearch Data Masking Task
Deleting an Elasticsearch Data Masking Task
Editing an Elasticsearch Data Masking Task
Start/Stop an Elasticsearch Data Masking Task
Obtaining the Column List of a Database Table
Querying the Database Masking Task List
Creating a Database Masking Task
Querying the Database Masking Task Details
Deleting a Database Masking Task
Editing a Database Masking Task
Querying the Masking Algorithm List of a Specified Type
Industrial Drawing Watermark
Adding Watermarks to Industrial Drawings
Extracting Invisible Watermarks from Industrial Drawings
Adding Watermarks to Industrial Drawings in Batches
Obtaining Details About a Task for Adding Watermarks to Industrial Drawings in Batches
Extracting Watermarks from Industrial Drawings in Batches
Obtaining Details About a Task for Extracting Watermarks from Industrial Drawings in Batches
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
API Call Records
Querying OpenAPI Calls
Metadata and Asset Catalogs
Querying Databases in an Asset Catalog
Obtaining the Metadata Scan Instance List
Querying OBS Buckets in an Asset Catalog
Obtaining the Download Task Status in the Asset Catalog
Obtaining the Progress of Uploading Classification and Grading Results
Obtaining the Download URL in the Asset Catalog
Reanalyzing and Updating Data Classification and Grading Labels
Batch Updating Metadata Fields
Managing Metadata Tasks
Creating Metadata Labels
Batch Deleting Metadata Labels
Querying Top 5 Asset Catalogs
Querying the Status of a Task for Reanalyzing and Updating Data Classification and Grading Labels
Updating a Metadata Task
Querying Metadata Keyword Information
Obtaining the Tree Structure of Asset Group Labels
Creating an Asset Group Label
Deleting an Asset Group Label
Binding Assets to a Group by Label
Querying Sensitive Data Classification Dimensions
Querying the Sensitive Data in Databases
Querying Sensitive Data Grading Dimensions
Querying the Sensitive Data Details in OBS Buckets
Querying Data Volume Changes in an Asset Catalog
Querying Asset Catalog Statistics Charts
Querying Asset Catalog Statistics
Obtaining the Metadata General Information List
Batch Deleting Metadata Tasks
Creating a Metadata Scan Task
Sensitive Data Identification
Querying the List of Sensitive Data Identification Tasks
Querying the Sub-task List of a Sensitive Data Identification Task
Obtaining the List of Sensitive Data Levels
Obtaining the Sensitivity Level of Data
Obtaining the Security Level Distribution Information of the Sensitive Data Identification Result
Obtaining the Top 10 Matched Rules in the Sensitive Data Identification Result
Obtaining Details About Sensitive Data Classification Results
Obtaining the Classification and Grading Templates for Sensitive Data Identification
Obtaining the Scan Rules of a Specified Identification Template
Importing Rules in Batches
Exporting the Template Content
Creating an Export Task for Sensitive Data Identification Results
Querying the List of Buckets Available for Exporting Sensitive Data Results
Disabling/Enabling a Classification
Modifying Template Rule Associations in Batches
Modifying the Rule Status
Updating the Sensitive Data Identification Result
Adding a Scan Rule
Querying Scan Rule Details
Updating a Scan Rule
Deleting a Scan Rule
Testing Scan Rules
Adding a Sensitivity Level
Updating the Classification
Deleting a Sensitivity Level
Adjusting the Classification Sequence
Updating the Identification Template Information
Deleting an Identification Template
Adding a Category to a Specified Template
Modifying the Classification Information of a Specified Template
Deleting the Sensitivity Level of a Specified Template (To Be Discontinued)
Starting a Scan Task
Stopping a Scan Task
Stopping a Scan Job
Obtaining the Download URL for Exporting the Asset Classification and Grading Result (Generate the Result File First)
Deleting Sensitivity Levels of a Specified Template in Batches
Importing Sensitivity Levels in Batches
Deleting Template Rule Associations in Batches
Creating an Identification Template
Creating a Sensitive Data Scanning Task
Deleting a Scan Task
Deleting a Scan Job
Policy Center
Querying Protection Policy Baseline Configuration
Modifying Security Protection Measures in Batches
Modifying Security Protection Measures in Batches
Querying Data Protection Measures Based on Data Lifecycle
Adding a Protection Measure
Deleting a Protection Measure
Querying the VPC Endpoint Quota
Querying DBSS Instance Information
Querying DBSS Audit Instance Information
Obtaining the Security Policy List
Enabling or Disabling a Security Policy
Adding a Security Policy
Obtaining the Masking Algorithms (To Be Discontinued)
Obtaining the Asset Classification and Grading Result (To Be Discontinued)
Querying the Data Protection Type
Device Management
Editing a Policy
Deleting a Policy
Obtaining the Device Status List
Obtaining the Device List
Adding a Device
Obtaining the Policy List
Creating a Policy
Updating Device Information
Deleting a Device
Querying Masking Algorithms
Obtaining the Alarm Information
API Application Security Gateway Management
Resetting a Password
Querying Instance Resource Specifications
Obtaining the Instance List
Creating an Instance
Obtaining ADG Instance Details
Deleting an API Application Security Gateway Instance
Binding an EIP
Obtaining Node Metrics
Unbinding an EIP
Obtaining the AZ List of an ECS
Data Transfer
Enabling Data Transfer Monitoring for an Instance
Obtaining the Data Transfer Instance List
Deleting Database Instances in Batches
Deleting Database Instances in Batches
Data Identification
Updating a Task
Enabling or Disabling a Task
Delivering a Decryption Policy
Delivering a Decryption Policy
Multi-Account Management
Viewing the Organization Information of the Account
Obtaining the Accounts of an Organization
Enabling a Trusted Service
Obtaining the OU Tree by Account
Obtaining the Asset Statistics of an Account in an Organization
Obtaining the OU List of an Organization
Asset Center
Adding Big Data Instances to the Asset Center
Masking Rules
Obtaining Details About a KMS Key
Obtaining the Basic Rule Information List
Obtaining the Basic Rule Information List
Permissions and Supported Actions
Introduction to Permissions Policies and Supported Actions
Actions Supported by Policy-based Authorization
Actions Supported by Identity Policy-based Authorization
Appendix
Status Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
Error Codes
SDK Reference
SDK Overview
FAQs
Product Consulting
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Identify?
Regions and AZs
What Are Regions and AZs?
Can DSC Be Used Across Regions?
Asset Authorization
Agency Policies Obtained After the Access To Assets Is Allowed
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
What Are the Built-in Identification Rules of DSC?
What Are the Identification Rules in the Built-in Identification Template of DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Data Usage Audit
Which Types of Abnormal Events Can Be Identified by DSC?
How Do I Audit DSC Operation Records?
Videos
More Documents
User Guide (ME-Abu Dhabi Region)
Service Overview
What Is DSC?
Specifications of Different DSC Editions
Functions
Advantages
Billing
Applicable Scenarios
DSC and Related Services
Constraints
Permissions Management
Service Provisioning
Buying DSC
Upgrading Specifications
Unsubscribing from DSC
Assets
Allowing or Disallowing Access to Cloud Assets
Adding Assets in Batches
OBS Assets
Adding OBS Assets
Deleting OBS Assets
Database Assets
Adding an RDS Database
Adding a Database
Adding a Self-Built Database
Editing a Database
Deleting a Database
Big Data Assets
Adding a Big Data Source
Adding a Self-Built Big Data Source
Editing a Big Data Source
Deleting a Big Data Asset
MRS Assets
Adding MRS Assets
Deleting MRS Assets
Overview
Sensitive Data Identification
Identification Rules
Adding a Rule
Viewing the Rule List
Editing a Rule
Deleting a Rule
Adding a Rule to a Rule Group
Identification Rule Groups
Adding a Rule Group
Viewing the Rule Group List
Editing a Rule Group
Deleting a Rule Group
Identification Tasks
Creating a Task
Viewing the Job List
Starting a Job
Editing a Task
Deleting a Task
Downloading a Report
Identification Results
Data Masking
Introduction
Configuring a Data Masking Rule
Static Data Masking
Creating a Data Masking Task
Creating a Database Data Masking Task
Creating a Data Masking Task for Elasticsearch
Creating a Data Masking Task for MRS
Executing a Data Masking Task
Executing a Database Data Masking Task
Executing an Elasticsearch Data Masking Task
Executing an MRS Data Masking Task
Managing a Data Masking Task
Managing a Database Data Masking Task
Managing an Elasticsearch Data Masking Task
Managing an MRS Data Masking Task
Data Watermarking
Overview
Watermark Injection
Watermark Extraction
Alarm Notifications
Permissions Management
Creating a User and Assigning DSC Permissions
DSC Custom Policies
DSC Permissions and Supported Actions
FAQs
Product Consulting
What is Data Security Center?
Does DSC Store My Data Assets or Files?
What Types of Unstructured Files Can DSC Parse?
Adding Data Assets
How Do I Troubleshoot the Failure in Connecting to the Added Database?
Sensitive Data Identification and Masking
What Services Can Use DSC to Scan for Sensitive Data?
How Long Does It Take for DSC to Identify and Mask Sensitive Data?
Which Types of Sensitive Data Can Be Identified by DSC?
Does Data Masking Affect My Raw Data?
Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
How Do I Add Multiple Identification Rule Groups?
Data Watermarking
Will the Source Data Be Modified During Data Watermarking?
Can the Watermark Be Extracted from a Damaged Document?
What Are the Requirements on the Source Data To Be Watermarked?
Change History
API Reference (ME-Abu Dhabi Region)
Before You Start
Overview
API Calling
Endpoints
Limitations and Constraints
Basic Concepts
Selecting an API Type
Calling APIs
Making an API Request
Authentication
Response
API Description
Data Watermarking
Injecting a Data Watermark
Extracting a Data Watermark
Resource Management
Instance Ordering
Querying Resource Provisioning Information
Dynamic Data Masking
Masking Sensitive Data
Alarm Notifications
Querying an Alarm Notification Topic
Modifying an Alarm Notification Topic
Image Watermarking
Injecting Invisible Watermarks into Images
Extracting Invisible Text Watermarks
Extracting Invisible Watermarks from Images
Injecting Invisible Watermarks into Images (Image Addresses)
Extracting Dark Watermarks from Images (Image Addresses)
Extracting Invisible Image Watermarks from Images (Image Addresses)
Asset Management
Editing a Data Asset Name
Querying the Data Asset Scanning Authorization
Adding a Data Asset Scanning Authorization
Deleting a Data Asset Scanning Authorization
Document Watermarking
Injecting Watermarks into Documents
Extracting Invisible Watermarks
Injecting Watermarks into Documents (Document Addresses)
Extracting Invisible Watermarks from Documents (Document Addresses)
Sensitive Data Discovery
Querying the Identification Task List
Querying the Result of an Identification Task
Viewing the Rule List
Creating a Sensitive Data Scanning Rule
Modifying a Sensitive Data Scanning Rule
Deleting a Sensitive Data Scanning Rule
Querying Sensitive Data Scanning Rule Groups
Creating a Sensitive Data Scanning Rule Group
Deleting a Sensitive Data Scanning Rule Group
Creating a Sensitive Data Scanning Task
Querying the Database Lineage Graph
Querying the Table Lineage Graph in Pages
Querying Data Linage Graph at the Column Level
Querying the OBS Bucket Lineage Graph
Querying the OBS File Linage Graph in Pages
Static Data Masking
Querying the Data Masking Task Execution List
Starting or Stopping a Data Masking Task
API Call Records
Querying OpenAPI Calls
Appendixes
Status Codes
Error Codes
Obtaining a Project ID
Configuring a Dynamic Sensitive Data Masking Policy
SHA-256/512
AES
PRESNM
MASKNM
PRESXY
MASKXY
SYMBOL
KEYWORD
NUMERIC
Change History
General Reference
Glossary
Shared Responsibilities
Service Level Agreement
White Papers
Endpoints
Permissions