All Documents
Data Security CenterData Security Center
- What's New
- Function Overview
- Service Overview
- Getting Started
-
User Guide
- Service Provisioning
- Assets
- Overview
- Sensitive Data Identification
- Data Usage Audit
- Data Masking
- Data Watermarking
- Alarm Notifications
- Permissions Management
- Key DSC Operations
- Change History
- Best Practices
- API Reference
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Adding Data Assets
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
- Data Watermarking
- Data Usage Audit
- Billing, Renewal, and Repurchase After Unsubscription
- Change History
- Videos
Help Center>
Data Security Center>
FAQs>
Sensitive Data Identification and Masking>
Which Types of Sensitive Data Can Be Identified by DSC?
Updated at: Feb 22, 2022 GMT+08:00
Which Types of Sensitive Data Can Be Identified by DSC?
DSC can identify seven types of sensitive data, including sensitive images, personal data, and critical business information. The following table lists the types of sensitive data that can be identified by DSC.
Type |
Sensitive Data |
---|---|
Sensitive image |
|
Personal privacy |
|
Enterprise information |
|
Key information |
|
Device information |
|
Location |
|
Common information |
Date |
Parent topic: Sensitive Data Identification and Masking
Sensitive Data Identification and Masking FAQs
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
more