What Are the Built-in Identification Rules of DSC?
Based on sensitive information in different industries, DSC provides seven types of built-in rules, including sensitive image information, sensitive personal information, and sensitive enterprise information. For details about the built-in rules, see Table 1.
Type |
Type |
---|---|
Personal sensitive images |
|
Personal privacy |
|
Enterprise information |
|
Device information |
|
Key information |
|
Location |
|
Sensitive system information |
|
Common information |
Date |
Sensitive Data Identification and Masking FAQs
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Built-in Identification Rules of DSC?
- What Are the Identification Templates Supported by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbotmore