- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Policy Center
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Multi-Account Management
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Built-in Identification Rules of DSC?
- What Are the Identification Rules in the Built-in Identification Template of DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
- Data Watermarking
- Data Usage Audit
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Service Provisioning
- Assets
- Overview
- Sensitive Data Identification
- Data Masking
- Data Watermarking
- Alarm Notifications
- Permissions Management
-
FAQs
- Product Consulting
- Adding Data Assets
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
- Data Watermarking
- Change History
-
API Reference (ME-Abu Dhabi Region)
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Querying the Database Lineage Graph
- Querying the Table Lineage Graph in Pages
- Querying Data Linage Graph at the Column Level
- Querying the OBS Bucket Lineage Graph
- Querying the OBS File Linage Graph in Pages
- Static Data Masking
- API Call Records
- Appendixes
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Asset Catalog
- The labels of Service Domain are created on the Asset Group Management page. You can modify the category label on the Asset Group Management page.
- Data Types
Structured data: The following data types are supported: DWS, PostgreSQL, DMDBMS (Dameng), MySQL, OpenGauss, KingBase (KingBase), TDSQL, SQLServer, Hive, and MRS_HIVE.
Prerequisites
- Access to cloud assets has been authorized. For details, see Allowing or Disallowing Access to Cloud Assets.
- Specific assets have been added or authorized. For details, see Asset Center.
Viewing the Asset Catalog
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane, choose Asset Management > Asset Catalog.
- On the Service Domain or Data Type tab page, view the added data asset information. Data catalog parameters describes related parameters.
You can select a group of data asset on the left to view statistics of a specific data asset on the Service Domain tab page, or select a data type on the left tree to view data asset of a data type on the Data Type tab.
Table 1 Data catalog parameters Parameter
Description
Statistics
Click View Details. On the Sensitive Data Statistics page, statistics are displayed in three dimensions: category, level, and database.
- Sensitive databases/Total databases: the percentage of sensitive databases in all databases.
- Sensitive tables/Total tables: the percentage of sensitive data tables in all data tables.
- Sensitive data columns/Total columns: the percentage of sensitive data columns in all data columns.
NOTE:
WoW indicates the data changes compared with the previous week.
Percentage of Different Levels of Data
Pie chart showing the proportion of sensitive data columns of different security levels in the total data columns
Click View Details. On the Sensitive Data Statistics page, statistics are displayed in three dimensions: category, level, and database.
Top 5 Categories
Top 5 data type with the highest proportion
Click View Details. On the Categorization Result Details page, view the statistics.
Data Volume
Line chart showing the change of data volume over time
Click View Details. On the Sensitive Data Statistics page, statistics are displayed in three dimensions: category, level, and database.
Database Scale Table
Displays the number of databases, tables, and columns that contain sensitive data in a database instance. For details, see Viewing Database Instance Details.
- Database Instance/ID: Database instance name or ID.
- Host port: host port number
- User: username
- Sensitive Databases: Number of databases in the instance that contain sensitive data.
- Sensitive Tables: Number of tables in the instance that contain sensitive data.
- Sensitive Columns: Number of columns in the instance that contain sensitive data.
Viewing Database Instance Details
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane, choose Asset Management > Asset Catalog.
- Click the Service Domain or Data Type tab.
- Select a group label or data type on the left and click the database instance name in the Database Scale Table list. The instance Details page is displayed.
View information about all databases in the instance, including the Database Name, Total Tables, Sensitive Tables, Sensitivity Level, Tag, and Last Scan Time.
Click the database name. The Database Details page is displayed, including the Basic Information and Database Tables tab pages.
- The Basic Information tab page displays information such as the database type, version, and name. Click Analyze to perform automatic security level analysis. The security levels of databases and tables are determined based on their column security levels generated in the sensitive data identification results.
- The Database Tables tab page displays the data table name, number of table columns, associated schema, category, and sensitivity level. Click to view details.
Figure 1 Instance details
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot