- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Policy Center
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Multi-Account Management
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Built-in Identification Rules of DSC?
- What Are the Identification Rules in the Built-in Identification Template of DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
- Data Watermarking
- Data Usage Audit
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Service Provisioning
- Assets
- Overview
- Sensitive Data Identification
- Data Masking
- Data Watermarking
- Alarm Notifications
- Permissions Management
-
FAQs
- Product Consulting
- Adding Data Assets
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
- Data Watermarking
- Change History
-
API Reference (ME-Abu Dhabi Region)
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Querying the Database Lineage Graph
- Querying the Table Lineage Graph in Pages
- Querying Data Linage Graph at the Column Level
- Querying the OBS Bucket Lineage Graph
- Querying the OBS File Linage Graph in Pages
- Static Data Masking
- API Call Records
- Appendixes
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Data Exploration
The data exploration page displays the databases, data tables, and data views obtained through metadata tasks. You can add descriptions, tags, security levels, and classifications to manage data assets by level and classification.
Prerequisites
- DSC has been allowed to access the database assets. For details, see Allowing or Disallowing Access to Cloud Assets.
- Metadata has been scanned. For details, see Metadata Tasks.
Procedure
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane, choose Asset Management > Data Exploration.
- Select a display mode from the drop-down list box in the upper left corner.
- Database
- Schema
- Table
- Data Column
- Click a database name.
You can add descriptions, labels, security levels, and categories to databases, data tables, and data views.
Click Analyze to perform automatic security level analysis. The security levels of databases and tables are determined based on their column security levels generated in the sensitive data identification results.
Figure 1 Database details - View detailed information about the database.
- On the data details page, click the Table Information tab.
- Click a table name to view its details.
- Select a table and click Identifier in the upper left corner to add a table identifier. You can select a label or security level..
- Label: Click the Select Label text box to select an added label or enter text and press Enter to add a label temporarily, and click OK.
- Security Level : Select a security level from the Select Security Level drop-down list. The security levels include built-in levels and custom levels. To create a security level, see Adding a Sensitive Level. Select a security level and click OK.
- You can also click the edit button to add information such as the category, security level, label, and description for a single table.
- On the data details page, click the View Information tab.
- Click the view name to view the view details.
- Click the View Information tab, select a view, and click Identifier in the upper left corner to add a view identifier.
- Label: Click the Select Label text box to select an added label or enter text and press Enter to add a label temporarily, and click OK.
- Security Level : Select a security level from the Select Security Level drop-down list. The security levels include built-in levels and custom levels. To create a security level, see Adding a Sensitive Level. Select a security level and click OK.
- You can also click the edit button to add information such as the category, security level, label, and description to the view.
- Click the Schema Information tab (this tab is displayed only when the database has schemas).
- Select a schema and click Identifier in the upper left corner to add a column identifier. The identifier may be a label or a security level.
- Label: Click the Select Label text box to select an added label or enter text and press Enter to add a label temporarily, and click OK.
- Security Level : Select a security level from the Select Security Level drop-down list. The security levels include built-in levels and custom levels. To create a security level, see Adding a Sensitive Level. Select a security level and click OK.
- You can also click the edit button to add information such as the category, security level, label, and description to the schema.
- Select a schema and click Identifier in the upper left corner to add a column identifier. The identifier may be a label or a security level.
- On the data details page, click the Table Information tab.
Related Operations
Enter a database name, database table name, data table column name, or template name in the search box to search for the database information you want to view.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot