Halaman ini belum tersedia dalam bahasa lokal Anda. Kami berusaha keras untuk menambahkan lebih banyak versi bahasa. Terima kasih atas dukungan Anda.

Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive

Identification Results

Updated on 2025-01-17 GMT+08:00

After a sensitive data identification task is complete, you can view the result on the result details page. You can also download the generated identification result to your local PC. This section explains how to view and download the identification result.

Prerequisites

At least one sensitive data identification task has been executed. For details about how to create a sensitive data identification task, see Creating an Identification Task.

Viewing the Identification Result

  1. Log in to the management console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. In the navigation tree on the left, click . Choose Security & Compliance > Data Security Center .
  4. In the navigation pane on the left, choose Sensitive Data Identification > Identification Task.
  5. Click Identification Result in the Operation column of the target task. The result details page is displayed.
  6. DSC collects statistics on the total number of sensitive information records, risk level distribution, and top 10 matched rules.

    DSC also provides a detailed identification result list. Click the filter box in the upper left corner of the list and select one or more filters, such as Column Name, Object Name, Database Name, and Table Name, to filter the identification results. For details about the parameters in the identification result list, see Table 1.
    Table 1 Identification result parameters

    Parameter

    Description

    Column Name

    Name of the column whose data is identified

    Asset

    Name of the asset that can be identified

    Asset Type

    • OBS
    • Database
    • Big Data
    • MRS
    • LTS

    Asset

    Name of the asset containing sensitive information.

    Database Name

    Name of the database where sensitive information is identified.

    Table Name

    Name of the table where sensitive information is identified.

    Bucket Name

    The bucket name is displayed when the asset type is OBS.

    Object Path/Collection Time

    Path for storing sensitive information and collection time.

    Level

    Sensitive information level.

  7. In the row containing the desired scan object, click View Classification and Grading Result Details in the Operation column. The Classification and Grading Result Details dialog box is displayed. View the result details and sample data.

    • Click Add Rule in the upper left corner of the result details list. In the displayed Add Rule dialog box, select a new rule from the New rule drop-down list and click OK. A message is displayed, indicating that the original rule has been replaced with the new rule.
    • Click Replace in the Operation column. In the dialog box that is displayed, select a new rule from the New rule drop-down list to replace the rule in the identification result. Click OK. A message is displayed, indicating that the original rule has been replaced with the new rule.
    • Click Remove in the Operation column to delete unnecessary rules.
    NOTE:
    • The Categorization and leveling result details page displays the identification object details, result details, and sample data.
    • The Result Details area displays the matching rule, number of hits/hit rate, grading result, and classification and grading template.
    • Click the Sample Data tab to view the sample data that matches the rule. Currently, sample data of the big data and LTS types cannot be viewed.

Downloading the Identification Result

  1. Log in to the management console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. In the navigation tree on the left, click . Choose Security & Compliance > Data Security Center .
  4. In the navigation pane on the left, choose Sensitive Data Identification > Identification Task.
  5. Click Identification Result in the Operation column of the target task. The result details page is displayed.
  6. Click Generate Result File in the upper left corner. The Generate Result File dialog box is displayed.

    • Identification task: Name of the scan task.
    • Object Type: Type of the object to be scanned.
    • Scan object: Object to be scanned.
    • Export Target Bucket: Select a bucket for storing the identification result from the drop-down list box. If no bucket is available in the drop-down list box, create a bucket by referring to Creating an OBS Bucket. The scan-results folder is created in the root directory of the bucket to store the identification result.
    • Sample data masking: The sample data masking function is applicable only to assets that support sample data viewing, such as databases and OBS. If sample data masking is not enabled, the identification result sample data will be exported in plaintext. Download the data and delete it in a timely manner.
    NOTE:

    The identification result list supports filtering.

    OBS storage occupies certain storage space, which may incur fees. For details, see OBS Billing Overview.

    Figure 1 Confirming the generation of the result file

  7. Select OK to initiate the generation of the sensitive data scan report for the selected asset. A notification will appear in the upper right corner confirming the successful export of the identification result file. Subsequently, the status of the result file will be updated to Queuing or Running.

    • The status of the generated result file is as follows:
      • Running: The result report is being generated.
      • Queuing: The generated task is queuing.
    • If the Download Identification Result from OBS button is dimmed and the message "No file available. Please generate a file first." is displayed, click Generate Result File and download it again.
      NOTE:

      Result files from various subtasks within the same identification task will replace one another upon generation.

  8. Click Download the result file from the OBS bucket. In the displayed dialog box, view the file path and other information. Click OK to go to the OBS Buckets page. Find the corresponding bucket based on the bucket name in the File Path, click the bucket name to go to the bucket, and select the identification result file, click Download in the Operation column to download the identification result file to the local PC.
  9. On the identification result report Excel file, identification results are displayed on the Asset Name and Asset Type sheets. The key fields include Rule, Level, Category, and Classification and Grading Template.

    Figure 2 Example of the identification result report

Kami menggunakan cookie untuk meningkatkan kualitas situs kami dan pengalaman Anda. Dengan melanjutkan penelusuran di situs kami berarti Anda menerima kebijakan cookie kami. Cari tahu selengkapnya

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback