Halaman ini belum tersedia dalam bahasa lokal Anda. Kami berusaha keras untuk menambahkan lebih banyak versi bahasa. Terima kasih atas dukungan Anda.
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Policy Center
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Multi-Account Management
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Built-in Identification Rules of DSC?
- What Are the Identification Rules in the Built-in Identification Template of DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
- Data Watermarking
- Data Usage Audit
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Service Provisioning
- Assets
- Overview
- Sensitive Data Identification
- Data Masking
- Data Watermarking
- Alarm Notifications
- Permissions Management
-
FAQs
- Product Consulting
- Adding Data Assets
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
- Data Watermarking
- Change History
-
API Reference (ME-Abu Dhabi Region)
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Querying the Database Lineage Graph
- Querying the Table Lineage Graph in Pages
- Querying Data Linage Graph at the Column Level
- Querying the OBS Bucket Lineage Graph
- Querying the OBS File Linage Graph in Pages
- Static Data Masking
- API Call Records
- Appendixes
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Event Management
DSC integrates with key security components, including Database Audit, and Cloud Bastion Host, enabling centralized event management and real-time event delivery to DSC. This allows users to promptly verify and handle events. You can also convert alarms on the Alarm Management page to events.
Prerequisites
The DBSS service has been enabled and there are available assets on it. For details, see Purchasing Database Audit..
Creating an Event
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation tree on the left, choose Data Security Operations > Event Management. The Event Management page is displayed.
- Click Create in the upper left corner. The page for creating an event is displayed.
- Set the event parameters based on Table 1.
Table 1 Event parameters Parameter
Description
Event Name
The value can contain 4 to 255 characters, including letters, digits, hyphens (-), and underscores (_), and must start with a letter.
Type
Select an event type from the drop-down list box.
- Databases
- SQL Injection
- Risky operations
- Application APIs
- Unauthorized access
- Login security
- Interface security
- Service security
- Data security
Event Level
Select an event level from the drop-down list box.
- Suggestion
- Low
- Medium
- High
- Critical
Status
Select a status from the drop-down list box.
- Open
- Blocked
- Closed
Module
Select a source function module from the drop-down list box.
- Database auditor
- Cloud bastion host
Instance
Select an event source instance from the drop-down list box.
Owner
Select an event handling owner from the drop-down list box.
Affected Assets (Optional)
Enter the information about the assets affected by the event.
Occurred On
Time when an event occurs for the first time.
Planned Closure Time
Time when an event is planned to be closed.
Recommended Handling Method (Optional)
Enter the recommended event handling method. A maximum of 1000 characters can be entered.
Verification Status
Select an event verification status from the drop-down list box.
- Unknown
- Confirmed
- False
Description
Enter the event description.
- Databases
- Click OK.
Viewing the Event Management List
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation tree on the left, choose Data Security Operations > Event Management. The Event Management page is displayed.
- View the number of unhandled events and the total number of events.
The doughnut chart displays the number of expired and unexpired events.
Figure 1 Event handling statistics - View the alarm list. For details about the parameters, see Table 2.
Table 2 Data risk event parameters Parameter
Description
Event Name/ID
- Name of an event. The event name should denote the content of the event. You can click the event name on the right of the event name to view the basic information, handling suggestions, and associated alarms of the event.
- Click the event name to view the event details.
Event Level
There are five event levels:
- Suggestion
- Low
- Medium
- High
- Critical
Subcategory/Category
Event sources are classified into the following categories:
- Database attacks
- API attacks
Source
Database Audit, Database Security Gateway, and API Security Gateway instances
Status
The status options are:
- Open
- Blocked
- Closed
Affected Assets
Affected database assets or APIs.
Verification Status
Its value can be:
- Unknown
- Confirmed
- False
Owner
Username.
Created
Event creation time
Occurred On
Time when an event occurs for the first time.
Planned Closure Time
Time when an event is planned to be closed.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot