このページは、お客様の言語ではご利用いただけません。Huawei Cloudは、より多くの言語バージョンを追加するために懸命に取り組んでいます。ご協力ありがとうございました。
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Policy Center
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Multi-Account Management
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Built-in Identification Rules of DSC?
- What Are the Identification Rules in the Built-in Identification Template of DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
- Data Watermarking
- Data Usage Audit
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Service Provisioning
- Assets
- Overview
- Sensitive Data Identification
- Data Masking
- Data Watermarking
- Alarm Notifications
- Permissions Management
-
FAQs
- Product Consulting
- Adding Data Assets
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
- Data Watermarking
- Change History
-
API Reference (ME-Abu Dhabi Region)
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Querying the Database Lineage Graph
- Querying the Table Lineage Graph in Pages
- Querying Data Linage Graph at the Column Level
- Querying the OBS Bucket Lineage Graph
- Querying the OBS File Linage Graph in Pages
- Static Data Masking
- API Call Records
- Appendixes
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Show all
Copied.
Customizing a Rule
Sensitive data identification rules include built-in rules and user-defined rules. You can select built-in or customized identification rules when creating or editing an identification template.
Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane, choose Sensitive Data Identification > Identification Configuration. The Identification Template tab page is displayed.
- Click the Identification Rule tab. The Identification Rule page is displayed.
- Click Create a user-defined rule in the upper left corner of the page.
- In the displayed dialog box, set required parameters based on Table 1.
Table 1 Parameter description Parameter
Description
Rule
You can customize a rule name.
The rule name must meet the following requirements:
- Contain 1 to 255 characters.
- Consist of letters, digits, underscores (_), hyphens (-), and brackets.
- Be unique.
Description
Enter a rule description.
Add to Template
- Select the template name, template rule category, and level from the drop-down list boxes to add the rule to a rule template.
- Click Add to add the rule to multiple templates.
- Click the deletion button to delete the template. Retain at least one template.
Match Type
This parameter can be set to Rule matching or Keyword matching.
- Keyword matching indicates that the rule can be executed using keywords.
- Regular matching is used to match (specify and identify) characters, words, and patterns.
NOTE:
For Hive data in MRS, sensitive data can be identified only when Match Type is Rule matching and Rule is Content > Include.
Matching Logic
Select the matching logic:- AND: All keywords are included.
- OR: Only one keyword is included.
Rule
This parameter is displayed when Match Type is set to Rule matching. Select the rule content from the drop-down list.
- Choose Column Name > Include or Column Comment > Include. Enter a keyword to check whether the column name or column comment contains the keyword.
- Choose Column Name > Regex or Column Comment > Regex and enter a regular expression to check whether it matches.
- Choose Content > Include. Enter a keyword to check whether the keyword is contained in the content.
- Choose Content > Regex. Enter a regular expression to check whether the regular expression matches.
- Choose Content > Keyword and enter multiple keywords. The relationship between the keywords is OR, meaning if any keyword is found in the content, it will be matched.
NOTE:
For Hive data in MRS, sensitive data can be identified only when Match Type is Rule matching and Rule is Content > Include.
Test Rule
- This parameter is displayed when Match Type is set to Rule Matching.
- Enter the rule content and click Test. The test result of the rule is displayed in the Test Result area.
- You can click Add to add multiple rules for test.
- Both built-in rules and user-defined rules support rule tests. To test a built-in rule, click Details in the Operation column of the rule list. On the Edit Rule page, enter the rule for test.
NOTE:
- Image rules cannot be tested.
- The rule test is not supported when the Match Type is Keyword matching.
- Only the first matching result of the test content is displayed.
Content
- This parameter is displayed when Match Type is set to Keyword Matching.
- Multiple keywords are separated by line breaks.
Identification Threshold Configuration
Applicable to unstructured data. You can select a low, medium, or high threshold. A higher threshold requires more hits.
Hit Rate
Applicable to structured data. You can drag the slider to set the value. A larger value indicates a higher hit rate.
- Click OK.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot