Function Overview
-
-
Data Security Center (DSC) is a latest-generation cloud data security management platform that protects your data assets by leveraging its data protection capabilities such as data classification, risk identification, data masking, and watermark-based source tracking. DSC gives you an insight into the security status of each stage in data security lifecycle and provides constant visibility of the security status of your data assets.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
-
-
- Asset center: You can manage data assets from OBS, databases, big data, Log Tank Service (LTS), and MRS.
- Asset catalog: You can view statistics about your data from different domains or of different types.
- Data exploration: You can view details about all the added data assets and add descriptions, tags, security levels, and classifications to databases, tables, and data views to manage data assets by level and classification.
- Metadata tasks: You can create metadata tasks to collect data assets as metadata. In this way, you can manage data assets by level and classification.
- Asset group management: Data can be managed by group.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
-
-
The data asset map allows you to view the security status of your assets from multiple dimensions, such as asset overview, categories and risk levels, permissions, storage, sensitivity, and data egress analysis. This helps you quickly detect risky assets and handle them.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
-
-
Automatic data classification and grading: DSC automatically discovers and analyzes sensitive data. Utilizing DSC's data identification engines, both structured data (RDS and DWS) and unstructured data (OBS) are scanned, classified, and graded. This process ensures continuous identification and analysis of sensitive data to enhance security.
- Automatic identification of sensitive data
- Automatic identification of sensitive data and personal privacy data
- Customized identification rules to meet various requirements of different industries
- Visualized identification results which can be downloaded to the local PC
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
- Automatic identification of sensitive data
-
-
-
- Policy baseline: The policy baseline is a structured set of data security policies, encompassing data security management regulations, data classification and grading requirements, cross-border data transfer management regulations, and requirements for important and core data. DSC provides preset policy templates based on Huawei Cloud's data security governance experience and supports policy addition, deletion, modification, query, structured display, filtering, and querying.
- Log collection: DSC collects logs from applications (including DBSS and API Data Security) to assist in tracking data flow and promptly identifying exceptions and risks.
- Policy management: The administrator creates policies for database audit, encryption, watermarking, static masking, and dynamic masking on the policy management page of the policy center, and then deploys these policies to the relevant services or instances.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
-
-
- OBS Usage Audit:
DSC detects OBS buckets based on sensitive data identification rules and monitors identified sensitive data. After abnormal operations of the sensitive data are detected, DSC allows you to view the monitoring result and handle the abnormal events as required.
- Tracing Watermarks:
DSC provides the watermark extraction function for PDF, PPT, Word, and Excel files and databases.
Copyright proof: The owner information is added to the assets to specify the ownership, achieving copyright protection.
Automated monitoring: The user information is added to the assets for tracing data leak.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
-
DSC Professional Supported
-
DSC supports static data masking and dynamic data masking. You can configure masking rules for specified data assets to implement static masking or use the API for dynamic data masking to implement dynamic data masking, ensuring that sensitive information is not disclosed. Data Masking Algorithms lists the data masking algorithms supported by DSC.
Static data masking: DSC can help mask a large amount of data at one time based on the configured data masking rules. Static data masking is used when sensitive data in the production environment is delivered to the development, testing, or external environment for development and testing and data sharing and research. You can create an data masking task on the DSC console to quickly mask sensitive data in databases and big data assets.
Dynamic data masking: DSC provides dynamic data masking APIs to mask the data accessed from the external systems. Dynamic data masking applies to scenarios where data is queried from the external system, such as production applications, data exchange, O&M applications, and precision marketing.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
-
DSC Professional Supported
-
You can use DSC to inject watermarks into your databases/documents, claiming the ownership.
Data watermarking is widely used in government departments, medical care, finance, scientific research, and other institutions. It is generally used for copyright protection and source tracing.
- Data copyright protection: In scenarios where digital works are downloaded or copied for use and database services (data mining and analysis) provide data to third parties, digital watermarks can be used to identify the copyright when disputes occur,
- Source tracing: Data provided for internal employees or third parties can be injected with watermarks to identify the ownership and remind them of keeping the data secure. When the data leaked, the watermarks can be used to trace the source of data leak and identify the root cause.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
-
-
DSC sends notifications through the notification method configured by users when sensitive data identification is completed or abnormal events are detected.
Available in CN-Hong Kong, AP-Bangkok, AP-Singapore, LA-Sao Paulo 1, AF-Johannesburg, LA-Mexico City2, LA-Santiago,AP-Jakarta,Middle East-Riyadh,Türkiye-Istanbul
-
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot