หน้านี้ยังไม่พร้อมใช้งานในภาษาท้องถิ่นของคุณ เรากำลังพยายามอย่างหนักเพื่อเพิ่มเวอร์ชันภาษาอื่น ๆ เพิ่มเติม ขอบคุณสำหรับการสนับสนุนเสมอมา
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Policy Center
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Multi-Account Management
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Built-in Identification Rules of DSC?
- What Are the Identification Rules in the Built-in Identification Template of DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
- Data Watermarking
- Data Usage Audit
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Service Provisioning
- Assets
- Overview
- Sensitive Data Identification
- Data Masking
- Data Watermarking
- Alarm Notifications
- Permissions Management
-
FAQs
- Product Consulting
- Adding Data Assets
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
- Data Watermarking
- Change History
-
API Reference (ME-Abu Dhabi Region)
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Querying the Database Lineage Graph
- Querying the Table Lineage Graph in Pages
- Querying Data Linage Graph at the Column Level
- Querying the OBS Bucket Lineage Graph
- Querying the OBS File Linage Graph in Pages
- Static Data Masking
- API Call Records
- Appendixes
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Identification Results
After a sensitive data identification task is complete, you can view the result on the result details page. You can also download the generated identification result to your local PC. This section explains how to view and download the identification result.
Prerequisites
At least one sensitive data identification task has been executed. For details about how to create a sensitive data identification task, see Creating an Identification Task.
Viewing the Identification Result
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane on the left, choose Sensitive Data Identification > Identification Task.
- Click Identification Result in the Operation column of the target task. The result details page is displayed.
- DSC collects statistics on the total number of sensitive information records, risk level distribution, and top 10 matched rules.
DSC also provides a detailed identification result list. Click the filter box in the upper left corner of the list and select one or more filters, such as Column Name, Object Name, Database Name, and Table Name, to filter the identification results. For details about the parameters in the identification result list, see Table 1.
Table 1 Identification result parameters Parameter
Description
Column Name
Name of the column whose data is identified
Asset
Name of the asset that can be identified
Asset Type
- OBS
- Database
- Big Data
- MRS
- LTS
Asset
Name of the asset containing sensitive information.
Database Name
Name of the database where sensitive information is identified.
Table Name
Name of the table where sensitive information is identified.
Bucket Name
The bucket name is displayed when the asset type is OBS.
Object Path/Collection Time
Path for storing sensitive information and collection time.
Level
Sensitive information level.
- In the row containing the desired scan object, click View Classification and Grading Result Details in the Operation column. The Classification and Grading Result Details dialog box is displayed. View the result details and sample data.
- Click Add Rule in the upper left corner of the result details list. In the displayed Add Rule dialog box, select a new rule from the New rule drop-down list and click OK. A message is displayed, indicating that the original rule has been replaced with the new rule.
- Click Replace in the Operation column. In the dialog box that is displayed, select a new rule from the New rule drop-down list to replace the rule in the identification result. Click OK. A message is displayed, indicating that the original rule has been replaced with the new rule.
- Click Remove in the Operation column to delete unnecessary rules.
NOTE:
- The Categorization and leveling result details page displays the identification object details, result details, and sample data.
- The Result Details area displays the matching rule, number of hits/hit rate, grading result, and classification and grading template.
- Click the Sample Data tab to view the sample data that matches the rule. Currently, sample data of the big data and LTS types cannot be viewed.
Downloading the Identification Result
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane on the left, choose Sensitive Data Identification > Identification Task.
- Click Identification Result in the Operation column of the target task. The result details page is displayed.
- Click Generate Result File in the upper left corner. The Generate Result File dialog box is displayed.
- Identification task: Name of the scan task.
- Object Type: Type of the object to be scanned.
- Scan object: Object to be scanned.
- Export Target Bucket: Select a bucket for storing the identification result from the drop-down list box. If no bucket is available in the drop-down list box, create a bucket by referring to Creating an OBS Bucket. The scan-results folder is created in the root directory of the bucket to store the identification result.
- Sample data masking: The sample data masking function is applicable only to assets that support sample data viewing, such as databases and OBS. If sample data masking is not enabled, the identification result sample data will be exported in plaintext. Download the data and delete it in a timely manner.
NOTE:
The identification result list supports filtering.
OBS storage occupies certain storage space, which may incur fees. For details, see OBS Billing Overview.
Figure 1 Confirming the generation of the result file - Select OK to initiate the generation of the sensitive data scan report for the selected asset. A notification will appear in the upper right corner confirming the successful export of the identification result file. Subsequently, the status of the result file will be updated to Queuing or Running.
- The status of the generated result file is as follows:
- Running: The result report is being generated.
- Queuing: The generated task is queuing.
- If the Download Identification Result from OBS button is dimmed and the message "No file available. Please generate a file first." is displayed, click Generate Result File and download it again.
NOTE:
Result files from various subtasks within the same identification task will replace one another upon generation.
- The status of the generated result file is as follows:
- Click Download the result file from the OBS bucket. In the displayed dialog box, view the file path and other information. Click OK to go to the OBS Buckets page. Find the corresponding bucket based on the bucket name in the File Path, click the bucket name to go to the bucket, and select the identification result file, click Download in the Operation column to download the identification result file to the local PC.
- On the identification result report Excel file, identification results are displayed on the Asset Name and Asset Type sheets. The key fields include Rule, Level, Category, and Classification and Grading Template.
Figure 2 Example of the identification result report
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot