This topic describes how to integrate Alibaba Cloud Object Storage Service (OSS) with Sensitive Data Discovery and Protection (SDDP) to identify, classify, and protect sensitive data.
Sensitive data is stored in a variety of forms across different storage systems, and can include high value data such as personal data, passwords, keys, and sensitive images. How an enterprise choose to store, locate, and protect sensitive data is essential. OSS provides a number of options to secure data, such as fine-grained access control and data encryption. OSS also provides data protection mechanisms such as Zone-redundant storage, cross-region replication, and versioning, as well as monitoring and audit capabilities such as Logging and Real-time log query. You can also integrate OSS with SDDP to better identify, classify, and protect sensitive data.
- Sensitive data identification
Enterprises have large amounts of data, but they cannot accurately identify whether their data contains sensitive information or where the sensitive data is located. You can integrate OSS with SDDP to scan and classify data stored in OSS by using the built-in algorithm rules of SDDP or by using custom rules that meet your industry requirements. You can also make further protection arrangements based on scan results. For example, OSS provides access control and encryption features to protect data.
- Data masking
If you share data for analysis or use without first masking it, sensitive data may be leaked. Built-in and custom masking algorithms are available when OSS is integrated with SDDP. You can use these algorithms to mask sensitive data in the production environment before transferring the data to other environments such as the development and testing environments. This ensures that the sensitive data remains secure while being usable in other environments.
- Anomaly detection and audit
SDDP uses an intelligent model to analyze and audit access to sensitive data in OSS. If a risk is detected, SDDP sends an alert to your data security team. This helps you improve risk prediction and prevention capabilities.
- SDDP displays sensitive data detection results on a graphical user interface (GUI), allowing you to clearly view the security status of your data.
- SDDP monitors data access and provides audit logs for you to trace anomalous activities, reducing security risks to your data.
- SDDP increases the overall security transparency of your data assets and enhances data governance.
- SDDP reduces the cost of maintaining data security and provides fundamental data for you to formulate security rules that are suitable for your enterprise.
- SDDP uses big data and machine learning technologies as well as intelligent algorithms to detect and monitor sensitive data and high-risk activities such as anomalous data access and potential data leaks. Additionally, SDDP provides suggestions to resolve detected issues.
- SDDP allows you to customize the rules to detect sensitive data so that you can ensure that sensitive data is detected and protected more accurately and efficiently.
- SDDP integrates complex data formats and content to a unified data risk model and presents data in a standard manner for you to protect your key data assets.
- SDDP takes advantage of cloud services and supports multiple cloud data sources.
- Compared with traditional sensitive data protection software, SDDP provides a more robust service architecture and higher availability at lower costs and features higher system security.
- Log on to the SDDP console.
- In the left-side navigation pane, click Asset Protection Authorization.
- On the OSS tab, click Unauthorized.
- Select the target OSS buckets and click Batch Operation.
- In the Batch Processing for Selected Assets dialog box, turn on or off the switches to configure the detection, audit, and de-identification
permissions for SDDP and set the remaining parameters as required.Set the following switches and parameters:
- Identify Permissions: specifies whether to grant SDDP the sensitive data detection permission on the selected data assets.
- Audit Permissions: specifies whether to grant SDDP the audit permission on the selected data assets.
- Desensitization Permissions: specifies whether to grant SDDP the sensitive data de-identification permission on the selected data assets.
- Sensitive Data Sampling: the number of samples to be collected from the selected data assets. Valid values:
- Audit Log Archiving: the number of days for which audit logs are retained for the selected data assets.
Note You do not need to activate Log Service to archive audit logs generated by SDDP.
- 30 Days
- 90 Days
- 180 Days
- Click Confirm. After the authorization is complete, SDDP scans data in the authorized OSS buckets for sensitive data. When SDDP accesses an OSS bucket for the first time, SDDP automatically scans all the data stored in the OSS bucket, and a full-scan fee will be incurred accordingly. For more information, see FAQ about data scan and desensitization.
In the list of authorized data assets, you can modify the authorization configuration of a data asset or cancel the authorization for a data asset. After you cancel the authorization for an OSS bucket, SDDP no longer scans data in the OSS bucket.Note SDDP only scans data in authorized OSS buckets and analyzes risks of sensitive data detected in these OSS buckets.
- Add a security policy.