All Products
Search
Document Center

Cloud Firewall:Configure Agentic NDR policies to deny viewing sensitive data and exporting data

Last Updated:Mar 31, 2026

By default, Alibaba Cloud Agentic NDR allows users to view and download the details of sensitive data and related packet payloads. To prevent leaks, use Resource Access Management (RAM) to create deny policies that block specific RAM users from accessing or exporting this data.

Supported sensitive data types

Agentic NDR detects 47 sensitive data types. The following table lists all supported types.

Note

A hyphen (—) in the table indicates an empty cell.

No.TypeNo.TypeNo.TypeNo.TypeNo.TypeNo.Type
1Debit card9ID card (the Chinese mainland)17AccessKeyId25Mainland Travel Permit for Hong Kong and Macao Residents33Passport number (the Chinese mainland)41Officer ID card
2Private key10ID card (Hong Kong, China)18Name (Simplified Chinese)26Address (the Chinese mainland)34Mobile phone number (the Chinese mainland)42Email address
3License plate number (the Chinese mainland)11Landline number (the Chinese mainland)19Gender27Ethnicity35Province (the Chinese mainland)43City (the Chinese mainland)
4Name (Traditional Chinese)12Name (English)20ID card number (Malaysia)28ID card number (Singapore)36International Bank Account Number (SWIFT code)44U.S. Social Security Number (SSN)
5Landline number (United States)13Religious belief21MAC address29JDBC connection string37PEM certificate45AccessKeySecret
6IMEI14MEID22Linux passwd file30Linux shadow file38Business license number46Tax registration certificate number
7Organization code15Unified Social Credit Code23Vehicle Identification Number (VIN)31Alibaba Cloud AccessKey pair39Password47LegacyOpenaiApiKey
8ProjectOpenaiApiKey16BailianApiKey24HuggingFaceApiKey32GroqApiKey40PaiEasToken48

Permissions for data access and export

The following table lists the RAM actions that control sensitive data access and export in Agentic NDR. Include these actions in your deny policies to block the corresponding operations.

ActionDescription
yundun-cloudfirewall:DescribeDecryptDataDecrypts sensitive data.
yundun-cloudfirewall:DescribeAssetRiskDataPublicLogPayloadViews the packet payload that transmits sensitive data.
yundun-cloudfirewall:CreateExportTaskExports data.

Prerequisites

Before you begin, make sure you have:

  • A RAM user to apply the policies to. For instructions, see Create a RAM user

  • Management account permissions to use RAM, create RAM users, and manage RAM policies

Create and apply deny policies

Deny policies take precedence over allow policies. Attach the deny policies alongside a system policy (read-only or full access) so the user retains baseline access to Agentic NDR while the restricted actions are blocked.

Create custom policies

  1. In the RAM console, go to Permissions > Policies, click Create Policy, and select the JSON tab.

    image

  2. On the JSON tab, enter the following policy document, then click Next to edit basic information.

    {
        "Version": "1",
        "Statement": [
            {
                "Action": "yundun-cloudfirewall:DescribeDecryptData",
                "Resource": "*",
                "Effect": "Deny"
            },
            {
                "Action": "yundun-cloudfirewall:DescribeAssetRiskDataPublicLogPayload",
                "Resource": "*",
                "Effect": "Deny"
            }
        ]
    }
  3. In the Create Policy dialog box, set the policy name to Deny Query Sensitive Data and click OK.

  4. On the Policies page, click Create Policy. On the JSON tab, enter the following policy document, then click Next to edit basic information.

    {
        "Version": "1",
        "Statement": [
            {
                "Action": "yundun-cloudfirewall:CreateExportTask",
                "Resource": "*",
                "Effect": "Deny"
            }
        ]
    }
  5. In the Create Policy dialog box, set Name to Deny Export Data, set Description to Prevents authorized users from exporting data, and click OK.

Attach the policies to a RAM user

  1. In the RAM console, go to Identities > Users. Find the target user and click Add Permissions in the Actions column.

  2. Select the two custom policies you created and at least one system policy for Agentic NDR.

    Policy nameDescription
    AliyunYundunCloudFirewallReadOnlyAccessGrants read-only access to Cloud Firewall.
    AliyunYundunCloudFirewallFullAccessGrants full management access to Cloud Firewall.
    Deny Query Sensitive DataPrevents a RAM user from viewing sensitive data.
    Deny Export DataPrevents a RAM user from exporting data.

    image

  3. Click OK.

Verify the policies

  1. Sign in to the Agentic NDR console as the RAM user.

  2. In the left-side navigation pane, click Risks.

  3. Click the Logon Activity tab. On the Privileged Account, Weak Password, Plaintext Password, and Leaked AKSK tabs, confirm the following:

    • Click Sensitive Information. The operation is denied and a notification appears.

    • Click the export icon image. The operation is denied and a notification appears.

    • Click Details in the Actions column. In the Details panel, click View Payload or the export icon image. Both attempts fail and a notification appears.

    image

  4. Click the Sensitive Data tab and confirm the following:

    • Click the export icon image. The operation is denied and a notification appears.

    • Click Details in the Actions column. In the Details panel:

      • Click a number in the Sensitive Information Items column or click View Payload. The attempt fails and a notification appears.

      • Click the export icon image. The attempt fails and a notification appears.