Data Security Center (DSC) offers five editions with different billing methods, data quotas, and feature sets. Use this page to identify the edition that matches your security needs and to understand what you gain by upgrading.
For billing details, see Billing overview.
Editions at a glance
| Edition | Best for | Key characteristics |
|---|
| Free Edition | Trial users | Data classification, configuration risk detection, and column encryption at no cost |
| Premium Edition | Small-scale security needs | Basic security protection; small-scale data identification and audit |
| Enterprise Edition | Small and medium-sized enterprises | Full data security and compliance feature set |
| Database Audit (Classified Protection Compliance Edition) | Classified protection compliance | Replaces traditional Database Audit; supports databases, OSS, and big data |
| Value-added Service-only Edition | Large-scale or custom needs | Purchase individual features on demand |
Upgrade paths
| Edition | Upgrade options |
|---|
| Free Edition | Cannot be upgraded. If the Free Edition does not meet your needs, purchase a paid edition — your Free Edition resources and data are retained. |
| Premium Edition | Can upgrade to the Enterprise Edition |
| Value-added Service-only Edition | Can upgrade to the Premium Edition or Enterprise Edition |
Feature comparison
Sensitive data identification and classification and grading
Classification and Grading lets you define sensitivity levels for your data assets. Data Identification scans databases and unstructured files to detect sensitive data automatically. The Enterprise Edition provides the highest detection capacity; the Free and Value-added Service-only editions share the same base quota.
| Feature | Free Edition | Premium Edition | Enterprise Edition | Database Audit (Classified Protection Compliance Edition) | Value-added Service-only Edition |
|---|
| Classification and Grading (included) | Supported | Supported | Supported | Not supported | Supported |
| Data Identification: Unstructured Data Identification Capacity | 5 GB | 1 TB | 3 TB | Not supported | 5 GB |
| Data Identification: Table Identification Capacity | 100 | 10,000 | 30,000 | Not supported | 100 |
| Support for purchasing a larger quota for a fee | Not supported | Supported | Supported | Not supported | Supported |
Configuration risks
Configuration Risks checks your Alibaba Cloud environment against security best practices and compliance baselines. The Free Edition covers the Alibaba Cloud Data Security Best Practices baseline only; the PIPL-based Security Baseline Check requires a paid edition.
| Feature | Free Edition | Premium Edition | Enterprise Edition | Database Audit (Classified Protection Compliance Edition) | Value-added Service-only Edition |
|---|
| Configuration Risks | Supports Alibaba Cloud Data Security Best Practices only. PIPL-based Security Baseline Check is not supported. For supported check items, see the console. | Supported | Supported | Not supported | Supported |
OSS image masking
OSS Image Masking detects and masks sensitive content in images stored in OSS — for example, ID numbers in scanned documents. This feature is included in the Enterprise Edition; Premium and Value-added Service-only editions can purchase it as an add-on.
| Feature | Free Edition | Premium Edition | Enterprise Edition | Database Audit (Classified Protection Compliance Edition) | Value-added Service-only Edition |
|---|
| Image Masking (included) | Not supported | Not supported | Supported | Not supported | Not supported |
| Number of images for masking | Not supported | Not supported | 10,000 | Not supported | Not supported |
| Number of images for enhanced detection | Not supported | Not supported | 10,000 | Not supported | Not supported |
| Support for enabling the feature or purchasing a larger quota for a fee | Not supported | Supported | Supported | Not supported | Supported |
Column encryption
Column Encryption encrypts specific database columns to protect sensitive fields such as ID numbers or phone numbers. All editions that support this feature include at least one encrypted column by default; purchase a larger quota to encrypt more columns.
| Feature | Free Edition | Premium Edition | Enterprise Edition | Database Audit (Classified Protection Compliance Edition) | Value-added Service-only Edition |
|---|
| Column Encryption (included) | Supported | Supported | Supported | Not supported | Supported |
| Number of columns for encryption | 1 | Column 1 | 10 columns | Not supported | Column 1 |
| Support for purchasing a larger quota for a fee | Not supported | Supported | Supported | Not supported | Supported |
Data Detection and Response
Data Detection and Response monitors your environment for AK leaks and database credential exposure. The Enterprise Edition includes both detection and event management; the Free Edition supports detection only.
| Feature | Free Edition | Premium Edition | Enterprise Edition | Database Audit (Classified Protection Compliance Edition) | Value-added Service-only Edition |
|---|
| AK leak and database credential leak detection | Supported | Not supported | Supported | Not supported | Not supported |
| AK leak and database credential leak event management | Not supported | Not supported | Supported | Not supported | Not supported |
| Data Detection and Response: OSS Protection Capacity | Not supported | Not supported | 3 TB | Not supported | Not supported |
| Data Detection and Response: Database Instances | Not supported | Not supported | 3 | Not supported | Not supported |
| Support for enabling the feature or purchasing a larger quota for a fee | Not supported | Supported | Supported | Not supported | Supported |
Native Data Auditing and Log Analysis
Native Data Auditing records data access operations across databases and OSS. Log Analysis stores audit logs for investigation and compliance reporting. All editions include Native Data Auditing; log storage allocation and data quotas vary by edition.
| Feature | Free Edition | Premium Edition | Enterprise Edition | Database Audit (Classified Protection Compliance Edition) | Value-added Service-only Edition |
|---|
| Native Data Auditing (included) | Supported | Supported | Supported | Supported | Supported |
| Data Auditing: OSS Storage Capacity | Supported | 1 TB | 3 TB | 1 TB | Not supported |
| Data Auditing: Database Instances | Supported | 1 | 3 | 3 | Not supported |
| Support for purchasing a larger Data Auditing quota for a fee | Not supported | Supported | Supported | Supported | Supported |
| Log Storage Capacity (included) | Not provided | 200 GB per authorized database instance; 50 GB per 1 TB of authorized OSS storage | 200 GB per authorized database instance; 50 GB per 1 TB of authorized OSS storage | 200 GB per authorized database instance; 50 GB per 1 TB of authorized OSS storage | 200 GB per authorized database instance; 50 GB per 1 TB of authorized OSS storage |
| Support for purchasing more Log Storage Capacity for a fee | Not supported | Supported | Supported | Supported | Supported |
System settings
| Feature | Free Edition | Premium Edition | Enterprise Edition | Database Audit (Classified Protection Compliance Edition) | Value-added Service-only Edition |
|---|
| System Settings > Alert Notification | Supported | Supported | Supported | Supported | Supported |
| System Settings > Whitelist | Not supported | Supported | Supported | Not supported | Supported |
| System Settings > Alert Notification > OSS Synchronization Configurations | Supported | Supported | Supported | Supported | Supported |
| System Settings > Report Center | Not supported | Supported | Supported | Supported | Supported |
| System Settings > Data Management | Not supported | Supported | Supported | Supported | Supported |
| System Settings > Multi-account Management | Not supported | Supported | Supported | Not supported | Supported |