All Products
Search
Document Center

Data Security Center:Check the security configuration compliance of a bucket

Last Updated:Mar 31, 2026

Data Security Center (DSC) assesses the security configuration compliance of your Object Storage Service (OSS) buckets. It checks whether configurations such as access control list (ACL) and encryption policies are in place, and flags any detected risks with remediation guidance.

How it works

DSC runs a security baseline check against the Alibaba Cloud Data Security Best Practices policy. The policy covers seven security domains for OSS buckets. When a check item fails, DSC surfaces the risk and links directly to the relevant OSS configuration page so you can remediate it.

The end-to-end workflow has four steps:

  1. Create an OSS bucket.

  2. Add the bucket to DSC and enable configuration risk checks.

  3. Run a baseline check manually.

  4. Review the results and fix any configuration risks.

Security baseline check items

The following table lists all OSS baseline check items, grouped by security domain.

Security domainCheck itemFails when
Data storage securityOSS-enable Bucket server-side encryptionServer-side encryption is not enabled for the bucket.
Data backup and recoveryOSS-enable Bucket version controlVersioning is not enabled for the bucket.
Access control managementOSS-configure an access source IP address whitelistThe bucket is publicly exposed.
Data transmission encryptionOSS-enable secure encrypted transmissionEncrypted transmission is not enforced for objects during transfer.
Log monitoring auditOSS-enable log storageLog storage is not enabled for the bucket.
Identity rights managementOSS-anonymous account "read/write/full control" permission configurationThe bucket is configured with public-read-write permissions, violating the principle of least privilege.
Sensitive data protectionOSS-log file public read (write) access permission settings; OSS-sensitive data Bucket public read (write) Access CheckLog files have public read/write access, or a bucket containing sensitive data lacks access control.
Note

If sensitive data detection has not been run on a bucket, the OSS-sensitive data Bucket public read (write) Access Check item passes by default.

Prerequisites

Before you begin, ensure that you have:

Note

The Free Edition of DSC includes the baseline check feature and supports check items in the Alibaba Cloud Data Security Best Practices policy. It provides 500 TB of free OSS protection per month. The PIPL Security Baseline policy requires an Enterprise instance of DSC.

Step 1: Create an OSS bucket

  1. In the OSS console, go to the Buckets page and click Create Bucket.

  2. In the Create Bucket panel, configure the required parameters, leave the other parameters at their defaults, and click Create.

image

Step 2: Add the OSS bucket to DSC

  1. Log on to the Data Security Center console.

  2. In the left navigation pane, click Asset Center.

  3. In the Unstructured Data area, click OSS, and then click Asset synchronization.

    image

  4. After synchronization completes, find the bucket and turn on the Configuration Risks switch. Wait until the Connection Status changes to Connected.

    image

Step 3: Run a baseline check manually

By default, DSC runs a baseline check on connected assets at approximately 01:00 every day. To view results immediately, trigger the check manually.

Confirm that the check policy is enabled

  1. In the left navigation pane, choose Risk Governance > Configuration Risks.

  2. On the Policies > Alibaba Cloud Data Security Best Practices tab, review the OSS-related check items and their status. By default, DSC enables all check items in the policy.

    image

  3. Confirm that the status column for each OSS check item shows the enabled icon image.

Trigger checks for each item

  1. Go to Risk Trends > Alerts, find the target policy, and click Details in the Actions column.

  2. On the Risk Situation tab, click Check for each OSS-related check item. The check is complete when the Check button becomes active again. Close the panel when done.

    image

  3. Repeat for any remaining check items under different policies.

Step 4: Review and fix security risks

View check results

  1. On the Asset Risks tab, search for the bucket to view its check results. The detection time shows when the last check ran.

    image

  2. Click Handle in the Actions column to see which check items failed and the recommended fixes.

    image

Fix a risk item

  1. In the Risk Details area, click Handle. DSC navigates to the relevant OSS configuration page. For example, to fix OSS-enable Bucket server-side encryption: on the Server-side Encryption page, click Settings, set the encryption method to OSS-Managed, and click Save. For configuration details, see Server-side encryption.

    image

Verify the fix

Return to the risk details panel in DSC and click Recheck.

image

A passed result confirms the risk item is resolved.

image

Repeat this process for all remaining risk items.

After you store data in the bucket

Complete the security configuration compliance check above before storing data in a bucket. Once you have data in the bucket, take these additional steps to stay compliant.

Set up sensitive data detection

The OSS-sensitive data Bucket public read (write) Access Check item passes by default for buckets where sensitive data has not been detected. After storing data, create a sensitive data detection task to periodically scan the bucket. If DSC finds sensitive data, it runs the OSS-sensitive data Bucket public read (write) Access Check baseline check, letting you catch and fix any related risks promptly.

For details on creating a detection task, see Scan for sensitive data using a detection task.

Important

The Free Edition of DSC provides 5 GB of free OSS data detection per month. If this quota does not meet your needs, purchase a paid instance of DSC. For pricing information, see Purchase DSC.

Add assets to the whitelist

If a failed check for a specific asset is acceptable for your use case, go to the Asset Risks tab, find the asset, and click Add to Whitelist in the Actions column. This excludes the asset from that check item.

image
Important

Whitelist management requires an Enterprise instance of DSC. The Free Edition does not support this feature.