Document Center

    Sensitive Data Discovery and Protection

    • Release notes
    • Product Introduction
      • What is Sensitive Data Discovery and Protection?
      • Benefits
      • Scenarios
    • Pricing
      • Pay-as-you-go
    • Quick Start
      • Quick start
    • User Guide
      • Authorize SDDP to access Alibaba Cloud resources
      • View summary information
      • Grant access to data assets
      • Detect sensitive data
        • View sensitive data
        • Query sensitive data
        • Manage scan tasks
        • Manage detection rules
      • Sensitive data desensitization
        • Perform static de-identification
        • Perform dynamic de-identification
        • Manage de-identification templates
        • Configure de-identification algorithms
    • Best practices
      • Best practices for protecting data stored in OSS
    • FAQ
      • Overview
      • Data security
      • Data authorization
      • Sensitive data scan and detection
      • Data de-identification
      • Supported unstructured files
      • Supported data de-identification algorithms
      • Built-in anomalous activity detection rules
      • Supported sensitive data
    • API Reference
      • List of operations by function
      • Make API requests
      • Common parameters
      • Security configuration
        • CreateRule
        • DeleteDataLimit
        • DeleteRule
        • DescribeConfigs
        • DescribeDataLimitDetail
        • DescribeDataLimits
        • DescribeRules
        • CreateDataLimit
        • ModifyDefaultLevel
        • ModifyRuleStatus
        • ModifyRule
        • ModifyDataLimit
        • CreateConfig
      • Sensitive data detection
        • DescribeColumns
        • DescribeDataAssets
        • DescribeInstances
        • DescribeOssObjectDetail
        • DescribeOssObjects
        • DescribePackages
        • DescribeTables
      • Anomalous activity processing
        • DescribeEventDetail
        • DescribeEvents
        • DescribeEventTypes
        • ModifyEventStatus
        • ModifyEventTypeStatus
      • Sensitive data desensitization
        • ExecDatamask
        • DescribeDataMaskingTasks
        • DescribeDataMaskingRunHistory
    • General Reference
      • Guidelines for the use of documentation
        • Alibaba Cloud documentation
        • Instructions for open source documentation
          • Open-Source Documentation Code of Conduct
          • Editing Open-Source Documentation
      • Alibaba Cloud console
      • Regions and zones
      • Service limits
      • Create an AccessKey pair
      • ICP Filing
      • Glossary
 

This Product

  • This Product
  • All Products

    Sensitive Data Discovery and Protection

    Sensitive Data Discovery and Protection

    All Products
      • Release notes

        • Release notes
        Show more
        Show less
      • Product Introduction

        • What is Sensitive Data Discovery and Protection?
        • Benefits
        • Scenarios
        Show more
        Show less
      • Pricing

        • Pay-as-you-go
        Show more
        Show less
      • Quick Start

        • Quick start
        Show more
        Show less
      • User Guide

        • Authorize SDDP to access Alibaba Cloud resources
        • View summary information
        • Grant access to data assets
        • Detect sensitive data
        • Sensitive data desensitization
        Show more
        Show less
      • Best practices

        • Best practices for protecting data stored in OSS
        Show more
        Show less
      • FAQ

        • Overview
        • Data security
        • Data authorization
        • Sensitive data scan and detection
        • Data de-identification
        • Supported unstructured files
        • Supported data de-identification algorithms
        • Built-in anomalous activity detection rules
        • Supported sensitive data
        Show more
        Show less
      • API Reference

        • List of operations by function
        • Make API requests
        • Common parameters
        • Security configuration
        • Sensitive data detection
        • Anomalous activity processing
        • Sensitive data desensitization
        Show more
        Show less
      Free Trial Free Trial