Document Center

    Data Security Center

    • Release notes
    • Product Introduction
      • What is DSC?
      • Benefits
      • Scenarios
      • Supported sensitive data
    • Pricing
      • Pay-as-you-go
    • Quick Start
      • Quick start
    • User Guide
      • Authorize DSC to access Alibaba Cloud resources
      • View summary information
      • Grant access to data assets
      • Sensitive data discovery
        • View sensitive data
        • Query sensitive data
        • Manage scan tasks
        • Manage detection rules
      • Data desensitization
        • Perform static de-identification
        • Perform dynamic de-identification
        • Manage de-identification templates
        • Configure de-identification algorithms
    • Best practices
      • Best practices for protecting data stored in OSS
    • FAQ
      • Overview
      • Data security
      • Data authorization
      • Sensitive data scan and detection
      • Data de-identification
      • Supported unstructured files
      • Supported data de-identification algorithms
      • Built-in anomalous activity detection rules
    • API Reference
      • List of operations by function
      • Request method
      • Common parameters
      • Security configuration
        • CreateRule
        • DeleteDataLimit
        • DeleteRule
        • DescribeConfigs
        • DescribeDataLimitDetail
        • DescribeDataLimits
        • CreateDataLimit
        • ModifyDefaultLevel
        • ModifyRuleStatus
        • ModifyRule
        • ModifyDataLimit
        • DescribeRules
        • CreateConfig
      • Sensitive data detection
        • DescribeColumns
        • DescribeInstances
        • DescribeOssObjectDetail
        • DescribeOssObjects
        • DescribePackages
        • DescribeTables
        • DescribeDataAssets
      • Anomalous activity processing
        • DescribeEventDetail
        • DescribeEvents
        • DescribeEventTypes
        • ModifyEventStatus
        • ModifyEventTypeStatus
      • Sensitive data desensitization
        • ExecDatamask
        • DescribeDataMaskingTasks
        • DescribeDataMaskingRunHistory
        • ManualTriggerMaskingProcess
 

This Product

  • This Product
  • All Products

    Data Security Center

    Data Security Center

    All Products
      • Release notes

        • Release notes
        Show more
        Show less
      • Product Introduction

        • What is DSC?
        • Benefits
        • Scenarios
        • Supported sensitive data
        Show more
        Show less
      • Pricing

        • Pay-as-you-go
        Show more
        Show less
      • Quick Start

        • Quick start
        Show more
        Show less
      • User Guide

        • Authorize DSC to access Alibaba Cloud resources
        • View summary information
        • Grant access to data assets
        • Sensitive data discovery
        • Data desensitization
        Show more
        Show less
      • Best practices

        • Best practices for protecting data stored in OSS
        Show more
        Show less
      • FAQ

        • Overview
        • Data security
        • Data authorization
        • Sensitive data scan and detection
        • Data de-identification
        • Supported unstructured files
        • Supported data de-identification algorithms
        • Built-in anomalous activity detection rules
        Show more
        Show less
      • API Reference

        • List of operations by function
        • Request method
        • Common parameters
        • Security configuration
        • Sensitive data detection
        • Anomalous activity processing
        • Sensitive data desensitization
        Show more
        Show less
      Free Trial Free Trial