All Products
Search
Document Center

Data Security Center:Authorize DSC to access unstructured data in OSS and Simple Log Service

Last Updated:Dec 05, 2024

If you purchase Data Security Center (DSC) and you want to use DSC to detect sensitive data or monitor exceptions in Object Storage Service (OSS) buckets or detect sensitive data in Simple Log Service (SLS) projects, you must authorize DSC to access OSS and Simple Log Service.

Prerequisites

Step 1: Authorize DSC to access OSS and Simple Log Service

  1. Log on to the DSC console.

  2. In the left-side navigation pane, choose Asset Center > Authorization Management.

  3. In the left-side navigation tree of the Authorization Management tab, click the required service, such as OSS, in the Unstructured Data section.

  4. Click Asset Authorization Management.

  5. Optional. In the Asset Authorization Management panel, click Asset synchronization.

    After you purchase DSC and complete authorization on the Welcome page, DSC automatically synchronizes data assets in the cloud. In this case, you do not need to synchronize data assets. DSC scans for newly added data assets at 00:00 every day and automatically synchronizes them to unauthorized asset lists. If you want to authorize DSC to access the assets that are created on the current day, you must manually synchronize the assets.

  6. Click Authorization in the Actions column of the asset that you want to manage.

    If you want to authorize DSC to access multiple assets, select the assets and click Batch Authorize.

Step 2: Connect assets to DCS

Go to the Authorization Management tab, find the required asset that you want to manage, and then click Connect in the Actions column. For example, you can click an OSS bucket. If Connected is displayed in the Connection Status column, the asset is connected. DSC automatically synchronizes data of the asset.

Important

If DSC is authorized to access a Simple Log Service project, DSC synchronizes only project data generated until 23:59 on the day before the day when the project is connected to DSC.

image

What to do next

After you connect an asset to DSC, DSC automatically creates a default data identification task.

  • If you click Connect on the Authorization Management page and select Immediately scan database assets and identify data., DSC immediately executes the default data identification task.

  • If you click Connect on the Authorization Management page and do not select Immediately scan database assets and identify data., you must manually execute the default data identification task. To execute the task, choose Data Insights > Tasks page. On the Identification Tasks tab, click Default Tasks, find the task, and then click Rescan.

    Note

    DSC Basic Edition does not support the rescan operation.

The system automatically uses the main identification template and the common identification template to scan data of the connected assets. By default, the main identification template is the Internet industry classification template. The common identification template conforms to personal information security. You can check the status of a data identification task to confirm the completion time of the data identification task.

  1. View the completion time of a default data identification task. For more information, see View default identification task.

  2. View data classification results. For more information, see View sensitive data identification results.

References

  • If you want to use more identification templates to scan the data of the connected assets to identify sensitive data, you can create a custom identification task and use an identification template that is enabled to scan the assets. For more information, see Create a custom identification task.

  • DCS allows you to identify and classify sensitive data and build a multi-level and dynamic security and monitoring mechanism to trace the usage of sensitive data. DSC uses predefined security management policies to ensure data protection, auditing, and alerting capabilities and provides risk assessment and response, and fine-grained control capabilities of file access. This helps you detect, locate, and protect sensitive data in OSS. For more information, see OSS data security protection solution.