After you activate Data Security Center (DSC), authorize DSC to detect sensitive information in databases and Object Storage Service (OSS), and enable security audit, you can view information such as authorization status of assets, data identification results, risk trends of baseline security checks, and asset audit alert statistics on the Workbench page of DSC.
DSC supports the following database types: relational database, non-relational database, big data, unstructured database, and self-managed database. For more information, see Supported database types.
For your data security and privacy, DSC performs only necessary operations such as tagging, static data masking, and data auditing. DSC does not store your data.
View the authorization status of assets
In the Asset allocation statistics section, you can view the authorization status of assets, such as asset authorization and data identification statistics.
To authorize DSC to access an asset, click Authorize. On the Asset Authorization Configuration page, authorize DSC to access the asset. You can view, modify, and delete authorized assets. For more information, see Grant access to data assets.
In the Asset Statistics section, view the number of authorized assets and the trend of the number of authorized assets.
View the status of DSC
In the Asset Protection section, you can view the DSC information, the remaining subscription duration, the number of authorized databases, and storage capacity that DSC is authorized to access. To upgrade or renew DSC, click Upgrade Now or Renew Subscription.
View sensitive data statistics
In the Sensitive Data section, you can view the statistics on the identification results of structured and unstructured data in the scanned data assets.
DSC identifies sensitive files and sensitive data based on the configured sensitive data identification template. Sensitive data identification templates are classified into built-in identification templates and custom identification templates. DSC identifies and classifies sensitive data tables, fields, and files based on sensitive data identification templates. For more information, see Manage identification models.
View risk trends
In the Risk Trends section, you can view the risk trends of baseline security checks in the last 7 days and the last 30 days.