Data security center (sensitive data protection)
Play video
Data Security Center Data Security Center provides customers with data security capabilities such as automatic identification of sensitive data, hierarchical classification, big data security audit and data desensitization, forming an integrated cloud wide data leakage prevention and security solution to help customers achieve equal protection 2.0 level II related "security audit" and level III related "personal information protection" While meeting the requirements of the Data Security Law.

Product specification

Product value

Equal insurance compliance guarantee
Help to meet the compliance requirements for data security in Level II and Level III of Equal Protection 2.0, and combine the two dimensions of "personal information protection" and "data behavior audit"
Big data security audit
On the basis of covering traditional databases, it also covers various types of storage, such as OSS for object storage, MaxCompute for big data platform, and Alibaba Cloud data middle office, to achieve all-round unified management
Reduce the risk of data leakage
Relying on the cloud's native capabilities, it can effectively identify and monitor sensitive data and high-risk activities (such as abnormal data access and potential leakage risks) through intelligent algorithms, and provide real-time interception and traceability capabilities
Comprehensive data security control
Comprehensively realize data centric audit and protection: accurate identification of sensitive data, automatic classification and grading, one click inventory of data assets, and provide rich desensitization algorithms

Product advantages

Accurate identification and classification of cloud data, providing a wealth of standardized algorithms and defense rules
Support about 200 file types and more than 40 sensitive data identification capabilities; More than 30 standard desensitization algorithms of 6 categories are provided; Built in abnormal behavior precise identification and safety audit rules. All rules support customization. Customer Stories
Covering various cloud data sources to achieve unified data security management
Support for structured database RDS DRDS, PolarDB, OceanBase, ECS self built databases, unstructured data storage OSS OTS, Data audit and protection of MaxCompute, a big data platform. Free trial
No agent needs to be deployed and no tenant resources are occupied
Based on the cloud's native capabilities, it provides agentless mode, out of the box, second level access, and instantly protects your cloud data. Buy Now

Product Functions

Data full link monitoring and management capability, data security compliance inspection
Sensitive data identification
Discover and lock protection objects from massive data, scan, classify and grade the database type data and non database type files stored by them as a whole through built-in algorithm rules and user-defined sensitive data recognition rules, and provide further security protection according to the results, such as fine-grained access control, encryption and storage.
Fine grained data audit
The ability of fine-grained behavior audit traceability can audit user terminal information, tools, data information, return results and other details, restore user behavior tracks in the whole scene, and effectively track the access behavior of traceable data.
Data desensitization
Support the desensitization of production sensitive data to non production environments such as development and testing through flexible built-in or customized desensitization algorithms, and ensure the authenticity and availability of desensitized data.
Data leakage detection and protection
Analyze the access behavior of internal and external accounts to sensitive files through the intelligent detection model, realize the abnormal detection of sensitive data access, and provide relevant alarms for the data security management team.

Application scenarios

One stop protection of cloud native data
Sensitive data discovery and classification
Accountability for leaks
Data desensitization
Equal assurance compliance
Our advantages
Based on years of practice of Alibaba Cloud, through summarizing and precipitating a large number of data security work experience of cloud enterprises, four core data security capabilities that cloud enterprises need to build are extracted. It is unnecessary to install agents, and use big data and machine learning capabilities to effectively identify and monitor sensitive data and high-risk activities, and provide repair solutions. At the same time, it also provides a variety of data desensitization algorithms to effectively prevent data leakage.
Key data security issues
Build sensitive identification capability of each life cycle
Full audit database OSS and other big data
Provide desensitization capability for sensitive data
Find "Insider" to control the use of abnormal permissions
Related products
Our advantages
Automatically discover and analyze the use of sensitive data from massive data, and store structured data (RDS) and unstructured data (OSS MaxCompute, etc.) for further security protection.
Key data security issues
Hide Asset Autodiscover
Semantic recognition based on NLP to accurately discover sensitive information
Customize Hierarchical Classification Rules
Related products
Our advantages
Enterprise internal control: when an enterprise has a major sensitive data leakage event, it must conduct a comprehensive event restoration and serious accountability. However, due to the large number of data visitors and the uncertain way of disclosure, it is difficult to determine responsibilities and obtain evidence, and the final tracing action is not completed. Sensitive data protection uses watermark technology to locate the leaked data set at the time of disclosure and the suspect, narrow the scope of investigation, and ensure that the leaking enterprise can quickly track down the responsible person, so as to minimize the impact of the leakage event.
Key data security issues
Accurately trace leakage events
Support data marking and implicit watermarking, and zero perception in office
Full monitoring of abnormal events and full recording of audit logs
Related products
Our advantages
After sensitive information is found, the production, testing and analysis environment shall be desensitized to prevent disclosure. Multiple desensitization algorithms, rich desensitization scenario support, and flexible support for various desensitization tasks.
Key data security issues
Support 10+advanced desensitization algorithms
One button operation of multiple desensitization templates
The desensitization scene is visible and rich
Related products
Our advantages
The data audit meets the compliance requirements of Level II and Level III of Equal Protection 2.0, perceives dangerous operations, gives timely warnings, and keeps full logs. A variety of preset compliance schemes and reports can more clearly and regularly display the security measures in the network that comply with the relevant provisions of equal protection, helping your network pass the equal protection evaluation.
Key data security issues
Remote storage of audit logs for compliance
Provide audit reports in the dimensions of ex ante, ex post, ordinary users, administrators, etc
Provide monitoring of performance, data and behavior abnormalities
Related products

Product Dynamics

2018-09-01 New Product
The public beta of sensitive data protection products was launched.
View details
2019-06-27 New products
Static data desensitization (public cloud) online
View details
2019-07-04 New products
The commercial version of sensitive data protection product was officially launched.
View details
2019-10-17 Price adjustment
On line pay as you go billing method, adjust some billing units.
View details
New functions/specifications on November 21, 2019
Sensitive data identification (asset status and list display of sensitive identification results) function went online.
View details
New functions/specifications on December 26, 2019
Incremental desensitization No primary key desensitization Batch database authorization SQL Server RDS support
View details
2020-01-18 New Features/Specifications
PorlaDB and DRDS support audit, identification and desensitization.
View details
2020-01-20 New Features/Specifications
Support self built database identification and OSS structured file desensitization
View details
2020-07-16 New Features/Specifications
Support the identification of sensitive information in pictures (OCR technology)
View details
2020-09-08 New Features/Specifications
OceanBase supports audit and sensitive data identification
View details
2020-10-28 New Features/Specifications
Custom Sensitive Identification Rules
View details
New functions/specifications of 2020-11-18
Support RDS-PG database, support whole database desensitization and desensitization to SQL
View details
2020-11-25 New Features/Specifications
Support desensitization of the original table
View details
2020-11-27 New Features/Specifications
Add built-in audit rules for RDS and MaxCompute
View details
2020-12-15 New Features/Specifications
Support DRDS The desensitization capability of RDS-PG supports ADB's sensitivity identification capability
View details
2020-12-17 New Features/Specifications
Support desensitization of RDS PostgreSQL
View details
2020-12-20 New Features/Specifications
Launching Novice Logistics Cloud
View details
2020-12-25 New Features/Specifications
Function of sending weekly/monthly reports via online email
View details
2021-01-05 Function optimization
Optimization of authorization experience: automatic authorization after batch import of passwords
View details
2021-01-06 New Features/Specifications
The anomaly detection capability is greatly improved, and the detection model RDS weak password is added
View details
2021-01-08 New Features/Specifications
Heavy release of new capabilities: support OCR technology to identify sensitive information in images
View details
2021-01-13 New Features/Specifications
Add Linux Passwd files Identification of sensitive information such as URL links
View details
2021-01-19 New Features/Specifications
Support sensitive information identification of RDS-PPAS RDS-MARIA
View details
2021-02-05 new products
Heavy release!!! Sensitive data protection is renamed as data security center, and database audit is integrated
View details
2021-03-09 New Features/Specifications
Online email alarm function of data security center
View details
2021-03-15 New Features/Specifications
Data security center online white list function
View details
2021-04-06 New Features/Specifications
Data Security Center Online Report Center
View details
2021-04-23 New Features/Specifications
Support cloud native data audit of Redis and MongoDB
View details
2021-05-11 New Features/Specifications
Data watermark function goes online in Data Security Center
View details
2022-03-28 New Features/Specifications
The Data Security Center added the compliance test report of the Data Security Law
View details
2022-11-01 New Features/Specifications
The data security center publishes the data asset center function module
View details
2023-03-10 New Features/Specifications
The data security center supports the identification and detection of personal information through data labels
View details
2023-04-28 New Features/Specifications
Data security center publishing log storage management module
View details
2023-08-10 New Region/New Availability Zone
Data security center opened in Chengdu region
View details
2023-09-12 New Features/Specifications
15 reports in 5 categories, including online compliance analysis, security operation analysis and performance analysis
View details
2023-11-27 New Features/Specifications
Support OSS Data outbound monitoring capability in API scenarios
View details
View all logs

Hotspot Express

Documentation and Tools