检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Solutions Delete the database instance. Then, grant the read and write permissions to the database instance again by referring to Adding a Self-Built Database Instance.
Delete sensitive files. Copy sensitive files. Abnormal data management When a bucket is added, the system detects that the bucket is a public read or a public read/write bucket.
Any user can read, write, or delete objects in the bucket. Private Bucket If you set Bucket Policy to Private when creating an OBS bucket, the bucket is a private bucket and only the current user can access it.
DELETE: requests the server to delete specified resources, for example, an object. HEAD: same as GET except that the server must return only the response header. PATCH: requests the server to update partial content of a specified resource.
- Data destruction If a user deletes service data or is deregistered, the DSC will physically delete all the service data and user data. - Data masking DSC can mask sensitive data without affecting the original user data.
In the Operation column of the keyword replacement rule list, click Delete to delete a masking rule. The following algorithms have been built in: Masking Using the Null Value: Set fields of any type to NULL.
Authorized users access, download, and modify sensitive data, as well as change and delete permissions. Authorized users change or delete permissions granted for buckets that contain sensitive data. Users who accessed sensitive files fail to log in to the device.
Click Remove in the Operation column to delete unnecessary rules. The Categorization and leveling result details page displays the identification object details, result details, and sample data.
Move the cursor to a label name in the All Data tree and click to delete the label. Click OK. After the label is deleted, assets under the label are moved to Ungrouped. Parent Topic: Asset Management
Click More > Delete in the Operation column of the target task. In the displayed dialog box, click OK to delete the task. If an identification task is running, stop the task or wait until the task is complete, then delete it. The deletion operation cannot be undone.
project_id String Project ID. name String Template name. description String Template description. category String Template category. is_default Boolean Whether the template is a default template. create_time Long Creation time. update_time Long Update time. is_deleted Boolean Whether to delete
Delete sensitive files. Copy sensitive files. Abnormal data management When a bucket is added, the system detects that the bucket is a public read or a public read/write bucket.
For example, if you have software developers and you want to assign them the permission to access DSC but not to delete DSC or its resources, you can create an IAM policy to assign the developers the permission to access DSC but prevent them from deleting DSC data.
URI DELETE /v1/{project_id}/sdg/scan/job/{job_id} Table 1 Path Parameters Parameter Mandatory Type Description job_id Yes String Task ID project_id Yes String Project ID Request Parameters None Response Parameters Status code: 200 Table 2 Response body parameters Parameter Type Description
DSC will delete your agencies and assets and all related data. Exercise caution when performing this operation.
Task Settings Click or to enable or disable Delete disconnected metadata. When to Execute Identification Period: You can select Once, Daily, Weekly, or Monthly. When to Execute: You can select Now or As scheduled.
DSC will delete your agencies and assets and all related data. Exercise caution when performing this operation. For details, see Allowing or Disallowing Access to Cloud Assets. Asset sensitivity level legend: Each color represents an asset sensitivity level from L0 to L10.
DSC will delete your authorization information and assets and all related data. Exercise caution when performing this operation.
Click Delete in the Operation column of the target masking task to delete the task. Parent Topic: Data Masking