检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Deleting a policy: Click Delete in the Operation column of a policy that is successfully delivered to delete the policy. After you click Delete, a message is displayed in the upper right corner of the page, indicating that the policy is successfully deleted.
Click Edit in the Operation column to modify a measure, or click Delete to delete an unnecessary measure. Click OK to view the configured measures in the policy baseline list. Configuring Data Protection Type Go to the Policy Baseline page by referring to Procedure.
Click Edit in the Operation column to modify a measure, or click Delete to delete an unnecessary measure. Click OK to view the configured measures in the policy baseline list. Configuring Data Protection Type Go to the Policy Baseline page by referring to Procedure.
Click Edit in the Operation column to modify a measure, or click Delete to delete an unnecessary measure. Click OK to view the configured measures in the policy baseline list. Configuring Data Protection Type Go to the Policy Baseline page by referring to Procedure.
Click Edit in the Operation column to modify a measure, or click Delete to delete an unnecessary measure. Click OK to view the configured measures in the policy baseline list. Configuring Data Protection Type Go to the Policy Baseline page by referring to Procedure.
Click Edit in the Operation column to modify a measure, or click Delete to delete an unnecessary measure. Click OK to view the configured measures in the policy baseline list. Configuring Data Protection Type Go to the Policy Baseline page by referring to Procedure.
Click Edit in the Operation column to modify a measure, or click Delete to delete an unnecessary measure. Click OK to view the configured measures in the policy baseline list. Configuring Data Protection Type Go to the Policy Baseline page by referring to Procedure.
Solutions Delete the database instance. Grant the read and write permission of the database instance to DSC by referring to Adding an RDS Database.
Delete sensitive files. Copy sensitive files. Abnormal data management When a bucket is added, the system detects that the bucket is a public read or a public read/write bucket.
Any user can read, write, or delete objects in the bucket. Private Bucket If you set Bucket Policy to Private when creating an OBS bucket, the bucket is a private bucket and only the current user can access it.
DELETE: requests the server to delete specified resources, for example, an object. HEAD: same as GET except that the server must return only the response header. PATCH: requests the server to update partial content of a specified resource.
- Data destruction If a user deletes service data or is deregistered, the DSC will physically delete all the service data and user data. - Data masking DSC can mask sensitive data without affecting the original user data.
In the Operation column of the keyword replacement rule list, click Delete to delete a masking rule. The following algorithms have been built in: Masking Using the Null Value: Set fields of any type to NULL.
Authorized users access, download, and modify sensitive data, as well as change and delete permissions. Authorized users change or delete permissions granted for buckets that contain sensitive data. Users who accessed sensitive files fail to log in to the device.
Task Settings Click or to enable or disable Delete disconnected metadata. When to Execute Identification Period: You can select Once, Daily, Weekly, or Monthly. When to Execute: You can select Now or As scheduled. Click Next.
Move the cursor to a label name in the All Data tree and click to delete the label. Click OK. After the label is deleted, assets under the label are moved to Ungrouped. Parent Topic: Asset Management
Click Remove in the Operation column to delete unnecessary rules. The Categorization and leveling result details page displays the identification object details, result details, and sample data.
Click Delete in the Operation column of the target task. You can also select multiple tasks and click Batch Delete to delete them. The deletion cannot be undone. Parent Topic: Injecting Watermarks
Delete sensitive files. Copy sensitive files. Abnormal data management When a bucket is added, the system detects that the bucket is a public read or a public read/write bucket.
For example, if you have software developers and you want to assign them the permission to access DSC but not to delete DSC or its resources, you can create an IAM policy to assign the developers the permission to access DSC but prevent them from deleting DSC data.