Skip to main content

How to Perform Detection in AWS

The Detection process allows user to perform discovery in the AWS system. This process helps you to fetch sensitive information across AWS system.

Pre-requisites

Following are the pre-requisites:

  1. Controller must be installed. For detailed information about the installation process, refer Install DSM Administrator in Linux and Install DSM Administrator in Windows.

  2. S3 and Cloud IDP must be Installed. To know more about how to install S3 and Cloud IDP, refer Install S3 IDP and Install Cloud IDP.

Steps to Perform Detection

The following section of this page outlines the step-by-step procedure to discover sensitive information stored on AWS S3.

  1. The first step is to create a policy in the PK Protect. Policy allows to create a set of Sensitive Data Types which are presented in the buckets. You can define your policies as well. To know how to create a policy, refer Hadoop & Files Policy.

  2. The next step in the process of performing Detection is to create a task. The Task screen enables a user to select buckets of the objects in which sensitive information is stored. To know more about each field, refer Create Task in AWS.

View Detection Results

Once the task is executed successfully, the results get generated which depict what all information in the selected objects were sensitive. A list of detailed information is displayed in the Results screen. To know more about each tab in Results screen, refer AWS Results.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.