The Detection process allows user to perform discovery in the AWS system. This process helps you to fetch sensitive information across AWS system.
Following are the pre-requisites:
Steps to Perform Detection
The following section of this page outlines the step-by-step procedure to discover sensitive information stored on AWS S3.
The first step is to create a policy in the PK Protect. Policy allows to create a set of Sensitive Data Types which are presented in the buckets. You can define your policies as well. To know how to create a policy, refer Hadoop & Files Policy.
The next step in the process of performing Detection is to create a task. The Task screen enables a user to select buckets of the objects in which sensitive information is stored. To know more about each field, refer Create Task in AWS.
View Detection Results
Once the task is executed successfully, the results get generated which depict what all information in the selected objects were sensitive. A list of detailed information is displayed in the Results screen. To know more about each tab in Results screen, refer AWS Results.