Cloud Data Loss Prevention (Cloud DLP) 現已併入機密資料保護。API 名稱維持不變:Cloud Data Loss Prevention API (DLP API)。如要瞭解構成 Sensitive Data Protection 的服務,請參閱「Sensitive Data Protection 總覽」。
混合式方法是一組非同步 API 方法,可讓您掃描從幾乎任何來源傳送的資料酬載,找出私密資訊並將結果儲存在 Google Cloud中。混合式方法與內容方法類似,因為您要檢查的資料會納入一或多個檢查要求中;不過,與內容方法不同的是,混合式方法不會在 API 回應中傳回檢查結果。檢查結果會改為在伺服器端以非同步方式處理,並以類似儲存方法的方式製成表格並儲存。
您可以設定探索功能,掃描儲存在 BigQuery、Cloud SQL、Cloud Storage 和 Vertex AI 等系統中的資料。 Google Cloud 如果您已啟用 Security Command Center Enterprise,也可以使用 Sensitive Data Protection 掃描其他雲端供應商的資料。
您可以指定 Sensitive Data Protection 在每次探索掃描後執行的動作。舉例來說,您可以將掃描結果傳送至其他服務 (例如 Security Command Center 和 Google Security Operations),進一步瞭解貴機構的資料安全防護機制。Google Cloud 您可以設定探索服務,為已設定檔的資源加上標記,自動授予或拒絕這些資源的 IAM 存取權。您也可以將資料剖析匯出至 BigQuery。您可以將匯出的設定檔連結至 Looker,查看預先製作的報表。您也可以建立自己的自訂查詢和報表。
如要啟用探索功能,請建立 DiscoveryConfig 資源。探索作業會根據您在探索設定中設定的範圍和頻率執行。如要瞭解 Sensitive Data Protection 將產生的設定檔儲存在何處,請參閱資料落地考量事項。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[],[],null,["# Method types\n\nSensitive Data Protection includes different types of methods that you can use to\ninspect, transform (*de-identify*), discover, and classify data. Using these\nmethods, you can scan data both on and off Google Cloud and optimize the\nbehavior of Sensitive Data Protection for different types of workloads.\n\nSensitive Data Protection provides the following method types:\n\n- [Content methods](#content-methods)\n- [Storage methods](#storage-methods)\n- [Hybrid methods](#hybrid-methods)\n- [Discovery methods](#discovery-methods)\n\nInspection and de-identification methods\n----------------------------------------\n\nThis section describes the methods that you can use to locate and, optionally,\nde-identify each piece of data that matches an [information\ntype](/sensitive-data-protection/docs/infotypes-reference) listed in your your [inspection\nconfiguration](/sensitive-data-protection/docs/reference/rest/v2/InspectConfig).\n\n### Content methods\n\n*Content methods* are synchronous, stateless methods. The data to be inspected\nor transformed is sent directly in the request to the DLP API.\nSensitive Data Protection inspection findings or transformed data is returned in\nthe API response. Request data is encrypted in transit and is not stored.\n\nTo learn more, explore the REST API reference for content methods:\n\n- [`content.inspect`](/sensitive-data-protection/docs/reference/rest/v2/projects.content/inspect)\n- [`content.deidentify`](/sensitive-data-protection/docs/reference/rest/v2/projects.content/deidentify)\n- [`content.reidentify`](/sensitive-data-protection/docs/reference/rest/v2/projects.content/reidentify)\n- [`image.redact`](/sensitive-data-protection/docs/reference/rest/v2/projects.image/redact)\n\n### Storage methods\n\n*Storage methods* are designed to inspect data stored on Google Cloud in systems\nlike [Cloud Storage](/storage), [BigQuery](/bigquery), and\n[Firestore in Datastore mode (Datastore)](/datastore). To enable storage inspection, you create a\nSensitive Data Protection job using the\n[`dlpJobs`](/sensitive-data-protection/docs/reference/rest/v2/projects.dlpJobs)\nresource. Each job runs as a managed service to inspect data and then perform\n[Sensitive Data Protection actions](/sensitive-data-protection/docs/concepts-actions) such as save or publish findings. In\naddition to these optional actions, Sensitive Data Protection creates and stores\ndetails about the job including job status, bytes scanned, and summary findings\nper infoType. You can manage jobs using the DLP API or\nSensitive Data Protection in the [Google Cloud console](https://console.cloud.google.com/security/sensitive-data-protection).\n\nTo learn more, explore the REST API reference for the\n[`projects.dlpJobs`](/sensitive-data-protection/docs/reference/rest/v2/projects.dlpJobs) resource. You specify the\nstorage details in the\n[`StorageConfig`](/sensitive-data-protection/docs/reference/rest/v2/InspectJobConfig#storageconfig) object.\n\n### Hybrid methods\n\n*Hybrid methods* are a set of asynchronous API methods that allow you to scan\npayloads of data sent from virtually any source for sensitive information and\nstore the findings in Google Cloud. Hybrid methods are similar to\n[content methods](#content-methods) in that the data you want to inspect is\nincluded in one or more inspection requests; however, unlike\n[content methods](#content-methods), *hybrid methods* do not return inspection\nresults in the API response. Instead, inspection results are processed\nserver-side asynchronously and results are tabulated and stored in a\nmanner similar to [storage methods](#storage-methods).\n\nTo enable hybrid inspection, you create a Sensitive Data Protection job using the\n[`dlpJobs`](/sensitive-data-protection/docs/reference/rest/v2/projects.dlpJobs)\nresource. Each *hybrid* job runs as a managed service to listen for inspection\nrequests and performs [Sensitive Data Protection actions](/sensitive-data-protection/docs/concepts-actions) such as\nsave or publish findings. In addition to these optional actions,\nSensitive Data Protection creates and stores details about the job including job\nstatus, bytes scanned, and summary findings per infoType. You can manage jobs\nusing the DLP API or Sensitive Data Protection in the\n[Google Cloud console](https://console.cloud.google.com/security/sensitive-data-protection).\n\nTo learn more, explore the REST API reference for the\n[`projects.dlpJobs`](/sensitive-data-protection/docs/reference/rest/v2/projects.dlpJobs) resource. You specify the\ndata source in the `hybridOptions` field of the\n[`StorageConfig`](/sensitive-data-protection/docs/reference/rest/v2/InspectJobConfig#storageconfig) object.\n\nDiscovery methods\n-----------------\n\n*Discovery methods* allow you to configure [sensitive data\ndiscovery](/sensitive-data-protection/docs/data-profiles) to generate *data profiles*. Data\nprofiles provide insights to help you determine where sensitive data reside in\nyour organization, what kind of sensitive data you are storing, and whether that\ndata has access controls in place.\n\nYou can configure discovery to scan data stored on Google Cloud in systems like\nBigQuery, Cloud SQL, Cloud Storage, and Vertex AI. If you\nhave a Security Command Center Enterprise activation, you can also use\nSensitive Data Protection to scan data from other cloud providers.\n\nYou can specify actions that you want Sensitive Data Protection to perform after\neach discovery scan. For example, you can send scan results to other\nGoogle Cloud services---like Security Command Center and\nGoogle Security Operations---to increase your visibility into your\norganization's data security posture. You can configure the discovery service to\ntag your profiled resources to automatically grant or deny IAM\naccess to those resources. You can also export the data profiles to\nBigQuery. You can connect the exported profiles to Looker to\n[view the premade\nreport](/sensitive-data-protection/docs/analyze-data-profiles#use_a_premade_report). You can\nalso create your own custom queries and reports.\n\nTo enable discovery, you create a\n[`DiscoveryConfig`](/sensitive-data-protection/docs/reference/rest/v2/organizations.locations.discoveryConfigs)\nresource. Discovery runs based on the scope and frequency that you set in the\ndiscovery configuration. For information about where Sensitive Data Protection\nstores the generated profiles, see [Data residency\nconsiderations](/sensitive-data-protection/docs/data-profiles#data-residency).\n\nYou can manage the discovery configurations, data profiles, and Cloud SQL\nconnections using the DLP API or the\n[Google Cloud console](https://console.cloud.google.com/security/sensitive-data-protection).\n\nTo learn more, explore the REST API reference for the following:\n\n- Discovery configurations\n\n - [`organizations.locations.discoveryConfigs`](/sensitive-data-protection/docs/reference/rest/v2/organizations.locations.discoveryConfigs)\n - [`projects.locations.discoveryConfigs`](/sensitive-data-protection/docs/reference/rest/v2/projects.locations.discoveryConfigs)\n- Connections\n\n Connections are relevant only to [discovery for\n Cloud SQL](/sensitive-data-protection/docs/data-profiles#cloud-sql).\n - [`organizations.locations.connections`](/sensitive-data-protection/docs/reference/rest/v2/organizations.locations.connections)\n - [`projects.locations.connections`](/sensitive-data-protection/docs/reference/rest/v2/projects.locations.connections)\n- Data profiles\n\n - [`organizations.locations.projectDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/organizations.locations.projectDataProfiles)\n - [`projects.locations.projectDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/projects.locations.projectDataProfiles)\n - [`organizations.locations.fileStoreDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/organizations.locations.fileStoreDataProfiles)\n - [`projects.locations.fileStoreDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/projects.locations.fileStoreDataProfiles)\n - [`organizations.locations.tableDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/organizations.locations.tableDataProfiles)\n - [`projects.locations.tableDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/projects.locations.tableDataProfiles)\n - [`organizations.locations.columnDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/organizations.locations.columnDataProfiles)\n - [`projects.locations.columnDataProfiles`](/sensitive-data-protection/docs/reference/rest/v2/projects.locations.columnDataProfiles)\n\nWhat's next\n-----------\n\n- Read the how-to guides to get started with inspecting text and images for sensitive data, as well as redacting sensitive data from text and images:\n - [Inspecting text for sensitive data](/sensitive-data-protection/docs/inspecting-text)\n - [Inspecting structured text for sensitive\n data](/sensitive-data-protection/docs/inspecting-structured-text)\n - [Inspecting images for sensitive data](/sensitive-data-protection/docs/inspecting-images)\n - [Redacting sensitive data from\n images](/sensitive-data-protection/docs/redacting-sensitive-data-images)\n - [De-identifying sensitive data](/sensitive-data-protection/docs/deidentify-sensitive-data)\n- For more information about inspecting storage and how to use actions, see [Inspecting storage and databases for sensitive\n data](/sensitive-data-protection/docs/inspecting-storage).\n- For more information about sensitive data discovery, see [Data\n profiles](/sensitive-data-protection/docs/data-profiles)\n- Review [pricing](/sensitive-data-protection/pricing)."]]