In this tutorial, we will create a classification policy to identify PII as well as a custom regular expression. We will then use the CLI to classify data and examine the results.
Sample configuration
Save your configuration to a local file named classify_config.yaml. Click the link to see all supported info types.
# Policy to search for "sensitive PII" as defined by
Classify results are downloaded to the local directory in line-delimited JSONL to the file data.gz. Discovered entities are labeled from their offset within each field in the input CSV.