当前位置:网站首页>Star ring technology data security management platform defender heavy release
Star ring technology data security management platform defender heavy release
2022-07-05 17:57:00 【Star Ring Technology】
With the smooth flow of the international Internet information highway and international information exchange , Extensive business expansion , The risk of data security is also deteriorating dramatically . To ensure information security , The state has successively promulgated many safety related laws and regulations , In especial 2021 In the 《 Data security law 》 and 《 Personal information protection law 》 Data classification and hierarchical management 、 Personal information protection has put forward requirements . therefore , How to classify and classify large quantities of complex data in enterprises 、 How to master the flow direction and distribution of sensitive assets 、 How to ensure the security of the sharing of sensitive assets , Will become a challenge for enterprises to carry out business compliance transformation .
Xinghuan technology believes that enterprises need to achieve business legal compliance , The business system needs to meet four requirements : First of all , Classification, classification and protection of data ; second , Outbound security compliance of data ; Third , Personal information protection ; Fourth , Data supply chain security compliance . In order to meet these four requirements , Enterprises need to build a series of security technologies around the data life cycle , These include : Classification and grading 、 Desensitization watermark, etc . meanwhile , Enterprises also need to build a set of data security governance and monitoring system , Promote the implementation of business safety and compliance . in addition , It also requires continuous training and supervision of employees , Finally, the legal compliance of the business will be realized .
For the above problems , The data security management platform independently developed by star ring technology Transwarp Defensor stay 2022 The spring product launch week is a blockbuster launch ,Defensor It is a data centric data security protection tool , It can help enterprises understand the distribution of internal data sensitive information , Identify potential risks in a timely manner , And monitor the compliance use of important data ; meanwhile ,Defensor It can also classify and grade sensitive enterprise data , Encrypt and desensitize the data for business development , To prevent data leakage .
Transwarp Defensor The business value of
Transwarp Defensor Around data security laws and regulations and industry standards , Create a series of data security core functions , Help enterprises quickly build data security technology capabilities , Meet the demands of enterprises in data security compliance .
Transwarp Defensor Six core competencies
First of all , Identification and classification of sensitive data , Help enterprises comprehensively sort out sensitive assets , And draw a map of classified and graded assets .Defensor Built in classification and grading standard reference , It covers many industry laws and regulations , And in-depth cooperation with lawyers , A large number of rules have been jointly implemented ; Based on regular expressions 、 Keyword content 、 Algorithm matching 、 Dictionary matching, etc , Automatically scan global sensitive data , Provide timing sensitive identification scanning task .
second , Provide data desensitization and watermarking capabilities , So that sensitive data can be desensitized to serve the business , And can trace the source after the leakage . Various desensitization algorithms are preset on the platform , Open the box , Meet different scenarios , Desensitization requirements for different safety levels . When sensitive data needs to be circulated , Supports embedding watermarks in data sets , When data leaks , It can be traced through watermark analysis .
Third , Be able to identify and monitor sensitive data operations , Be able to identify the sensitive data in the flow and trigger the corresponding management strategy . basis GB/T 35273—2020《 Information security technology personal information security specifications 》 And other specifications define sensitive information , Configure the audit objects and data fields to which the rules apply , Generate alarm rules for data leakage class in the background , Audit to sensitive data leakage , Timely alarm and notify relevant personnel to block .
Fourth , Operation audit of big data platform and database , Avoid data security risks caused by illegal operations . The platform can implement bypass audit through the image gateway , You can also collect audit logs of big data components for analysis . The platform supports the login of big data platform 、 jurisdiction 、 Audit the source of database operation events , And preset a variety of audit alarm rules , Able to operate with high authority 、 Database high risk operation 、 Violations, SQL、 Abnormal behavior and other scenarios realize audit alarm .
The fifth , be based on GB/T 37964-2019《 Information security technology personal information de-identification guidelines 》《 Information security technology -- Specification for graded evaluation of the effect of personal information de labeling 》 Realize automatic personal information identification 、 De identification and de identification rating , Realize the protection of enterprise personal information assets .
The sixth , Data security protection strategy based on classification and grading results , It can support the flexible data compliance requirements of the business layer . Data security protection strategy based on classification and grading results , this 6 Three core competencies can help enterprises in the big data area 、 Big data application area , The production database area realizes complete data consolidation and legal compliance .
Besides ,Defensor stay 2021 In, it passed the special evaluation of the basic ability of data desensitization tools of the Chinese Academy of information and communications , It also proves the completeness and maturity of the function of the product .
Defenser Core strengths
Defensor Based on the classification and grading standards of the financial industry 50 Several industry sensitive rules are out of the box , It also supports customization , And the customization method is very flexible , For field names in structured data 、 Field contents 、 Field annotation and other matching fields , Comprehensive discovery of sensitive assets .
Defensor It can identify the derivative sensitive assets generated during the data processing based on the data blood source , For example, it is processed based on sensitive fields 、 Can identify and grade .
Defensor Be able to identify sensitive operations in the business operation process , It's not only for SQL For recording , Also able to SQL The library table columns accessed inside are parsed , It is convenient to judge rules based on classification results SQL Whether sensitivity is involved , Sensitive to SQL Perform sensitivity analysis .
Finally, a sensitive asset risk assessment report can be generated , Tell Enterprise Classification , What is the status of the assets , Whether the safety measures are implemented , And what potential security risks exist , Finally, it aims at the big data basic platform of starring technology Transwap Data Hub,Defensor It can provide more powerful security protection capability .
Defensor + Transwap Data Hub, Build a safe and reliable big data platform
Defensor Some security compliance toolsets are provided on the upper layer , It can realize sensitive identification and classification 、 Sensitive data operation monitoring and auditing 、 Static desensitization 、 Data watermark , Risk assessment of sensitive assets and protection strategies based on classification and grading , And the underlying big data infrastructure TDH Support service security isolation 、 Container isolation 、 Network isolation 、 Database row and column permission control 、 Database storage supports transparent encryption 、 Database endogenous support involves sensitivity SQL Dynamic audit 、 SQL Dynamic desensitization .
Denfensor Can accurately identify TDH Sensitive data in , At the same time, it can identify the derivative sensitive assets generated in the process of data processing based on data kinship , And configure data security protection strategies based on these sensitive assets , Issue to TDH platform , Once there is access to sensitive assets ,TDH It can realize dynamic desensitization or access interception according to relevant policies , Achieve end-to-end data security .
Dynamic desensitization based on database computing engine
Conclusion
Transwarp Defensor Combined with the security capability of the star ring big data platform , While supporting the business of enterprise big data platform , It can help enterprises build data centric data security protection , Provide classification 、 Sensitive operation monitoring 、 Data desensitization 、 Data watermark 、 Data security protection strategy 、 Security technology capabilities such as risk assessment of sensitive assets , Help the person in charge of enterprise data security understand the current situation of enterprise sensitive asset protection , Achieve in-process control over sensitive assets , It can be checked afterwards , Finally realize the legal compliance of the business .
边栏推荐
猜你喜欢
Binder开辟线程数过多导致主线程ANR异常
十个顶级自动化和编排工具
Short the command line via jar manifest or via a classpath file and rerun
Abnormal recovery of virtual machine Oracle -- Xi Fenfei
"Xiaodeng in operation and maintenance" is a single sign on solution for cloud applications
破解湖+仓混合架构顽疾,星环科技推出自主可控云原生湖仓一体平台
Neural network self cognition model
What are the changes in the 2022 PMP Exam?
提高應用程序性能的7個DevOps實踐
mybash
随机推荐
基于YOLOv3的口罩佩戴检测
解决“双击pdf文件,弹出”请安装evernote程序
Teamcenter 消息注册前操作或後操作
tkinter窗口预加载
较文心损失一点点性能提升很多
得知女儿被猥亵,35岁男子将对方打至轻伤二级,法院作出不起诉决定
Compter le temps d'exécution du programme PHP et définir le temps d'exécution maximum de PHP
Why is February 28 in the Gregorian calendar
C # mixed graphics and text, written to the database in binary mode
matlab内建函数怎么不同颜色,matlab分段函数不同颜色绘图
Size_ T is unsigned
从XML架构生成类
Oracle Recovery Tools ----oracle数据库恢复利器
Cmake tutorial Step2 (add Library)
統計php程序運行時間及設置PHP最長運行時間
Server configuration jupyter environment
钉钉开放平台小程序API的缓存接口都有哪些内容?
使用QT遍历Json文档及搜索子对象
EPM related
寻找第k小元素 前k小元素 select_k