当前位置:网站首页>Star ring technology data security management platform defender heavy release
Star ring technology data security management platform defender heavy release
2022-07-05 17:57:00 【Star Ring Technology】

With the smooth flow of the international Internet information highway and international information exchange , Extensive business expansion , The risk of data security is also deteriorating dramatically . To ensure information security , The state has successively promulgated many safety related laws and regulations , In especial 2021 In the 《 Data security law 》 and 《 Personal information protection law 》 Data classification and hierarchical management 、 Personal information protection has put forward requirements . therefore , How to classify and classify large quantities of complex data in enterprises 、 How to master the flow direction and distribution of sensitive assets 、 How to ensure the security of the sharing of sensitive assets , Will become a challenge for enterprises to carry out business compliance transformation .

Xinghuan technology believes that enterprises need to achieve business legal compliance , The business system needs to meet four requirements : First of all , Classification, classification and protection of data ; second , Outbound security compliance of data ; Third , Personal information protection ; Fourth , Data supply chain security compliance . In order to meet these four requirements , Enterprises need to build a series of security technologies around the data life cycle , These include : Classification and grading 、 Desensitization watermark, etc . meanwhile , Enterprises also need to build a set of data security governance and monitoring system , Promote the implementation of business safety and compliance . in addition , It also requires continuous training and supervision of employees , Finally, the legal compliance of the business will be realized .

For the above problems , The data security management platform independently developed by star ring technology Transwarp Defensor stay 2022 The spring product launch week is a blockbuster launch ,Defensor It is a data centric data security protection tool , It can help enterprises understand the distribution of internal data sensitive information , Identify potential risks in a timely manner , And monitor the compliance use of important data ; meanwhile ,Defensor It can also classify and grade sensitive enterprise data , Encrypt and desensitize the data for business development , To prevent data leakage .

Transwarp Defensor The business value of

Transwarp Defensor Around data security laws and regulations and industry standards , Create a series of data security core functions , Help enterprises quickly build data security technology capabilities , Meet the demands of enterprises in data security compliance .

Transwarp Defensor Six core competencies

First of all , Identification and classification of sensitive data , Help enterprises comprehensively sort out sensitive assets , And draw a map of classified and graded assets .Defensor Built in classification and grading standard reference , It covers many industry laws and regulations , And in-depth cooperation with lawyers , A large number of rules have been jointly implemented ; Based on regular expressions 、 Keyword content 、 Algorithm matching 、 Dictionary matching, etc , Automatically scan global sensitive data , Provide timing sensitive identification scanning task .
second , Provide data desensitization and watermarking capabilities , So that sensitive data can be desensitized to serve the business , And can trace the source after the leakage . Various desensitization algorithms are preset on the platform , Open the box , Meet different scenarios , Desensitization requirements for different safety levels . When sensitive data needs to be circulated , Supports embedding watermarks in data sets , When data leaks , It can be traced through watermark analysis .
Third , Be able to identify and monitor sensitive data operations , Be able to identify the sensitive data in the flow and trigger the corresponding management strategy . basis GB/T 35273—2020《 Information security technology personal information security specifications 》 And other specifications define sensitive information , Configure the audit objects and data fields to which the rules apply , Generate alarm rules for data leakage class in the background , Audit to sensitive data leakage , Timely alarm and notify relevant personnel to block .
Fourth , Operation audit of big data platform and database , Avoid data security risks caused by illegal operations . The platform can implement bypass audit through the image gateway , You can also collect audit logs of big data components for analysis . The platform supports the login of big data platform 、 jurisdiction 、 Audit the source of database operation events , And preset a variety of audit alarm rules , Able to operate with high authority 、 Database high risk operation 、 Violations, SQL、 Abnormal behavior and other scenarios realize audit alarm .
The fifth , be based on GB/T 37964-2019《 Information security technology personal information de-identification guidelines 》《 Information security technology -- Specification for graded evaluation of the effect of personal information de labeling 》 Realize automatic personal information identification 、 De identification and de identification rating , Realize the protection of enterprise personal information assets .
The sixth , Data security protection strategy based on classification and grading results , It can support the flexible data compliance requirements of the business layer . Data security protection strategy based on classification and grading results , this 6 Three core competencies can help enterprises in the big data area 、 Big data application area , The production database area realizes complete data consolidation and legal compliance .
Besides ,Defensor stay 2021 In, it passed the special evaluation of the basic ability of data desensitization tools of the Chinese Academy of information and communications , It also proves the completeness and maturity of the function of the product .
Defenser Core strengths

Defensor Based on the classification and grading standards of the financial industry 50 Several industry sensitive rules are out of the box , It also supports customization , And the customization method is very flexible , For field names in structured data 、 Field contents 、 Field annotation and other matching fields , Comprehensive discovery of sensitive assets .
Defensor It can identify the derivative sensitive assets generated during the data processing based on the data blood source , For example, it is processed based on sensitive fields 、 Can identify and grade .
Defensor Be able to identify sensitive operations in the business operation process , It's not only for SQL For recording , Also able to SQL The library table columns accessed inside are parsed , It is convenient to judge rules based on classification results SQL Whether sensitivity is involved , Sensitive to SQL Perform sensitivity analysis .
Finally, a sensitive asset risk assessment report can be generated , Tell Enterprise Classification , What is the status of the assets , Whether the safety measures are implemented , And what potential security risks exist , Finally, it aims at the big data basic platform of starring technology Transwap Data Hub,Defensor It can provide more powerful security protection capability .
Defensor + Transwap Data Hub, Build a safe and reliable big data platform

Defensor Some security compliance toolsets are provided on the upper layer , It can realize sensitive identification and classification 、 Sensitive data operation monitoring and auditing 、 Static desensitization 、 Data watermark , Risk assessment of sensitive assets and protection strategies based on classification and grading , And the underlying big data infrastructure TDH Support service security isolation 、 Container isolation 、 Network isolation 、 Database row and column permission control 、 Database storage supports transparent encryption 、 Database endogenous support involves sensitivity SQL Dynamic audit 、 SQL Dynamic desensitization .

Denfensor Can accurately identify TDH Sensitive data in , At the same time, it can identify the derivative sensitive assets generated in the process of data processing based on data kinship , And configure data security protection strategies based on these sensitive assets , Issue to TDH platform , Once there is access to sensitive assets ,TDH It can realize dynamic desensitization or access interception according to relevant policies , Achieve end-to-end data security .

Dynamic desensitization based on database computing engine
Conclusion

Transwarp Defensor Combined with the security capability of the star ring big data platform , While supporting the business of enterprise big data platform , It can help enterprises build data centric data security protection , Provide classification 、 Sensitive operation monitoring 、 Data desensitization 、 Data watermark 、 Data security protection strategy 、 Security technology capabilities such as risk assessment of sensitive assets , Help the person in charge of enterprise data security understand the current situation of enterprise sensitive asset protection , Achieve in-process control over sensitive assets , It can be checked afterwards , Finally realize the legal compliance of the business .
边栏推荐
- Is it safe to open an account online? What is the general interest rate of securities financing?
- 小白入门NAS—快速搭建私有云教程系列(一)[通俗易懂]
- Knowledge points of MySQL (6)
- Data access - entityframework integration
- Cmake tutorial Step2 (add Library)
- IDC report: Tencent cloud database ranks top 2 in the relational database market!
- What are the requirements for PMP certification? How much is it?
- 2022新版PMP考试有哪些变化?
- LeetCode笔记:Weekly Contest 300
- 基于YOLOv3的口罩佩戴检测
猜你喜欢

flask接口响应中的中文乱码(unicode)处理

Anaconda中配置PyTorch环境——win10系统(小白包会)

How awesome is the architecture of "12306"?

Tencent music launched its new product "quyimai", which provides music commercial copyright authorization

论文阅读_中文NLP_LTP

JVM第三话 -- JVM性能调优实战和高频面试题记录

EPM相关

ELK日志分析系统

Matlab reference

IDC report: Tencent cloud database ranks top 2 in the relational database market!
随机推荐
[TestLink] testlink1.9.18 solutions to common problems
The comprehensive competitiveness of Huawei cloud native containers ranks first in China!
JVM第三话 -- JVM性能调优实战和高频面试题记录
Leetcode daily practice: rotating arrays
Disabling and enabling inspections pycharm
LeetCode 练习——206. 反转链表
Humi analysis: the integrated application of industrial Internet identity analysis and enterprise information system
Configure pytorch environment in Anaconda - win10 system (small white packet meeting)
Use QT designer interface class to create two interfaces, and switch from interface 1 to interface 2 by pressing the key
Which platform of outer disk gold is regular and safe, and how to distinguish it?
Customize the theme of matrix (I) night mode
Elk log analysis system
This 17-year-old hacker genius cracked the first generation iPhone!
7 pratiques devops pour améliorer la performance des applications
修复漏洞 - mysql 、es
To solve the problem of "double click PDF file, pop up", please install Evernote program
Delete some elements in the array
Easynmon Usage Summary
Cartoon: looking for the best time to buy and sell stocks
2022新版PMP考试有哪些变化?