当前位置:网站首页>Sharing of source code anti disclosure scheme under burning scenario

Sharing of source code anti disclosure scheme under burning scenario

2022-07-06 07:25:00 Cnsidna. No.1

How to prevent disclosure of source code

Various embedded R & D and platform software R & D industries , Each has its own core data and core documents , User data and other sensitive information , These information data have the following commonalities :

It belongs to the core confidential information , In case of leakage, it will have a bad impact on

There are many types of core data , Source code data , Employees have high computer skills

A lot of data is in the business system , It's not a document

If you don't control , Designers and users can easily copy the data through various ways , Cause leakage .

  • Common secret related ways for R & D personnel

Because R & D personnel are more proficient in computers than ordinary office personnel , In addition to the common network , mail ,U disc ,QQ And other data diffusion methods , There are many other methods that are very easy for developers ( Not listed completely ):

Physical method :

Network cable direct connection , Unplug the network cable from the wall , Then connect directly to an uncontrolled computer ;

winPE start-up , Via CD or U Discoid winPE start-up , Even directly ISO The image starts .

virtual machine , Through installation VMWare virtual machine , Use peripherals in the virtual machine U disc , The Internet .

Other uncontrolled computers , That is, copy the data to other uncontrolled computers in the network , transit

Upload online , By building an upload server on the public network , Bypass Internet Behavior Management

Data distortion :

Write a console program , Print the code to DOS On the console, and then save the screen information as ;

Write the code to Log Log file , Or write code to shared memory , Then another program reads away .

Write interprocess communication program , Pass the code through socket, news ,LPC,COM,mutex, Shear plate , Pipeline and other interprocess communication methods , Transfer to send the data ;

adopt IIS/Tomcat etc. web The parser transfers , Publish the code data as a web page , Then browse the browser and save as , Or just write txt box , Copy all the code during initialization ;

Peripheral transfer

For embedded development scenarios , You can use the serial port ,U mouth , The network port burns the code to the equipment and leaks the secret

  • SDC Sandbox anti disclosure software

Developed by shenxinda SDC Sandbox leak proof products , Adopt kernel defense in depth , It is a driver level anti disclosure Software . Do not encrypt files , A sandbox is like a container , The container contains our confidential information . The documents we work on are all in sandboxes . The sandbox is completely isolated from ordinary computers . You might ask , What if I want to access the Internet , All programs to access the Internet are launched from the tray , Such as browser , Chat software, etc .SDC The sandbox is divided into the following parts : The management end , Confidential end , Documents are sent out , client .

The management end : Sandbox Control Center , Control all clients . The control of the client covers all aspects . Let me give you a few control functions : Reverse screenshot When someone wants to view some confidential information of the company remotely to the employee's computer ,SDC The client will control the remote software , Remote people see a black screen . But the computers on the staff side are in normal use . If you can control, you can let go . clipboard In sandbox mode, employees want to copy and paste company data such as files to the Internet through the clipboard ,SDC Sandbox is controlled , You can control the maximum number of clipping words .

Confidential end : Escort the server , Ordinary computers do not have access to confidential servers . Only sandbox computers can access , Do not encrypt the company's data , Protect data to the greatest extent .

client : Normal mode and sandbox mode . All software installation should be in sandbox mode . Work must be in sandbox mode , Because all the working data are on the encrypted disk , Sandbox can only be accessed in encrypted mode . In sandbox mode, it is isolated from the outside world . To access the Internet, only programs launched from the tray can , And follow the principle of only getting in and not getting out , Can get files from the Internet to the sandbox computer , However, to send documents from this machine to the Internet, you have to go through document approval .

Documents are sent out : A file distribution system is installed on a computer . The of this computer ip That is, the address where the document is sent out . Each sandbox employee matches an account number for sending out files . The specific approval method is not cumbersome here .

原网站

版权声明
本文为[Cnsidna. No.1]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207060721335584.html