当前位置:网站首页>Gbase observation | how to protect the security of information system with frequent data leakage
Gbase observation | how to protect the security of information system with frequent data leakage
2022-07-08 01:41:00 【Gbase database】
In recent years, , With the evolution of new information technology represented by cloud services , Many users have begun to use new technology to build and transform the original information system , However, some users lack safety vigilance and specifications in the use process , Data leaks are common . Regarding this ,GBASE Information security experts say : For information systems with high security requirements , For example, classified information system 、 Information systems above level 3 specified in the requirements for security level protection of information systems 、 Core information system of pillar industries of national economy , And other information systems, which have high security requirements for data management , The database used , It is suggested to strengthen safety protection measures , Including data encryption 、 Comply with national information security standards and system security :
One 、 Data encryption
Data encryption is one of the most reliable methods to protect user data . Through data encryption 、 Storage encryption 、 Data integrity authentication 、 Key management and other technologies encrypt the information in the database , It can effectively protect the information security of users when they encounter dragging libraries , It can also prevent data from being compromised during storage and transmission .
The security database product should also support hardware quotient algorithm , Conform to the national security algorithm , Follow strictly 《 Code device application interface specification 》, By using the hardware password card that obtains the national password model certificate , It can effectively ensure the security of user passwords , Protect the confidentiality of stored data .
Two 、 Comply with national information security standards
Each component module of the information system ( For example, operating system 、 database 、 Middleware etc. ) Products that meet national safety standards must be used . Not because of a certain product ( For example, cloud services 、 Cloud database ) No security certificate , Make a compromise . In the field implementation , Physical isolation between ordinary data and sensitive data must be ensured , Especially when the unsafe business model of public cloud service is adopted .
Business system with high security level , High safety should be adopted 、 High performance 、 Highly available secure database products . Such database products should generally have 《 China national information security product certification certificate 》、 adopt 《 Password detection criteria for secure database products 》、 Issued by the State Password Administration 《 Commercial password product type certificate 》, Meet national confidentiality Standards 《 Technical requirements for information system security database products involving state secrets 》、《 Product inspection certificate of classified information system 》, Reach the national standard (GB/T 20273-2019 Information security technology Security technical requirements of database management system ) Level IV technical requirements .
Database products that conform to national information security standards should provide users with data transmission encryption 、 Storage encryption 、 Identification 、 Autonomous access control 、 Safety signs 、 Enforce access control 、 Security audit 、 Data integrity protection 、 Separation of powers 、 Inference control and other safety functions and means , So as to greatly improve the security of data , Protect the security of sensitive data of information system .
therefore , In the selection process of information construction database, we should choose database products that strictly comply with national security standards , Avoid the recurrence of such leaks .
3、 ... and 、 Security system
Last , The information system with high security requirements is in use , There must be a perfect safety management system to escort , Build a set of safety standard supervision and use process , Standardize personnel information security management , Improve personnel's awareness of information security , Undertake and earnestly perform the corresponding information security responsibilities of each post , It is the premise of the security of all information systems .
NTU general security database management system GBase 8s
GBase 8s It is independently developed by Nanjing University General Motors with high security 、 High performance 、 Highly available high-end secure database products . Is the first to get 《 China national information security product certification certificate 》 Secure database 、 First pass 《 Password detection criteria for secure database products 》 It has been issued by the State Password Administration 《 Commercial password product type certificate 》 Secure database 、 The first to meet the national confidentiality Standards 《 Technical requirements for information system security database products involving state secrets 》 And get 《 Product inspection certificate of classified information system 》 Secure database 、 And reach the national standard (GB/T 20273-2019 Information security technology Security technical requirements of database management system ) Level IV technical requirements .
GBase 8s Security database is mainly applicable to classified information systems 、 Information systems above level 3 specified in the requirements for security level protection of information systems 、 Core information system of pillar industries of national economy , And other information systems, which have high security requirements for data management .
GBase 8s The security database has been used in finance 、 energy 、 The government 、 traffic 、 It is widely used in the core business system of industry and other industries . The future will also bring new vitality to the industry , While providing security protection for sensitive data of various information systems , Provide more efficient access 、 More stable and reliable operation .
边栏推荐
- Frrouting BGP protocol learning
- 2、TD+Learning
- Measure the voltage with analog input (taking Arduino as an example, the range is about 1KV)
- About snake equation (2)
- MySQL数据库(2)
- Gnuradio 3.9 using OOT custom module problem record
- COMSOL----微阻梁模型的搭建---最终的温度分布和变形情况---材料的添加
- 5. Contrôle discret et contrôle continu
- NPM Internal Split module
- qt--将程序打包--不要安装qt-可以直接运行
猜你喜欢
qt--将程序打包--不要安装qt-可以直接运行
Getting started STM32 -- how to learn stm32
About how USRP sets the sampling frequency below the minimum sampling frequency reached by the hardware
The beauty of Mathematics -- the principle of fine Fourier transform
qt--將程序打包--不要安裝qt-可以直接運行
2021-03-14 - play with generics
如何让导电滑环信号更好
Matlab code about cosine similarity
云原生应用开发之 gRPC 入门
4、策略学习
随机推荐
3. Multi agent reinforcement learning
Scalar / vector / matrix derivation method
4. Apprentissage stratégique
Introduction to grpc for cloud native application development
Js中forEach map无法跳出循环问题以及forEach会不会修改原数组
Getting started STM32 -- how to learn stm32
项目经理有必要考NPDP吗?我告诉你答案
The beauty of Mathematics -- the principle of fine Fourier transform
不算不知道,花呗分期的真实利率居然这么高
滑环在直驱电机转子的应用领域
The usage of rand function in MATLAB
由排行榜实时更新想到的数状数值
从Starfish OS持续对SFO的通缩消耗,长远看SFO的价值
ANSI / NEMA- MW- 1000-2020 磁铁线标准。. 最新原版
Matlab code on error analysis (MAE, MAPE, RMSE)
Redis master-slave replication
2022 examination for safety production management personnel of hazardous chemical production units and new version of examination questions for safety production management personnel of hazardous chem
2021-04-12 - new features lambda expression and function functional interface programming
Gnuradio3.9.4 create OOT module instances
如何让导电滑环信号更好