当前位置:网站首页>Data security practice guide - data collection security management
Data security practice guide - data collection security management
2022-06-22 06:38:00 【51CTO】
Data collection safety management
- Data collection security management is an important step in the whole data collection security stage , It can be used to clarify the purpose and purpose of data collection , Acquisition mode and method , Format of collected data, etc , To ensure the compliance of data acquisition process , Legitimacy and consistency .
Establish a functional department responsible for data collection security
- Theoretically, the organization can set up two data collection security teams , One team is the data collection security management team , Mainly responsible for formulating the overall data collection safety compliance management system for the company , At the same time, promote relevant systems , Implementation of requirements and processes , The other team is the risk assessment team for data collection , Mainly responsible for data security for different business or project scenarios , Provide assessment services to the company , And the corresponding reconstruction scheme is given ; Enterprises need to set up two data collection security teams according to their own good conditions , In a bad situation, only one data collection security team is set up , All responsible for formulating compliance systems and providing risk assessment services for corresponding projects .
Define the capability requirements for data collection safety posts
- Familiar with the national network security law , And the policies and regulatory requirements of the industry to which the organization belongs .
- In strict accordance with the network security law, personal information security and other relevant laws and regulations and industry norms .
- Be familiar with the business characteristics of the organization , Understand the policy direction and strategic adjustment of the business line , Have a good awareness of data collection safety risks .
- Targeted risk assessment report and corresponding solutions , Ensure that data collection can be carried out smoothly and orderly during project implementation .
Data collection safety post construction and personnel capability evaluation methods
- Construction of data collection safety management posts and evaluation of the actual execution ability of corresponding personnel , It can pass the internal audit , Conduct investigation and interview in the form of external audit , The questionnaire survey , Process observation , Document access , Technology detection and other methods .
- 1. Research interview
- It mainly includes two parts: interviews with the management and technical personnel of the company's data collection safety department , As follows :
- Interview contents of the management personnel of the data collection security department : Confirm whether they are competent in data acquisition theory and technology .
- Formulation of data collection safety system , Work on data collection laws and regulations .
- Whether the company has provided sufficient resources to support the team , Confirm whether the data collection safety system developed by the team can be effectively implemented .
- Interview contents of data collection safety risk assessment technicians : Confirm whether they are competent in data risk assessment technology and data collection safety risk awareness .
- Confirm that the team is aware of the business , The strategic development direction of the project , Confirm whether the risk assessment report and solutions proposed by the team are effective .
- 2. The questionnaire survey
- Through the form of paper questionnaire , Investigate whether the data collection risk assessment team can provide targeted risk assessment consultation and solutions according to different business scenarios , And whether the data collection safety management team has developed effective , Executable data collection safety management system .
- 3. Process observation
- Process observation in data collection safety management stage , It is mainly to observe the workflow of the management team and risk assessment team of the data collection safety department , Look for possible problems and improvement points , As follows :
- Observations on the management team of data collection safety department ,: View the team's workflow from a neutral perspective , Including the team's efforts to develop standards and systems related to data collection safety for the company , Whether the process conforms to the standard , Whether relevant requirements and system design are reasonable , Whether it meets the overall environmental requirements of the company , In promoting the practical application of relevant requirements, systems and processes , Compliance with specifications , So as to confirm the actual work of the team .
- The observations of the data collection risk assessment team are : View the team's workflow from a neutral perspective , First, confirm the specific indicators that the team evaluates , For example, whether the acquisition process is in compliance with , Whether the safety requirements of the collection process meet the requirements , Whether the collection process has an impact on other related work , Secondly, confirm whether the rating of the risk assessment team in the assessment process is standard , reasonable , Whether the evaluation process conforms to the specifications, etc .
- 4. Technical testing
- The technical inspection in the safety management stage of data collection requires the use of technical tools to confirm that the actual data collection process , Whether there is data leakage , Whether a unified data collection strategy has been set , Whether the authorization and consent of the acquiree have been obtained before data collection .
Define the purpose of data collection
- The data collection process involves a large amount of data including personal information and business data , At present, high requirements are put forward for the protection of personal privacy and trade secrets , To prevent the misuse of personal information and business data , The collection process needs to be authorized by the information subject , Relevant national laws shall be observed during the period , Provisions of administrative regulations and agreements of users , In addition, under the premise of meeting laws and regulations , Find a proper balance between data application and data security protection .
- The main operations of data collection activities include but are not limited to the following : Discover data sources , To transmit data , Generate the data , Cache data , create data source , Data conversion , Data integrity verification, etc .
Establish the basic principles of data collection
- Data collection activities , Compliance with legal , proper , Necessary principles , It includes the following contents :
- Power and responsibility are the same : Take necessary technologies and measures to ensure the security of personal data and important data , If damage is caused to the legitimate rights and interests of the data subject, it shall bear corresponding responsibilities .
- Have a clear purpose : Have a clear , Clear , Specific information processing purposes .
- Choose to agree : Express the purpose of information processing to the data subject , Rules such as method and scope , Ask for their authorization and consent .
- The least necessary : Only those with the authorization and consent of the data subject will be processed , Minimum data type and quantity required , When the purpose is achieved , The collected data shall be deleted in time .
- Open and transparent : To clarify , Open the scope of processing data in an understandable and reasonable way , Purpose and planning, etc , And receive external supervision .
- To ensure safety : Have the security capability matching the security risk , And take sufficient management measures and technical means , Protect data confidentiality , Integrity and availability .
- Subject participation : Provide data subjects with the ability to query , Correct and delete its information , And withdrawal of authorization consent , Cancellation of accounts, complaints, etc .
Collection source based on big data
- Big data collection mainly includes 4 Source of species , Management information system ,Web The information system , Physical information system and scientific experiment system .
- Management information system : Refers to the enterprise , Information inside the organization , Such as transaction processing system , Office automation system, etc , Mainly used for operation and management , Support the work and business of specific users , The data is generated by the initial input of the end user , There is also a systematic secondary processing , The organizational structure of the system is dedicated , Data is usually structured .
- Web The information system : Including various information systems in the Internet , Such as social networking sites , Social media , System engine, etc , It is mainly used to construct virtual information space , Provide information services and social services for the majority of users , The organizational structure of the system is open , Most of the data is semi-structured or unstructured , The producers of data are mainly online users .
- Physical information system : It refers to the information system about various physical objects and physical processes , Such as real-time monitoring , Real time detection, etc , It is mainly used for production scheduling , process control , On site command and environmental protection . The organizational structure of the system is closed , The data will be generated by various embedded sensing devices , It can be about physics , chemical , Basic measurements of biological properties and states , It can also be audio about behavior and state , Video and other multimedia data .
- Scientific experiment system : It actually belongs to the physical information system , But the experimental environment is preset , Mainly used for academic research, etc , Data is selective , A controlled , Sometimes it may be the simulation data of artificial simulation production , Data often takes different forms .
Define the data collection method
- The purpose of data collection activities is to obtain data , Data collection methods include but are not limited to the following methods :
- Network data collection : It refers to those disclosed through web crawlers or websites API Methods such as , Get data information from the Internet , This method can extract unstructured data from web pages , Store it as a unified local data file , And present in a structured storage way , The network data collection method supports pictures , Audio , Video and other files or attachments , Attachments and text can be automatically associated . In addition, for the collection of network traffic, you can use DPI or DFI And other broadband management technologies .
- System log collection : Various Internet enterprises have their own massive data collection tools , for example :Hadoop Of Chukwa,Cloudera Of Flume,Facebook Of Scribe etc. , These tools are all distributed .
- Other data acquisition : For the production and operation data of enterprises or discipline research data and other data with high confidentiality requirements , It can be through cooperation or authorization with enterprises or research institutions , Use specific system interfaces to collect data .
Determine the data collection cycle
- The data collection cycle is divided into two cases according to the status of the actual data :
- Collection of real-time detection data , The data acquisition cycle shall be established according to the actual working conditions , for example : The system operates continuously 10 Secondary acquisition , take 10 The average value of each acquisition time is taken as the data acquisition cycle of the system .
- Collection of basic production data of the system , Fixed term plus dynamic adjustment can be adopted directly The way to set the acquisition cycle , for example : For data with little change , The acquisition cycle can be set to 6 Months , Involving data information change and adjustment , The acquisition cycle can be dynamically adjusted as required .
Develop security policies for data collection
- The purpose of formulating the security policy for data collection is to ensure that personal information and important data will not be disclosed during the collection process .
- Define the purpose and purpose of data collection , Identify the source of data collection , Collection method , Collection range, etc , And develop a standard acquisition template , Acquisition method , Policies and specifications .
- Follow compliance principles , Ensure the legitimacy of data collection , Legitimacy and necessity .
- Assign special personnel to be responsible for data review and collection of information production or providers .
- For data collected for the first time , It is necessary to adopt a combination of manual and technical methods for data collection , And according to the source of the data , Type or importance .
- Minimum acquisition data , You only need to complete the necessary collection work , Make sure not to collect personal information and important data irrelevant to the provision of services .
- Store the collected data reasonably , Timely destroy the data according to the use status .
Develop a risk assessment process for data collection
- In the process of data collection , It is necessary to organize a risk assessment team to conduct risk assessment on the collection process , The assessment is as follows :
- Whether the acquisition process is compliant : Whether there is a person in charge of collection to review relevant collection operations , Whether the collected data is minimized , Whether the collection process is sufficiently open and transparent and subject to external supervision .
- Safety requirements during acquisition : Whether encryption is used , Integrity check , anonymous , Log, network disconnection and other protection measures , To protect the security of the collected data .
- Other work related to data collection .
Use technical tools
- Data collection includes the collection of external data and internal data , External data here refers to all data providers except those within the organization , Including third parties , Partners and subsidiaries, etc , During the collection , Work flow and system related to data collection shall be arranged in advance , In addition to the basic data acquisition objectives, technical tools , It is also necessary to ensure the safety of data transmission and storage in the process of data collection , And provide the ability of whole process audit .
- At present, there are three main types of data : Database data , Network data and system log data , According to different data types , Data acquisition systems are also divided into three main types , At present, data leakage prevention technology mainly includes data encryption technology , Permission control technology and channel protection technology based on content depth identification .
Database based acquisition technology
- Database systems are mainly divided into two categories : One is relational database ,Oracle,SQL Server,MySQL, The other is non relational database , Such as MongoDB and Redis, There are three ways to collect source data based on database :
- Direct data source synchronization
- Generate data file synchronization
- Database log synchronization
Data collection technology based on network
- The technology of data collection based on network refers to the disclosure of data through web crawlers or websites API Methods such as , The process of obtaining data information from a website .
- The basic steps of the whole data collection process are as follows :
- 1. Will need to crawl data from the web site URL iw URL queue
- 2. Reptile from URL Get the website that needs to crawl data from the queue URL Information
- 3. Get the page content of a specific website
- 4. Extract the link address of the body page content of the website from the web page content
- 5. Read the web page address that has been crawled from the database
- 6. Filter URL, For the current URL And what has been captured URL Compare , If the web address has not been captured , Write the web page address to the database , If the web address has been captured , Then give up the crawl operation of this URL
- 7. Get the web content of the address , And extract the content value of the required attribute
- 8. Write the extracted web page content to the database
Collection technology based on system log
- Acquisition tools Chukwa,Flume,Scribe etc.
Data leakage prevention technology
- At present, data leakage prevention technology mainly includes encryption technology , Access control technology , And channel protection technology based on content depth recognition
- Data encryption technology
- Data encryption technology includes disk encryption , File encryption , Technical routes such as transparent document encryption and decryption , At present, transparent document encryption and decryption technology is the most common , The encryption and decryption technology of transparent documents sets the corresponding parameters for the protected sensitive data content through the filter driver , So as to selectively protect specific files generated by specific processes , Encrypted storage when writing , Automatic decryption when reading files , The entire process does not affect other protected content .
- Encryption technology needs to protect data from the source of data leakage , Even if the data leaves the protection inside the enterprise , It can also prevent data leakage , But the key management of encryption technology is very complicated , Once the key is lost or the encrypted data is damaged , The original data cannot be recovered , For transparent document encryption and decryption , For example, the data does not appear in the form of documents , You will not be able to control the data .
- Access control technology
- Digital rights management (DRM) By setting a specific security policy , In sensitive data file generation , Automated protection while storing and transferring , And prevent illegal replication of sensitive data through conditional access control policies , Operations such as leakage and diffusion . Digital rights management technology usually does not encrypt or decrypt data , But through fine-grained operation control and identity control policies to achieve data permission control , Permission control strategy is closely combined with business , Therefore, it will have an impact on users' existing business processes .
- Channel protection technology based on content depth recognition
- Content based data leakage prevention DLP, Data leakage prevention focuses on deep content identification , Based on sensitive data content policy definition , The external transmission channel of monitoring data , Audit and control the transmission of sensitive data , Data leakage prevention will not change the normal business process , It has rich audit functions , It can be used to locate and trace the source of data leakage events .
Use objectives and workflow of technical tools
- The data acquisition security management technology tool should be able to achieve the following objectives :
- Set the collection strategy uniformly , Uniformly distribute the set collection strategy , The acquisition strategy can be adjusted , The collection strategy follows the principle of minimum sufficiency , Ensure the consistency of collected data , And ensure that the collected data will not be abused
- Support the whole process of encrypted communication , Initiate a data collection request from , The communication process from data acquisition authorization to data acquisition transmission shall adopt two-way encrypted transmission .
- When data collection involves sensitive information , The tool has the ability to desensitize data , When the communication link is at risk , Desensitizing the data before transmission can minimize the risk in the process of data transmission , The tool needs to be defined according to the specified sensitive information , Desensitize the collected sensitive information before transmission .
- Have the ability to check the integrity of data before and after collection , To prevent the data before and after collection from being tampered , The tool needs to verify the integrity of the data , You can use digital signatures , Digital certificates and other means to identify whether the collected data has been tampered .
- Store the collected data , Ensure that sensitive data has been desensitized , The tool needs to encrypt the collected data before storing , The tool needs to back up the stored data regularly , Ensure the security of stored data , Prevent the stored data from being stolen and destroyed .
Confused life , It needs constant effort , Only then can we see clearly the vague ambition in the distance !
边栏推荐
- Cactus Song - online operation (5)
- [5g NR] ng interface
- Idea run scope locally
- EMC solutions
- Information system project management - scope management (focus)
- Inserting a classdiagram into markdown
- Why did I choose rust
- Oracle之trim,ltrim,rtrim三个函数的用法
- Single cell literature learning (Part3) -- dstg: deconvoluting spatial transcription data through graph based AI
- 入门级测试Kotlin实现PopWindow弹窗代码
猜你喜欢

MySQL Niuke brush questions

SQL injection vulnerability (x) secondary injection
![[PHP] composer 安装](/img/37/7adaca01b95085b42a116bc6b08165.png)
[PHP] composer 安装
![[5g NR] RRC connection reconstruction analysis](/img/7a/6f9942b1874604664924e22e04d516.png)
[5g NR] RRC connection reconstruction analysis

Py之scorecardpy:scorecardpy的简介、安装、使用方法之详细攻略

SQL injection vulnerability (XIV) XFF injection attack

In depth analysis of 20million OP events stolen by optimization (including code)

KV260的PMOD接口介绍

Languo technology helps the ecological prosperity of openharmony

WPS文档目录更新产生的问题记录
随机推荐
[5g NR] UE registration management status
Oracle之trim,ltrim,rtrim三个函数的用法
Upload file prompt 413 request entity too large error
[write CPU by yourself] implementation of exception related instructions
高考是人生旅途的一处驿站
PgSQL batch insert
SQL injection vulnerability (XIV) XFF injection attack
【openairinterface5g】项目目录结构
[5g NR] mobile phone ID number IMEI and imeisv
Linux link sqlserver, offline installation
Pytest data parameterization & data driven
类加载内存分析
[php]tp6 cli mode to create tp6 and multi application configurations and common problems
Why did I choose rust
Event preview edgex developer summit @ Nanjing station is coming!
Databricks from open source to commercialization
OpenGL - Draw Triangle
BlockingQueue four sets of APIs
仙人掌之歌——进军To C直播(2)
Use of stopwatch