当前位置:网站首页>Data security practice guide - data collection security management

Data security practice guide - data collection security management

2022-06-22 06:38:00 51CTO

Data collection safety management

  • Data collection security management is an important step in the whole data collection security stage , It can be used to clarify the purpose and purpose of data collection , Acquisition mode and method , Format of collected data, etc , To ensure the compliance of data acquisition process , Legitimacy and consistency .

Establish a functional department responsible for data collection security

  • Theoretically, the organization can set up two data collection security teams , One team is the data collection security management team , Mainly responsible for formulating the overall data collection safety compliance management system for the company , At the same time, promote relevant systems , Implementation of requirements and processes , The other team is the risk assessment team for data collection , Mainly responsible for data security for different business or project scenarios , Provide assessment services to the company , And the corresponding reconstruction scheme is given ; Enterprises need to set up two data collection security teams according to their own good conditions , In a bad situation, only one data collection security team is set up , All responsible for formulating compliance systems and providing risk assessment services for corresponding projects .

Define the capability requirements for data collection safety posts

  • Familiar with the national network security law , And the policies and regulatory requirements of the industry to which the organization belongs .
  • In strict accordance with the network security law, personal information security and other relevant laws and regulations and industry norms .
  • Be familiar with the business characteristics of the organization , Understand the policy direction and strategic adjustment of the business line , Have a good awareness of data collection safety risks .
  • Targeted risk assessment report and corresponding solutions , Ensure that data collection can be carried out smoothly and orderly during project implementation .

Data collection safety post construction and personnel capability evaluation methods

  • Construction of data collection safety management posts and evaluation of the actual execution ability of corresponding personnel , It can pass the internal audit , Conduct investigation and interview in the form of external audit , The questionnaire survey , Process observation , Document access , Technology detection and other methods .
  • 1. Research interview
  • It mainly includes two parts: interviews with the management and technical personnel of the company's data collection safety department , As follows :
  • Interview contents of the management personnel of the data collection security department : Confirm whether they are competent in data acquisition theory and technology .
  • Formulation of data collection safety system , Work on data collection laws and regulations .
  • Whether the company has provided sufficient resources to support the team , Confirm whether the data collection safety system developed by the team can be effectively implemented .
  • Interview contents of data collection safety risk assessment technicians : Confirm whether they are competent in data risk assessment technology and data collection safety risk awareness .
  • Confirm that the team is aware of the business , The strategic development direction of the project , Confirm whether the risk assessment report and solutions proposed by the team are effective .
  • 2. The questionnaire survey
  • Through the form of paper questionnaire , Investigate whether the data collection risk assessment team can provide targeted risk assessment consultation and solutions according to different business scenarios , And whether the data collection safety management team has developed effective , Executable data collection safety management system .
  • 3. Process observation
  • Process observation in data collection safety management stage , It is mainly to observe the workflow of the management team and risk assessment team of the data collection safety department , Look for possible problems and improvement points , As follows :
  • Observations on the management team of data collection safety department ,: View the team's workflow from a neutral perspective , Including the team's efforts to develop standards and systems related to data collection safety for the company , Whether the process conforms to the standard , Whether relevant requirements and system design are reasonable , Whether it meets the overall environmental requirements of the company , In promoting the practical application of relevant requirements, systems and processes , Compliance with specifications , So as to confirm the actual work of the team .
  • The observations of the data collection risk assessment team are : View the team's workflow from a neutral perspective , First, confirm the specific indicators that the team evaluates , For example, whether the acquisition process is in compliance with , Whether the safety requirements of the collection process meet the requirements , Whether the collection process has an impact on other related work , Secondly, confirm whether the rating of the risk assessment team in the assessment process is standard , reasonable , Whether the evaluation process conforms to the specifications, etc .

  • 4. Technical testing
  • The technical inspection in the safety management stage of data collection requires the use of technical tools to confirm that the actual data collection process , Whether there is data leakage , Whether a unified data collection strategy has been set , Whether the authorization and consent of the acquiree have been obtained before data collection .

Define the purpose of data collection

  • The data collection process involves a large amount of data including personal information and business data , At present, high requirements are put forward for the protection of personal privacy and trade secrets , To prevent the misuse of personal information and business data , The collection process needs to be authorized by the information subject , Relevant national laws shall be observed during the period , Provisions of administrative regulations and agreements of users , In addition, under the premise of meeting laws and regulations , Find a proper balance between data application and data security protection .
  • The main operations of data collection activities include but are not limited to the following : Discover data sources , To transmit data , Generate the data , Cache data , create data source , Data conversion , Data integrity verification, etc .

Establish the basic principles of data collection

  • Data collection activities , Compliance with legal , proper , Necessary principles , It includes the following contents :
  • Power and responsibility are the same : Take necessary technologies and measures to ensure the security of personal data and important data , If damage is caused to the legitimate rights and interests of the data subject, it shall bear corresponding responsibilities .
  • Have a clear purpose : Have a clear , Clear , Specific information processing purposes .
  • Choose to agree : Express the purpose of information processing to the data subject , Rules such as method and scope , Ask for their authorization and consent .
  • The least necessary : Only those with the authorization and consent of the data subject will be processed , Minimum data type and quantity required , When the purpose is achieved , The collected data shall be deleted in time .
  • Open and transparent : To clarify , Open the scope of processing data in an understandable and reasonable way , Purpose and planning, etc , And receive external supervision .
  • To ensure safety : Have the security capability matching the security risk , And take sufficient management measures and technical means , Protect data confidentiality , Integrity and availability .
  • Subject participation : Provide data subjects with the ability to query , Correct and delete its information , And withdrawal of authorization consent , Cancellation of accounts, complaints, etc .

Collection source based on big data

  • Big data collection mainly includes 4 Source of species , Management information system ,Web The information system , Physical information system and scientific experiment system .
  • Management information system : Refers to the enterprise , Information inside the organization , Such as transaction processing system , Office automation system, etc , Mainly used for operation and management , Support the work and business of specific users , The data is generated by the initial input of the end user , There is also a systematic secondary processing , The organizational structure of the system is dedicated , Data is usually structured .
  • Web The information system : Including various information systems in the Internet , Such as social networking sites , Social media , System engine, etc , It is mainly used to construct virtual information space , Provide information services and social services for the majority of users , The organizational structure of the system is open , Most of the data is semi-structured or unstructured , The producers of data are mainly online users .
  • Physical information system : It refers to the information system about various physical objects and physical processes , Such as real-time monitoring , Real time detection, etc , It is mainly used for production scheduling , process control , On site command and environmental protection . The organizational structure of the system is closed , The data will be generated by various embedded sensing devices , It can be about physics , chemical , Basic measurements of biological properties and states , It can also be audio about behavior and state , Video and other multimedia data .
  • Scientific experiment system : It actually belongs to the physical information system , But the experimental environment is preset , Mainly used for academic research, etc , Data is selective , A controlled , Sometimes it may be the simulation data of artificial simulation production , Data often takes different forms .

Define the data collection method

  • The purpose of data collection activities is to obtain data , Data collection methods include but are not limited to the following methods :
  • Network data collection : It refers to those disclosed through web crawlers or websites API Methods such as , Get data information from the Internet , This method can extract unstructured data from web pages , Store it as a unified local data file , And present in a structured storage way , The network data collection method supports pictures , Audio , Video and other files or attachments , Attachments and text can be automatically associated . In addition, for the collection of network traffic, you can use DPI or DFI And other broadband management technologies .
  • System log collection : Various Internet enterprises have their own massive data collection tools , for example :Hadoop Of Chukwa,Cloudera Of Flume,Facebook Of Scribe etc. , These tools are all distributed .
  • Other data acquisition : For the production and operation data of enterprises or discipline research data and other data with high confidentiality requirements , It can be through cooperation or authorization with enterprises or research institutions , Use specific system interfaces to collect data .

Determine the data collection cycle

  • The data collection cycle is divided into two cases according to the status of the actual data :
  • Collection of real-time detection data , The data acquisition cycle shall be established according to the actual working conditions , for example : The system operates continuously 10 Secondary acquisition , take 10 The average value of each acquisition time is taken as the data acquisition cycle of the system .
  • Collection of basic production data of the system , Fixed term plus dynamic adjustment can be adopted directly The way to set the acquisition cycle , for example : For data with little change , The acquisition cycle can be set to 6 Months , Involving data information change and adjustment , The acquisition cycle can be dynamically adjusted as required .

Develop security policies for data collection

  • The purpose of formulating the security policy for data collection is to ensure that personal information and important data will not be disclosed during the collection process .
  • Define the purpose and purpose of data collection , Identify the source of data collection , Collection method , Collection range, etc , And develop a standard acquisition template , Acquisition method , Policies and specifications .
  • Follow compliance principles , Ensure the legitimacy of data collection , Legitimacy and necessity .
  • Assign special personnel to be responsible for data review and collection of information production or providers .
  • For data collected for the first time , It is necessary to adopt a combination of manual and technical methods for data collection , And according to the source of the data , Type or importance .
  • Minimum acquisition data , You only need to complete the necessary collection work , Make sure not to collect personal information and important data irrelevant to the provision of services .
  • Store the collected data reasonably , Timely destroy the data according to the use status .

Develop a risk assessment process for data collection

  • In the process of data collection , It is necessary to organize a risk assessment team to conduct risk assessment on the collection process , The assessment is as follows :
  • Whether the acquisition process is compliant : Whether there is a person in charge of collection to review relevant collection operations , Whether the collected data is minimized , Whether the collection process is sufficiently open and transparent and subject to external supervision .
  • Safety requirements during acquisition : Whether encryption is used , Integrity check , anonymous , Log, network disconnection and other protection measures , To protect the security of the collected data .
  • Other work related to data collection .

Use technical tools

  • Data collection includes the collection of external data and internal data , External data here refers to all data providers except those within the organization , Including third parties , Partners and subsidiaries, etc , During the collection , Work flow and system related to data collection shall be arranged in advance , In addition to the basic data acquisition objectives, technical tools , It is also necessary to ensure the safety of data transmission and storage in the process of data collection , And provide the ability of whole process audit .
  • At present, there are three main types of data : Database data , Network data and system log data , According to different data types , Data acquisition systems are also divided into three main types , At present, data leakage prevention technology mainly includes data encryption technology , Permission control technology and channel protection technology based on content depth identification .
Database based acquisition technology
  • Database systems are mainly divided into two categories : One is relational database ,Oracle,SQL Server,MySQL, The other is non relational database , Such as MongoDB and Redis, There are three ways to collect source data based on database :
  • Direct data source synchronization
  • Generate data file synchronization
  • Database log synchronization

Data collection technology based on network
  • The technology of data collection based on network refers to the disclosure of data through web crawlers or websites API Methods such as , The process of obtaining data information from a website .
  • The basic steps of the whole data collection process are as follows :
  • 1. Will need to crawl data from the web site URL iw URL queue
  • 2. Reptile from URL Get the website that needs to crawl data from the queue URL Information
  • 3. Get the page content of a specific website
  • 4. Extract the link address of the body page content of the website from the web page content
  • 5. Read the web page address that has been crawled from the database
  • 6. Filter URL, For the current URL And what has been captured URL Compare , If the web address has not been captured , Write the web page address to the database , If the web address has been captured , Then give up the crawl operation of this URL
  • 7. Get the web content of the address , And extract the content value of the required attribute
  • 8. Write the extracted web page content to the database
Collection technology based on system log
  • Acquisition tools Chukwa,Flume,Scribe etc.

Data leakage prevention technology

  • At present, data leakage prevention technology mainly includes encryption technology , Access control technology , And channel protection technology based on content depth recognition
  • Data encryption technology
  • Data encryption technology includes disk encryption , File encryption , Technical routes such as transparent document encryption and decryption , At present, transparent document encryption and decryption technology is the most common , The encryption and decryption technology of transparent documents sets the corresponding parameters for the protected sensitive data content through the filter driver , So as to selectively protect specific files generated by specific processes , Encrypted storage when writing , Automatic decryption when reading files , The entire process does not affect other protected content .
  • Encryption technology needs to protect data from the source of data leakage , Even if the data leaves the protection inside the enterprise , It can also prevent data leakage , But the key management of encryption technology is very complicated , Once the key is lost or the encrypted data is damaged , The original data cannot be recovered , For transparent document encryption and decryption , For example, the data does not appear in the form of documents , You will not be able to control the data .
  • Access control technology
  • Digital rights management (DRM) By setting a specific security policy , In sensitive data file generation , Automated protection while storing and transferring , And prevent illegal replication of sensitive data through conditional access control policies , Operations such as leakage and diffusion . Digital rights management technology usually does not encrypt or decrypt data , But through fine-grained operation control and identity control policies to achieve data permission control , Permission control strategy is closely combined with business , Therefore, it will have an impact on users' existing business processes .
  • Channel protection technology based on content depth recognition
  • Content based data leakage prevention DLP, Data leakage prevention focuses on deep content identification , Based on sensitive data content policy definition , The external transmission channel of monitoring data , Audit and control the transmission of sensitive data , Data leakage prevention will not change the normal business process , It has rich audit functions , It can be used to locate and trace the source of data leakage events .

Use objectives and workflow of technical tools

  • The data acquisition security management technology tool should be able to achieve the following objectives :
  • Set the collection strategy uniformly , Uniformly distribute the set collection strategy , The acquisition strategy can be adjusted , The collection strategy follows the principle of minimum sufficiency , Ensure the consistency of collected data , And ensure that the collected data will not be abused
  • Support the whole process of encrypted communication , Initiate a data collection request from , The communication process from data acquisition authorization to data acquisition transmission shall adopt two-way encrypted transmission .
  • When data collection involves sensitive information , The tool has the ability to desensitize data , When the communication link is at risk , Desensitizing the data before transmission can minimize the risk in the process of data transmission , The tool needs to be defined according to the specified sensitive information , Desensitize the collected sensitive information before transmission .
  • Have the ability to check the integrity of data before and after collection , To prevent the data before and after collection from being tampered , The tool needs to verify the integrity of the data , You can use digital signatures , Digital certificates and other means to identify whether the collected data has been tampered .
  • Store the collected data , Ensure that sensitive data has been desensitized , The tool needs to encrypt the collected data before storing , The tool needs to back up the stored data regularly , Ensure the security of stored data , Prevent the stored data from being stolen and destroyed .

Confused life , It needs constant effort , Only then can we see clearly the vague ambition in the distance !

原网站

版权声明
本文为[51CTO]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/173/202206220633078137.html