Hello, everyone!
Today I'm going to introduce you DAYU
Background of sensitive data protection
Privacy protection management is a function provided by data security for the protection of sensitive data. Every enterprise has sensitive data: trade secrets, intellectual property rights, key business information, business partner information, or customer information. You can automatically discover sensitive data in the system by configuring sensitive data identification rules. In the privacy protection management module, you can prevent sensitive data from being misused, leaked or stolen intentionally or unintentionally through data desensitization, data watermark embedding, etc., so as to help companies take reasonable measures to protect the confidentiality and confidentiality of their sensitive data. Completeness.
Ways to protect sensitive data
Privacy protection management provides the following sensitive data protection methods:
l Static desensitization
Data security has built-in efficient and rich desensitization algorithms. You can mask, truncate and hash sensitive data in the original data by configuring the source data table and associate desensitization strategies , and support desensitized data to be written to the target End data table. You can use the target table data to provide external data services to provide basic guarantee for the safe use of data. Data watermark is embedded.
l Data watermark embedding
Data security supports embedding watermarks into original data to ensure data availability. The watermarked data is transparent, usable, and concealed, and it is not easy to be discovered and cracked by the outside. The watermark can be traced to the source after the data is leaked, so that the security incident can be accurately located and held accountable.
l Data watermark traceability
Once the sensitive data embedded through the data watermark is leaked, data traceability can extract the watermark by importing the leaked file and running the traceability task to accurately locate the leaking unit and responsible person.
Data static desensitization
In actual production, there will be data analysis departments that need to perform data analysis on the data, and there are sensitive information in the data, but they have to open up permissions. At this time, sensitive data can be desensitized, and the authenticity of the data is not leaked while meeting business needs. The privacy protection management desensitization algorithm module provides 15 built-in desensitization algorithms for your choice. Before you choose an algorithm, you can use our pre-provided built-in algorithm test function to ensure that you have selected a suitable algorithm.
Data watermark embedding
Data watermark embedding can well regulate the data outsourcing process, and realize effective process management of the data outsourcing of internal personnel in the enterprise. Unauthorized users need to approve before data outsourcing. After approval, data watermarking technology can be used to generate data that can be sent File. Data watermark embedding can realize data copyright protection. By embedding watermark information representing ownership in a relational database, the database can be linked to its owner, thereby realizing data copyright protection. Data watermark embedding can quickly trace the source of leaked data. By unblocking the leaked data file, detect the existence of the watermark based on the integrity of the data file and the traces of the watermark information, and quickly identify the watermark information (data source address, distribution unit, person in charge) , Distribution time, etc.), so as to accurately locate and hold accountable security incidents.
For example, " owned by XX Co., Ltd."
l integrity protection
Whether the content of the database has been tampered with and where has it been tampered with
l User tracking (tracing the source)
Find out the source of the leak based on the embedded user watermark
Data watermark traceability
Data traceability is mainly used to quickly trace the source of leaked data. The integrity of the leaked data files and the traces of the watermark information are used to detect the existence of the watermark, and quickly identify the watermark information, so as to accurately locate and hold accountable security incidents.