In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/03 Report--
With the rapid development of the Internet, networking has penetrated into all aspects of people, followed by the geometric growth of all kinds of sensitive confidential data. In recent years, information security incidents have occurred frequently, and the importance of data security has become increasingly prominent. How to prevent data leakage is one of the problems that enterprises pay close attention to and need to solve urgently.
Data security involves two main directions:
I. Network information security. In the Internet era, lawbreakers steal, destroy and leak all kinds of information and data by means of network security loopholes, causing great losses to enterprises. At present, various network security products are constantly evolving to meet possible information security vulnerabilities. This kind of data security is easy for everyone to understand. Tencent also has a special team to ensure network security.
Second, data carrier security is the end of data security (that is, the last kilometer of data security in this article), and it is the link that is most easily ignored. The largest data carrier in the enterprise is the storage medium of the operation equipment storing the enterprise operation and business data, which is generally divided into two categories: magnetic media HDD and non-magnetic media SSD. If the server does not properly handle the storage medium in the operation scenario involving the security risk of the data storage medium, the enterprise will face a very large risk of data leakage. This article will focus on how Tencent protects the last mile of data by protecting the security of data carriers when facing the scale of millions of servers.
Traditional data storage medium destruction method
Let's first look at the traditional method of destruction of storage media: when the quantity is small and the scale is small, we usually buy office-grade degaussing machines and hammers, and destroy the media in a simple and rude way (as shown in Figure 1). When the equivalent and scale are slightly larger, they will generally be disposed of by external companies or destroyed in a more brutal way such as a roller. Simple and crude methods cost less, and when the volume is small, the operation efficiency is also high; external company processing is easy, but the cost is higher. At a certain scale, simple and crude methods are inefficient and executable, while external companies are very expensive. At the same time, both methods have the same problems: it is difficult to guarantee that 100% of the storage medium is destroyed to ensure that its data is not recoverable, and it is difficult to trace the processing of a specific hard disk of a specific machine.
Figure 1: Traditional Data Storage Media Destruction Methods
Tencent needs to retire hundreds of thousands of storage media every year, destroying a large number and scattered in Tencent's global data centers. The traditional data destruction scheme can not meet the operation requirements of Tencent Server data storage media security server in terms of efficiency, quality and cost. For this reason, Tencent has formed a complete solution for mass storage medium destruction through the scheme design combining point, line and surface, and the customized development of large-scale destruction factory, which perfectly solves the last kilometer of data security and avoids heavy losses caused to the company due to data storage medium leakage.
Tencent Data Storage Media Destruction Solution
Tencent server operation scenarios are complex, involving various operation scenarios for data storage medium security (as shown in Figure 2), and each scenario has different requirements for data storage medium destruction (as shown in Table 1).
Figure 2 Data storage medium destruction operation scenario
Table 1 Demands for Data Storage Media Destruction in Server Operation Scenarios
In the face of these problems, it is impossible to complete one solution alone. According to Tencent's server magnitude, distribution characteristics and different operation scenarios, Tencent innovatively designed the "3" layer storage medium destruction mode (as shown in Figure 3):
● Layer 1: Build three large-scale data storage medium destruction factories, covering all IDCs in China by region, providing perfect solutions in the destruction factories, and centrally handling the destruction tasks of the entire company;
● Layer 2: Tencent has dozens of IDC data storage media destruction centers. Through the construction of small destruction centers in IDC, the data of storage media can be safely and quickly processed in IDC in a closed loop to meet the needs of completing data destruction work in IDC.
● Layer 3, nearly one million server nodes, through automated tools, using low-level data to handle the data destruction of a single server node;
Figure 3 Tencent "3" layer data storage media destruction mode
The "3" layer data storage medium destruction mode guarantees the destruction of Tencent's global million-level server data storage medium like a net (as shown in Figure 4).
Figure 4 Tencent Data Storage Media Destruction Network
In the whole scheme, whether it is a large-scale destruction plant, a small-scale destruction center or a single server node, under the basic premise of ensuring data destruction, the traceability of the whole process is ensured. Next, look at the specifics of the "3" tier data storage media destruction model.
Data Destruction Factory
The data destruction factory (as shown in Figure 5) is designed and customized by Tencent server team and related sister teams according to their own business needs. It is mainly used for the destruction of large-scale storage media. The annual production capacity of a single factory exceeds hundreds of thousands of pieces, and covers the destruction of HDD and SSD storage media.
Figure 5 Schematic diagram of Tencent data destruction factory
The destruction factory is a fully automatic and fully enclosed flow operation of "intelligent disk placement → scanning → photographing → (HDD) demagnetization → pulverization" customized by Tencent, in which human intervention is impossible. Tencent has customized the tools used for crushing to ensure that the crushed particles cannot be recovered. The whole process is automatically connected with Tencent storage media destruction control platform to realize automatic control in the whole process, and the whole destruction process can be traced controllably (as shown in Figure 6).
Figure 6 Storage medium destruction process
What needs to be mentioned here is that in the process of designing the destruction plant scheme, according to Tencent's standards and processes, the process of designing and customizing large-scale automatic destruction equipment consumes a lot of resources and time. The development of domestic data destruction equipment lags behind, and the resources of large-scale data destruction equipment are very limited. Most suppliers still stay at the traditional office-level or small-scale equipment level. In addition to the traditional hardware design and manufacturing capabilities of large-scale destruction equipment, the suppliers we are looking for must also have innovative R & D capabilities and software development capabilities. According to Tencent's requirements, they must develop software development capabilities for automatic control modules that control the entire destruction process.
After thorough destruction of storage medium waste, we will find well-known and qualified electronic waste recycling service providers certified by Tencent to recycle and carry out green environmental protection treatment.
IDC Destruction Center
The destruction efficiency of the data destruction factory is high, but the disadvantage is that the site requirements are large and the investment cost is too high, which is not suitable for use in each IDC. Therefore, for the scenarios where data destruction needs to be carried out inside IDC, we have designed a small, flexible and short construction cycle data destruction center inside IDC. The data destruction center inside IDC must also meet Tencent's destruction standards and destruction processes, and has safety control requirements for the environment and personnel of the destruction center.
Figure 7 Schematic Diagram of IDC Destruction Center
Server Destroy Node
The first layer data destruction factory and the second layer IDC data destruction center are destructive to the destruction of data storage media. It is not practical for scenarios where data needs to be destroyed safely and the storage medium is not destroyed during the operation of the storage medium, such as: the server is transferred from A to B, and there is a data storage medium security risk in the logistics process where the server is transferred out of A. For this kind of scenario, we have to use the online destruction technology of the industry and the online destruction tool of the supplier to destroy the data of its storage medium online by the server unit. Commonly used methods such as storage media formatting technology, after 3 times of data coverage to recover data is impossible.
Figure 8 Schematic diagram of storage medium format
concluding remarks
Tencent's "3" layer data storage media destruction mode provides data destruction services for millions of server storage media around the world, ensuring the security of Tencent's billion-level user information and company operation data. However, for Tencent overseas IDC, in order to meet Tencent's security and asset management standards, we have developed a set of certification system to select and certify well-known local service providers with complete qualifications to provide data storage medium destruction services. For the completely destroyed storage media, find a well-known tencent certified e-waste recycling service provider with complete local qualifications for asset recovery and green environmental protection treatment. Later, we will explore data storage media destruction solutions for overseas IDC characteristics.
Finally, Tencent server data storage media security work continues, destruction plant operation will introduce intelligent robots and other measures to improve operational efficiency, we will start from storage media or server R & D design, from the bottom of software and hardware to protect its data security.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.