Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Dynamic desensitization of database

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >

Share

Shulou(Shulou.com)06/01 Report--

product introduction

Database Dynamic Desensitization System (VS-DM), through intercepting and modifying database communication content, on-line shielding, deformation, character replacement, random replacement of sensitive data in the database, to achieve user access to sensitive data true content of the authority control. For sensitive data stored in the database, users with different permissions will get different results through desensitization system. The system supports two deployment modes: bypass agent and direct agent. It has the advantages of excellent performance, flexible configuration, simple use and stable operation. It can help customers reduce the risk of sensitive data leakage in production libraries, reduce data leakage during development, testing and data delivery, and easily meet compliance requirements for privacy data management.

product features

real-time dynamic desensitization

For production data that needs to be shared or data testing and training scenarios with high timeliness requirements, dynamic desensitization technology based on gateway proxy mode is provided to achieve the effect of real-time fuzzy sensitive data. Dynamic desensitization enables transparent, real-time desensitization of sensitive data in business system databases.

Dynamic desensitization can control access based on multiple identity characteristics such as database username, IP, client tool type, access time, etc.

Dynamic desensitization can release, mask, hide, return row control and other desensitization strategies to the data returned from the production database.

desensitization log audit

The system transfers the generated logs to the desensitization system, and users can query and count the logs of operation and maintenance personnel operating the database to realize the function of auditing the database. Audit fields include: occurrence time, connection rule, database, security rule, action, SQL, client user name, client host, client program, login account, etc.

typical deployment

product advantages

·Meet national and industry requirements such as security, business confidentiality, Ministry of Industry and Information Technology documents, and central bank documents

·Greatly reduce the possibility of data leakage

·Support cloud applications

·Transparent desensitization from the data source without changing the structure of the original application system and database

·Support applications and operations to access the database

product characteristics

·Dynamic desensitization, replacement, hiding, etc. in real time

·Restrict illegal access through screen capture and full tables

·Prevent privileged operations such as DDL/DML/DCL

·Provide detailed audits for easy traceability

·Maintain integrity and consistency of legacy systems without changing data in the database

·Easy to implement, built-in desensitization rule template, can complete the implementation of complex business systems within a week

·Multiple databases can be supported in one deployment

System Support Scope

Oracle, MySQL, etc.

Support desensitization methods

·Data substitution: substitute fictitious data for true values

Truncate, encrypt, hide, or invalidate: replace true values with "invalid" or *,#

Randomization: replacing truth values with random data

Offset: changing digital data by random shifting

·Character subchain masking: Create custom masking for specific data

Limit the number of rows returned: Provide only a small subset of the available responses

·Masking based on other references: changing only part of the response according to predefined rules (e.g. masking VIP customer names but showing other customer names)

Product form and performance

·Hardware form

·Software form

·Dynamic desensitization: up to 20000 pen/s request

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Database

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report