In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
I. Overview of background
1. Demand analysis
The current system status of the power grid is as follows:
(1) it is mainly divided into two computer rooms: the production environment and the test environment (prefecture and city), and the two computer rooms are physically isolated, but there are some springboard mechanisms at present. From the test environment computer room, some information about the existence of fortress machines can be obtained to achieve the purpose of obtaining data. It is a security hidden danger that can not be ignored.
(2) at present, there are nearly 300 sets of databases, mainly Oracle (most of which are 11.0.2.0.4, a small part is 12C), a small amount of SQL Server,DB2,MySQL, and 4 sets of Dameng databases (two of which are used in production environment).
(3) there are about 200servers, of which Linux and X86 are the majority, and AIX (minicomputer) is the main application server, about 50-60, which mainly run enterprise-level applications, such as production, marketing, human resources, assets and other centralized business systems in the province.
II. Overall design
According to the security requirements of the power grid, in order to ensure the data security of the power grid information system, Zhong an Visa builds a data security protection platform to achieve data security protection through visual, controllable and secure storage.
1. Data visualization: whether it is the production environment, the test environment, or accessing the database through the fortress machine, you can record the access and risk status of the database in real time, discover the abnormal activity and risk of the data in time, and give alarms; it can also provide a mechanism for tracing all kinds of abnormal activities afterwards.
2. Data controllability: desensitization of sensitive data to ensure that operators, developers and testers can only see the blurred data, so as to prevent leakage and damage of real data.
3. Data storage security: for databases that store a large amount of important data, it is necessary to selectively encrypt and store sensitive contents to prevent the database system from losing data when it is invaded, and to further enhance access control. prevent the abuse and embezzlement of internal staff privileges.
Based on the requirements of data visualization, controllability and data security storage, targeted solutions for data security protection in XX power grid are provided to make up for the shortcomings of the existing security system. Through the correlation of sensitive data discovery, performance audit, risk assessment, coarse-grained audit, sensitive content encryption and desensitization, the protection capability is gradually improved to achieve data visualization, storage security and controllability.
III. Value of the scheme
The above solutions can effectively solve the implementation and management of the power grid in the production domain, test domain and fortress machine, and improve the security, confidentiality, stability and availability of the database. It effectively meets the needs of visual, controllable and storage security of power grid data management, and brings the following value to customers:
1. Simplify business governance and improve the ability of data security management. Because the database system is a complex "black box" software system, its visualization degree is very low. It is difficult for database administrators to tell when data is accessed at some point, which brings great difficulties to business governance. Especially in the cloud environment, the degree of invisibility is even more serious. Our data security solutions comprehensively monitor data access through a variety of means, and provide rich preset statistical reports to graphically visualize data access and risks, thus providing access control capability. it greatly simplifies business governance and improves the ability of data security management.
2. Maintain the credibility of the power grid. To ensure that the power grid will not have the leakage of information and the transmission of bad information, and enhance the influence and reputation of the power grid in the society.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.