Data Security Solution-Rev10.3
Data Security Solution-Rev10.3
300379
www.tongtech.com
1 Background and Demand Analysis
CATLOG
2 System Introduction
4 Successful cases
1 Analysis of New Threats & Hot Spots
1 2
In May 2018, on the first day of the official Joseph Sullivan, Uber's former chief security
GDPR, Google and Facebook were flooded officer, is accused of signing a non-disclosure
with lawsuits accusing the two companies of agreement with hackers to pay them $100,000
forcing users to share personal data. Austrian to "keep quiet" by falsely claiming that they had
privacy activist Max Schrems is seeking $3.9 no way to steal Uber data. Sullivan has been
billion in fines for Facebook and €3.7 billion for charged with obstruction of justice for trying to
Google in the lawsuit. cover up data breaches by Uber executives.
1 Risks in Data Life Cycle
Data Transmission and Data Processing and Data Collection
Exchange Storage
User
3rd Party Data
Application Cluster Server Data Storage Cluster
Data Transmission and Data Processing Data Storage Data Disposal Data Collection
Exchange
Clear text transmission of sensitive Abnormal data access Sensitive data is Incomplete data Collection scope violation
data Unauthorized access to data stored in clear text disposal Acquisition component is
Illegal data exchange (data range, A malicious Drag Library Data disposal is not secure
time, etc.) Clear text access to sensitive poorly regulated Collected data was not
SQL injection attack behavior data desensitized
1 Pain Points of Data Security
How to solve the The distribution of various sensitive Is there a data leakage?
existing problems data Who leaked my data
01 02 03
04 05
The overall use of the data What is the current overall data
security risk situation
2 Solution Overview
Sensitive Data
Identification &
Platform Control
Discovery Data Security
Control Platform UEBA user behavior analysis
Data
Classification Data lifecycle management
Analysis of abnormal data access
behavior
Data sharing interface management
Log Collection
Strategy Distribution Log Collection
Strategy Distribution
Strategy Distribution
Collection
Data collection is carried out by single thread, and
the sampled data is transmitted by message queue
Sample Analysis
Due to the large amount of full collection The message data in the queue is pulled
data, the system provides and recommends for asynchronous analysis. If the analysis
the use of sampling for collection results include sensitive data, the sample
data extracted will be desensitized.
Data Classification
Personal
Privacy Data (A1) User identity information
(Class A) User’s Identity Data (A2) User network identity
authentication information
(Class B) Service Content Data (B1)Service content and data
Enterprise
Sensitive Data (C1)User service usage data
(Class C)Service-oriented Data
(C2)Equipment information
(D1) Enterprise management data
(Class D)Enterprise Operations (D2)Business operation data
Management Data (D3)Network O&M data
(D4)Partner data
Interface Recognition
Based on traffic data or virtual network card monitoring
2
technology, the AI self-learning method is adopted to analyze
the data sharing interface, so as to help the management
personnel to automatically maintain the list of shared interface
3 Interface Grading
1
By analyzing the sensitive data content transmitted by the data
interface and combining with the data classification and
grading standards, the interface sensitivity level is defined
Clear interaction
Illegal Acquire Data Network monitoring Unauthorized access Data residual
Unauthorized use
Loopholes in the acquisition Data theft Illegal to steal Violation operation
equipment
Comparison and analysis of For the transmission path Check whether sensitive Combined with the sensitive data Confirm the destruction
management, connection data is desensitized or identification function, sensitive process by scanning the
collection strategies to see if
relation audit. encrypted. contents for discovery;
they meet the application data identification is carried out
For the transmission of Analyze and audit Through the data destruction
content. on the used data, and plaintext management process,
content management, sensitive data access
usage scenarios are discovered ensure that security
Conduct collection equipment content audit to avoid links. Analyze the
and audited. personnel and maintenance
audit and check for sensitive data plaintext exception access personnel jointly supervise
transmission automation. In the use of data query, analysis,
vulnerabilities, compliance, the data destruction process.
export and other links, strict
weak password
access control and intelligent
audit;
3 产品整体功能规划
Data Desensitization
Data Analysis System Development & Test Data Exchange & Sharing
To ensure the relevance of data, the Ensure the relevance of data after Selectively desensitize sensitive information,
results analyzed by data analysts on desensitization, the data after desensitization and provide masking algorithm and
the basis of desensitization data can be does not change the actual attributes of the simulation algorithm according to different
restored to real business data to meet business, can correctly pass the data validity of scenes.
the data analysis scenarios the business system.
DB interface DB interface
Data Base
Discovery, Extraction, Load, Desensitization
Other interface Other interface
3 产品整体功能规划
Data Encryption
The database encryption system can block access to sensitive data through transparent encryption
technology. Through data encryption, sensitive data can be protected even in the event of physical
database files and backup files being stolen and lost.
13 13
3 产品整体功能规划
Database Firewall
Based on IP address
Based on the time
Based on the user
Policy Rules
Based on the operation
Keyword based
Based on the column
Based on the name of the
table
Parsing SQL Based on the number of
Operations rows
User B: Operation B
User A --Block
User B --Alert
Database Firewall User C --Pass Data Base
User C: Operation C Application Server
Web、
IM、
Network Mail、Library
Discover
Printer, Fax, Network Sharing,
Terminal Bluetooth, USB, DVD, U disk,
Data leakage prevention system uses
Mail Client, Browser
intelligent content identification core
Monitor
Protect
application systems
Application OA、ERP……
Web
16
3 Network DLP
Application Scenario Effect
The enterprise controls the sensitive information sent by the user terminal 1. Control the sending of sensitive information through file sharing (copy, paste,
through file sharing, instant messaging tools and FTP in the form of resource
manager, so as to prevent the leakage of enterprise sensitive information drag and drop of network sharing);
through network communication channels 2. Identify and detect the content of chat messages or files sent through IM;
3. Detect and identify sensitive contents of FTP files transmitted by resource
manager;
Deployment
Terminal
Terminal
Unified Management
Platform
3 Terminal DLP
Application Scenario Effect
The enterprise controls the peripheral port of the user terminal to prevent the user 1. Scan and monitor the files or contents transmitted through terminal
from leaking sensitive information through the peripheral port
peripheral ports (U disk, mobile hard disk, mobile phone storage, SD card,
Bluetooth, print), record, alarm or block them;
2. Support to open/close ports/peripherals (CD-ROM port, USB peripheral
port, image device port, infrared port, Bluetooth port, IEEE1394 port, PCMCIA
port, MTP protocol interface, wired network card, wireless network card, serial
Deployment (parallel) port, RS232, printing interface and file sharing).When off, all ports
and peripherals cannot be used;
Firewall Intranet
Terminal
Email Server
3 Product Safety Design
repeated construction, and at the same time to form a relationship and other white lists, to minimize the
good complementary capacity with the existing system. workload of human.
4 Cases- China Mobile
Data Security Platform
Focusing on the entire life cycle of data collection, storage, transmission, sharing, use, and destruction, from threat defense, risk
management and control, data tracking and traceability, data sharing and exchange, to create a digital and intelligent data security
ecosystem. Help customers plan security systems , Comprehensively improve enterprise security defense and risk perception capabilities.
Data external sharing Handling and tracking
Sensitive data identification
interface management data security issues
Handling and tracking data security issues
Scan IP:
Semantic distribution of sensitive data
Access to 18 sensitive systems such as centralized performance Automatically identify 246 external data sharing interfaces, Defined 34 data security policies, analyzed 3,048 data
management, home broadband system, online log retention, and and analyze 1431 abnormal interface calling problems security issues, and handled 2,899 issues
SS7(Signaling System Number 7)
Deployed in China Mobile Guizhou, Fujian, Shandong, Heilongjiang, Jiangsu, Guangxi, Shaanxi, Sichuan, Henan, Inner Mongolia,
Ningxia, Chongqing, No.1 share in China Mobile data security products.
5F, Block A, Beijing International Building, No. 18 ZhongGuanCun South Street, Haidian District, Beijing, 100086, China
SZ.300379
Thank You