Ping Anniu + Ruishu Information: "Data Security Management and Control Platform Application Guide" report jointly released

With the successive promulgation of the "Network Security Law of the People's Republic of China", "Data Security Law of the People's Republic of China", "Personal Information Protection Law of the People's Republic of China" and "Critical Information Infrastructure Security Protection Regulations" "Three Laws and One Regulation", from the state, Society and individuals have gradually formed a trend of strengthening data security protection.

In mid-January 2023, the "Guiding Opinions on Promoting the Development of the Data Security Industry" jointly issued by the Ministry of Industry and Information Technology and other 16 departments pointed out that by 2025, the basic capabilities and comprehensive strength of my country's data security industry will be significantly enhanced, and the scale of the industry will Rapid expansion, the scale of the data security industry will exceed 150 billion yuan, with a compound annual growth rate of more than 30%.

In this context, in order to implement the spirit of learning "opinions" and explore the views and methods for the healthy development of the data security industry, on the afternoon of March 16, 2023, Ping An Niu successfully held the "2023 Data Security Technology Innovation and Management Certification Seminar in Beijing" ". Nearly 100 representatives of Party A's user units and representatives of network security vendors gathered together, and more than 3,000 guests watched the live broadcast of the conference online.

At the meeting, Ping Anniu and Ruishu Information and other domestic representative manufacturers in the field of data security jointly released the research report "Guidelines for the Construction of Data Security Management Certification" & "Guidelines for the Application of Data Security Management and Control Platforms" to better develop new data for the majority of government and enterprise users. Provide help and reference for the generation of data capacity building and technology application.

This conference aims to focus on the application practice of data security technology under the background of rapid industrial development, and deeply analyze the application requirements and development status of the current domestic data security industry from the perspectives of construction and application of data security technology, management certification, and innovative development. , and look forward to the future evolution trend of data security technology.

The report "Application Guide for Data Security Management and Control Platform" starts from the current domestic data security protection status, construction of data security management and control platform, technology implementation, application scenarios, application suggestions and implementation cases, etc. Centralized data security system protection.

Ruishu Information pointed out in the report that traditional data security governance mostly focuses on internal data, focusing on collection, storage, transmission and other links. However, the "Data Security Law" clearly puts forward two relatively new data processing links-"provide" and "disclosure". The link where the risk of leakage occurs most frequently.

Therefore, as a representative manufacturer in the field of data security, Ruishu Information takes the actual application of Ruishu Data Security Management and Control Platform in a certain operator as an example, and aims at the data security risks of operators, and provides information on "transmission" and "transmission" in the process of data processing. "Disclosure", "use and storage" and other aspects of data security issues are handled to ensure data transmission security, prevent API sensitive data leakage, realize identity information protection and malicious crawler protection, and help enterprises build an active defense system for data security.

Ruishu data security management and control platform

Based on the key life cycle nodes of data transmission, provision, disclosure, use, and storage, Ruishu Information has launched a data security management and control platform based on various security technologies to help operators build an active defense system for data security.

insert image description here

Ruishu data security management and control platform product architecture diagram

Ruishu data security management and control platform can integrate the security of various application data such as Web, H5, App, API, WeChat and applets, covering multiple links of data transmission, provision, disclosure, use and storage, through the dynamic security engine , AI data behavior analysis engine, response and emergency recovery engine technology, relying on the data security base established by the platform, provide data security protection such as abnormal data access monitoring, data leakage control, data abuse, and data extortion.

Data transmission link: with the "dynamic protection" technology as the core, the one-time pad technology is used for data obfuscation, so that the obfuscation result of the transmission content is different each time, thereby increasing the difficulty of the attacker's cracking, realizing safe transmission, and preventing man-in-the-middle attacks and generated Data falsification or falsification.

Data provision link: Ruishu API dynamic security solution can realize data risk detection, protection and disposal of API from the four aspects of interface identification of sensitive data, attack detection, abnormal behavior disposal and behavior audit, so as to avoid risks caused by API abuse Sensitive Data Leakage.

Data disclosure: Through technologies such as human-machine identification, behavior analysis, and on-demand interception, all application access channels such as Web, APP, applet, H5, WeChat, and API are used to protect against plug-ins and data crawlers.

Data usage and storage: Supported by Ruishu data security base, it adopts fast data detection and response technology based on innovative AI artificial intelligence, providing functions such as risk management in data usage, real-time intelligent behavior detection, threat verification and fast recovery , to effectively counter hacker extortion, prevent mass data leakage and damage security capabilities, and build a defense-in-depth system with three lines of defense before, during, and after the event.

feature

All application access channels

Ruishu data security management and control platform covers all business access channels, including Web, H5, APP, API, WeChat, applets and other business access channels, to achieve data security protection for all business channels; Access records integrate the data access of various business access channels to realize user access data tracking and perspective.

Data Security Protection

With innovative "human-machine identification" technology (including one-time token, client legitimacy verification, client behavior recognition, operating environment detection technology) + "dynamic obfuscation" technology (including application code obfuscation, cookie obfuscation, data transmission Obfuscation technology) as the basis, combined with behavioral analysis technology, to provide full-service channel data security active defense capabilities.

Easily identify various Bots security attacks, such as credential library, crawler, etc.; provide API sensitive data management and control capabilities, automatically identify API sensitive interfaces, detect API sensitive data, desensitize and intercept abnormal batches of sensitive data acquisition behaviors, and protect applications Data access and transmission security.

Safe Bull Evaluation

Ruishu Information puts the entry point of the data security management and control platform at the business level, and focuses on supervising the data API interface and sending agencies to prevent the leakage of sensitive data. Ruishu Information puts the data security protection capability mainly on the edge access end, pays attention to the application of intelligent means, and can analyze massive data to improve analysis performance.

As far as the application case of this operator is concerned, it focuses on relying on AI technology to monitor the security of data in circulation and in use, and adopts dynamic security technology to improve the ability to prevent data security risks in applications and services.

Guess you like

Origin blog.csdn.net/weixin_43634380/article/details/129686195