Background Analysis of Source Code Encryption Requirements

In the era of electronic documents, information processing is becoming more and more simple, no need to hold thick books, no need to print thick materials! But this brings up other troubles! Data security is not guaranteed! The problem that most enterprises are currently encountering: How come competitors have also developed products that the company has just developed? How do competitors know about project documents, quotations, drawings, and customer information? This is typical leak time! What's more, there are the following questions: If employees want to change jobs, won't they take our design materials with them? In fact, these exist in more than 70% of enterprises! In real life too. What I know is the home improvement industry: if you don’t have a case designed by yourself for an interview, you will hardly be asked (except for interns)! Where does the case come from? Go to the last company!

demand analysis:

1. It is necessary to keep confidential the documents or drawings edited by Office, CAD, Pro/E, etc. to prevent leakage of drawings. Encrypted files can only be used within the company, and computers that leave the company will become garbled characters.  

2. Takeaway management of laptops, employees can only operate encrypted files on their laptops when they go out. And there is a specified time!

3, the best automatic backup of files to the server!

4. The mobile storage device cannot be used

5. An application is required when the documents need to be sent out. Approved to send out!

6. Applications that are limited to the Internet cannot be uploaded to the Internet!

7. Convenience, if you don’t want a file, you need the boss to decrypt one. Too troublesome!

implementation plan:

Employees install the client of Sangxinda SDC anti-leakage software, and install the management and confidential ends of the SDC sandbox on the computers of the company's top managers and the company's servers. Install the file outgoing management terminal on the server!

Managers manage terminal settings policy:

1. It is set that the client cannot open the design and development software in normal mode!

2. The printing authority can only be fixed to a certain printer, and who prints is recorded

3. Record file operations and generate logs; 4. In encrypted sandbox mode, mobile devices are read-only!

5. The encrypted disk cannot be accessed in normal mode

6. Offline time control, you can't be in sandbox mode if you leave; 7. Set file sharing permissions, different people have different permissions to access different resources

8. Strategy distribution configuration; 9. Transfer files from the client to the server to ensure that the data is encrypted without landing or landing. 

10. It is set that employees must enter the sandbox mode within a certain period of time.

Confidential end setting: 1. Different people access different confidential files

Employee client:

1. Realize automatic client encryption;    

2. Communication management with the server.

3. The files that need to be sent out can be exported to other non-encrypted disks through the export tool! But the exported file cannot be used in normal mode.

File sending server: Set up the process, establish a department, and all outgoing files need to be approved before they can be sent out. Whoever applies and who approves will be recorded! Personal responsibility!

Implementation effect: automatically, forcibly, and transparently encrypt the files that the administrator wants to encrypt. Ensure that your company's important electronic documents will not be stolen. It will not change the operating habits of employees, and all encryption actions are silently completed by the system behind the scenes. It is unimpeded for employees to communicate and use encrypted documents within the company, and ordinary employees have no way to copy files to other places. Even if the exported file, there is no way to open it! Summary of the plan: completely and proactively prevent your company's peers, competitors, and job-hopping employees from sharing important internal company materials, drawings, documents, R&D results, R&D materials, technical documents, project books, quotations, customer information, financial data, etc. Important confidential information files are in hand. While improving the work efficiency of your company's employees without affecting their emotions, it can completely and proactively prevent internal employees from leaking important and confidential information within the company.

Guess you like

Origin blog.csdn.net/cnsinda_sdc/article/details/127637837