Database Dynamic desensitization

Description
of the dynamic data ANVIZ desensitization system (VS-DM), by intercepting and modifying the contents of database communication, sensitive data in the database online shielded, deformation, character replacement, random replacement, etc., meeting the user access permissions sensitive real content control. To store sensitive data in the database, through desensitization system, users with different privileges will get different results show. The system supports a bypass proxy and proxy straight road two deployment methods, with superior performance, flexible configuration, easy to use, stable operation and other advantages. We can help customers reduce the risk of producing a library of sensitive data leakage, reduce data leakage develop, test and data delivery process, and easily meet compliance requirements of data privacy management.
Product Features
• Real-time dynamic desensitization
of the need to share production data or timeliness demanding training scenarios and test data, desensitization technology-based dynamic gateway proxy mode, blur sensitive data in real time to achieve results. Dynamic desensitization may be transparent to the service system database sensitive data, real desensitization.
Dynamic desensitization can control access based on database user name, IP, client tool type, access time and other multiple identities feature.
Dynamic data desensitized production database may be released to return, masking, hiding, and other row control returns desensitization strategy.
Database Dynamic desensitization
• desensitization log audit
system will generate a log dump to desensitize the system, the user can query the log and statistics on the operation and maintenance personnel to operate the database, and perform database auditing features. Audit fields including: time of occurrence, connection rules, database, security rules, actions, SQL, client user name, client host, the client program, the login account and so on.
Typical Deployment
Database Dynamic desensitization
Advantages
• Meets such as security, commercial secret, the Ministry of documents, files and other national central banks, the industry requirements
• greatly reduce the possibility of data leakage
• support cloud applications
• Transparent desensitization from the data source, without changing the original structural applications and databases
• support the application and operation and maintenance of the database access
product features
• Real-time dynamic desensitization, replace, hide and other operations
• Limit screen through interception, unauthorized access to a full table
• prevent DDL / DML / DCL and other privileged operations
• Provide detailed audit, easy traceability
• maintain the integrity and consistency of the original system, while not changing the data in the database
• easy to implement, the built-in template rule desensitization can be completed within a week the implementation of complex business systems
• first deployment can support multiple Taiwan database
system supports the range of
Oracle, MySQL and other
support desensitization way
• data substitution: fictitious data instead of the true value
• truncate, encrypt, hide or make it ineffective: the "invalid" or *, # instead of the true value
• random: taking random data instead of the true value
• offset: shifting the digital data by randomly changing the
• character daughter strand shield: creating a custom mask for a particular data
• limit number of rows returned: subset only a small portion of the available responses
• based on other reference information shield: change is only part of the response content (such as shielding VIP customer names according to predefined rules, but the display His customer name)
product form and performance
• Hardware form
• Software forms
• Dynamic desensitization: up to 20,000 strokes / sec request

Guess you like

Origin blog.51cto.com/14347871/2401655