Database Security of the Internet

With the development of global information technology, Internet applications *** to all walks of life. Internet banking using the Internet technology, mobile communication technology, optimize the allocation of financial resources and wider use, the arrival of a new financial era represents the emergence of the Internet finance. Third-party payment, mobile payment, P2P credit, financing and other Internet financial crowdfunding concept has been speculation parties in full swing. In 2014, "two sessions", "Internet banking" first appeared in the "Government Work Report" made in ××× ××× Prime Minister.

Internet banking once encountered ******, normal operation will be affected, endangering consumers' financial security and personal information security. 2014 "two sessions", the financial security of the Internet has become the focus of concern, in addition to laws and regulations, related systems and industry standards continue to improve top-level design, through technical means to protect data security precautions have been ****** become a necessary measure to protect the financial security of the Internet.

For example P2P industry, the industry because there is no cash pooling, cash security is not a problem, but there are still sensitive data security issues. Such as customer information (name, ×××, address, phone, mail, etc.), transaction information (transaction time, amount, profit and loss) and other sensitive data leak once, the customer will not invest heavily in this platform, especially those larger amount of investment clients. However, most current P2P company uses relatively low security outsourcing systems that are far less than the professional level, but not up to standard requirements. Therefore urgently needed a series of related security products to protect their data.

solution

By the deployment of virtual machine agent, in the data center is deployed in the ambit of the high performance database audit system. The system obtained by way of proxy data packet to all access the database, and the data packet parsing, restore the true access behavior to achieve access to the database audit and monitor the situation. Combined with management tools for different applications and databases authority personnel, the implementation of different audit policy, conduct comprehensive monitoring access to the database, and schedule and other insurance, and other types of sensitive data access case reports.

Value and Earnings

A company via the P2P solution that enables all operations on the database visible and traceable, to detect potential risks. A substantial increase in protective effect, effectively resist ***, thereby reducing overall security costs;

Provide security *** evidence *** deter illegal by malicious employees; the relevant security personnel to take timely response strategies to effectively reduce the risk of information leakage, protect the vital interests of customers. To maintain and enhance the company's brand image and business reputation.

Real case: a database of Internet firewall to protect core financial data

Background and demand

Internet companies facing serious financial sensitive data security issues. Such as customer information (name, ×××, address, phone, mail, etc.), transaction information (transaction time, amount, profit and loss) and other sensitive data needs to be properly protected, once the leak will seriously affect the business of credit and reputation. In addition, internal IT managers, data analysts to directly manipulate the database system, execute the SQL statement analysis. The need to monitor the behavior of database access, analysis, timely identify the behavior and statistics *** offending behavior, blocking illegal operations and *** high risk if necessary.

Solution 1: Cloud deployment

User environment Features:

Ali cloud users to buy services, ECS & RDS operating system centos6.5, RDS database mysql5.6, each virtual host has two physical network cards, an internal network card is responsible for communication between the ECS and RDS, a network card to provide management of the external network for users remotely. You can not modify any aspect of network configuration, including the address, and networking information ECS & RDS host, but apps can customize ip address and port number defined in the database.

Deployment:

The use of one arm proxy mode, the system will be in ANVIZ of database firewall systems deployed on a virtual host users. The database application side ip address ip & port number of a particular address provided to the port & ANVIZ firewall system, when the application accesses the database, the traffic is analyzed Anviz firewall system upon receiving real redirected to the database server, establish a communication link. In ANVIZ firewall system is turned on automatic modeling function, you will learn, through the database security administrator to determine normal, risk-free access SQL generation whitelist policy, to be released; access to behavioral deviation from the white list, the system generates an alarm, and submitted to the security administrator artificial determination to develop appropriate blocking rule, the core data protection.

Solution 2: data center deployment

User environment Features:

Users have their own physical room, or self-built or third-party hosting, network environment can be modified.

Deployment:

Using the physical machine Anviz firewall system in a transparent manner in front of the deployment database, does not require any changes to the user, and the WEB database, only need to provide an IP address to communicate with the database can be a WEB & ends. Weishi firewall products in communication with the database will automatically monitor port, while transparently proxy, real-time analysis of user access to the database, and establish a baseline model, is determined by the security manager to access the database is normal, develop appropriate whitelist policy; for access behavior deviates from the white list, the system will generate an alarm, submitted to the security administrators determine whether the violation, generate the corresponding blocking strategy, the core data protection.

Beneficial results:

A P2P company through the above solutions to enhance the overall database defensive effect, effective against all kinds of *** to meet security compliance inspection from relevant departments, to assist security incident forensics and retroactively, to prevent loss of sensitive information leaks or small, eliminating customer concerns about privacy security.

Guess you like

Origin blog.51cto.com/14323396/2415952