Together to learn how to look at the source code to protect large enterprises

Each year, a variety of data leakage incidents reported after another, most of them are internal data leaks event, compared with conventional external *** steal this from malicious internal leaks more targeted, covert , to the loss of business caused by the greater.

Especially in research and development mainly in technology-oriented enterprises, a lot of R & D staff of code are stored on the computer. These codes if they are intentionally or unintentionally leaked, continued operation will cause economic enterprises, loss of reputation, and even face more severe regulatory penalties.

So how can companies protect the core code data it? Here we take a look at how large enterprises are doing.

First we look at the ways from the perspective of the internal management of the enterprise.

1 , to sign a confidentiality agreement . Many enterprises, especially large enterprises, at the time hires, will sign a confidentiality agreement, especially the developers involved in such staff core information in this way, can prevent employees from actively leak a certain degree, it is worth noting that, agreement to clarify the scope of trade secrets, classification and division level, to prevent it , "a paper agreement" has become empty talk.

Confidentiality agreement .png 

2 , installation of monitoring systems. Some companies will choose to install a camera in the office, or install monitoring software on the computer, this way can constrain the behavior of employees to a certain extent, but we must advance and employee communication, otherwise easily lead to employee resentment.

3 , disable the USB interface. This is the way a lot of R & D enterprise will take, this method can prevent malicious developers to copy the code and other data can be prevented U spread of the virus or hard disk.

4 , control access. According rank and privileges of employees, their work can only access the required data, so that ordinary developers access to information than the core. There are also some companies limit access, for example, can not connect to the Internet, but the work will inevitably require external information, so bring some influence in this way will work.

Below, we look at business from a technology aspect in what ways.

1, the use of encryption software. This is a lot of science and technology R & D enterprise will choose the way, can protect the document itself, codenamed and other data in any way, what channels leak is always encrypted, thereby protecting the core secrets is not illegal to steal. This way it can reduce the impact on those working, without reducing efficiency.

2 , add watermark. Watermark in the form of a desktop computer's desktop displayed on the terminal, through different forms of text, dot matrix, two-dimensional code and other information related to the use of the terminal onto the terminal computer desktop, prevented by taking pictures, screenshots, printing way disclosure of information.

3 , the implementation of network isolation. This is currently regarded as the most popular way. The first step is to take the vast majority of enterprises within the enterprise network and the Internet isolation, internal data network "trapped", but also to effectively shielded from external risks. Large-scale enterprises may also be implemented to further isolate the internal network, such as divided into office network, Research and Development Network, the production network, network testing, mainly to shield different departments, illegal exchange of data between different services. Isolated manner through the network, the inner core can be effectively prevented code data leakage.

Network isolation .png FIG.

Attached: "construction enterprise network isolation Guide White Paper" free downloads

5 , cloud desktop. Cloud Desktop is a very popular way, a lot of R & D-oriented enterprises are using, its relatively low cost, flexible, can quickly respond to business and development needs , the data are concentrated on the server, the developer of the terminal does not re- save data and storage for codes and other data does not fall, information security .

Global digital wave, data security is always the focus of attention and focus on the subject. In short, no matter what size and type of business, we need to establish a system for their own data protection and security mechanisms to protect core data to enhance their core competitiveness.


Guess you like

Origin blog.51cto.com/14415391/2480103