当前位置:网站首页>Industry application | understand the bank's sensitive data security protection ideas from practice
Industry application | understand the bank's sensitive data security protection ideas from practice
2022-04-22 08:02:00 【shipinginfo】
As a data intensive industry , In the process of carrying out financial business , Not only master a lot of personal financial information , Also collected faces 、 Personal sensitive information such as identity information . With the advancement of digital transformation and “ Post epidemic Era ” Upgrade of online service capability , The financial business is further migrated online , Personal assets and information security risks are becoming more and more difficult to prevent . Due to the particularity of the industry , Countries and industries have successively introduced 《 Network security law 》、《 Data security law 》《 Personal information protection law 》、《 Technical specifications for personal financial information protection 》 And a series of regulations and industry standards to strengthen the protection of personal information security .
How to collect personal sensitive information 、 Use 、 transmission , Not only determines whether the bank's business can be carried out smoothly , It also affects the security of personal information and personal privacy .11 month 1 The date of ,《 Personal information protection law 》 It's officially implemented . How do banking financial institutions respond to and implement national and industrial data security compliance requirements ? How to effectively prevent the disclosure of sensitive information , Ensure the security of customer data ?
Similar pain points —— Security protection of sensitive data
Local banks A
I can IT There are a lot of business and customer sensitive data in the environment , It has not been effectively sorted out and managed ; Personnel in sensitive positions can collect customer information resources , Failure to fully control the acquisition of sensitive data 、 Storage 、 Use 、 Transfer 、 Processing and other links , There is a risk of being illegally spread and used , When something goes wrong , Will cause irreparable losses .
Local banks B
Our business scale is large , There are many workers involved in the operation , There is a huge amount of financial sensitive data in the process of business development . With the application of data 、 Data analysis 、 Data mining and other data application scenarios have been gradually improved , The senior management of the industry attaches great importance to the data security in this process , Establish effective data security desensitization specification and supervision mechanism .
thus it can be seen , The protection of sensitive data is a common difficulty for banking financial institutions , But the internal structure of each bank 、 Organization distribution 、 And business composition , According to the characteristics of different banks , We provide them with solutions that deeply combine the needs and characteristics of the bank
Different practices —— Tailored solutions
Practice plan A
combination A Current situation of information system construction of the bank , Through to A Construction of bank terminal data leakage prevention project , Realization A The bank is involved in the data supervision of sensitive data in the whole life cycle of sensitive data on sensitive terminals , Monitor and actively defend the terminal behavior , Ensure data security risks “ You know 、 controllable 、 visual 、 Auditable ”, And leakage protection of sensitive data .

This solution helps A OK, that's it :
- Compliance regulatory requirements are implemented
Starting from the data security compliance requirements , Using corresponding technical means , Realize the information security of customers and banking technology / Business data security , Help the implementation of compliance and regulatory requirements .
- The terminal data is safe and controllable
The combination of content identification and behavior control , Conduct in-depth analysis of the user's terminal operation behavior , such as : Chat 、 E-mail 、 Outgoing documents 、 Information published on the Internet, etc ; Accurately identify and classify a large number of documents in the line , Based on advanced content recognition technology , Take more targeted protection measures for high-value data .

Practice plan B
combination B Current situation of bank system architecture , Shiping information puts forward the construction scheme of data desensitization system with financial characteristics , When all business system data is used in non production environment , Data extraction for sensitive data 、 Data desensitization 、 Data loading and a series of data flow operations , On the premise of not landing sensitive data , High simulation processing of sensitive data , Ensure that sensitive data of production system is safe in non production environment 、 Use effectively .
This solution helps B OK, that's it :
- Strengthen the ability of data security management , Meet compliance requirements
Start with data security and management and tracking , Start with data generation , Follow up the whole process , Scan data regularly , Clean up the data regularly after completion , Strengthen data security supervision , Ensure data security to the greatest extent , Form a data lifecycle management specification .
- Intelligent desensitization , Increase of efficiency
Using content recognition technology with independent intellectual property rights , Provide regular expression based data content 、 Automatic analysis of field names based on field names , Detect sensitive information fields in the system , It lays a good foundation for users to customize intelligent discovery rules suitable for their own needs .
Support two-to-two correspondence desensitization between database and file , That is, library to Library 、 Library to file 、 File to library and file to file desensitization mode , Meet the actual business scenario needs of users .
The same value —— All roads lead to Rome Just for safety
Meet the compliance requirements of data audit and supervision
Help users achieve sensitive data security compliance , At the same time, meet the requirements of industry audit and regulatory authorities .
Establish a sensitive data security management mechanism
From the perspective of overall risk control , Find sensitive data in time , Reasonably control the use and transmission of data within the scope of compliance , Avoiding security risks .
Build data security protection system
Gradually improve the level of data security protection while avoiding the waste of resources , Reduce the cost and difficulty of data protection .
版权声明
本文为[shipinginfo]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204220626488969.html
边栏推荐
- utgard连接opcserver报错Caused by: org.jinterop.dcom.common.JIRuntimeException: Access is denied. [0x800
- Software development specification
- XSS range clearance
- node配置环境cmd不生效
- 读取SAE J1939协议数据流
- 如何保护个人信息安全?@每个人,一定不要错过这份干货分享
- Autoware显示用户界面细节
- Raspberry Pie: adafruit's I2C ssd1306 OLED driver
- C#自制一个简单的树莓派IP寻找工具
- Ultra vires and business logic vulnerabilities
猜你喜欢
随机推荐
SuperSocket在.Net5中使用——WebSocket Server篇
OBD external test equipment initialization judgment protocol type (SAE J1939 / iso15765 / iso27145)
Plain CSRF vulnerability
【世平信息】刻录内容保密检查与合规管控解决方案
Raspberry pie Lite: install the latest version of discuz
js动态合并单元格
关于transformer机制的理解
2021-10-08 Selenium无头模式打开浏览器
Software development specification
Resolve MSSQL message 3989, level 16, status 1
XSS靶场过关
Wangshixi, chairman of Shiping information, won the 2020 new person Award
Call another function within a shell function (without return value and with return value)
Reconnaissance des chiffres manuscrits MNIST basée sur le modèle lenet - 5 du réseau neuronal convolutif
基於卷積神經網絡LeNet-5模型的mnist手寫數字識別
node配置环境cmd不生效
SuperSocket在.Net5中使用——Command篇
flask 数据Model迁移报错
Observer mode -- ApplicationContext
圣杯布局和双飞翼布局

![STM32 peripherals [3] serial port RS232 RS485](/img/47/d8c8bbe67559d01cde7a118d2dde78.png)







