Ming Dynasty Wanda s data desensitization products ensure the security of sensitive data in the fina

Mondo Technology Updated on 2024-02-01

With the widespread application of big data, all walks of life are facing unprecedented data security challenges. As a widely digital, data- and capital-intensive industry, the financial industry has particularly prominent data security challenges.

In order to cope with these challenges, the financial industry has been attaching great importance to data security protection, among which:Data masking is one of the most important data security protection methods。However, with the continuous deepening of informatization construction, various business systems need a large amount of high-quality production data support in project construction. The manual masking method has data inconsistencies, usability problems, additional labor costs, and processes that are difficult to standardize. At the same time, the financial industry has a variety of databases and big data platforms, and their number is growing rapidly, which puts forward higher requirements for data desensitization capabilities. In order to meet the needs of data call management in various scenarios, the financial industry needs to take a fresh look at data masking to meet new business needs and regulatory requirements.

As a professional manufacturer deeply engaged in data security in the financial industry, Ming Dynasty Wanda serves many financial units across the country, and has rich experience in data security management and control, as well as a complete product line. As one of the data security products, data masking products play an important role in actual business work.

Ming Dynasty Wanda data desensitization products

The product supports static, dynamic and application masking modes, integrates a variety of masking algorithms, and combines with masking standards tailored for the financial industry to ensure the security, availability and masking efficiency of masked data to the greatest extent, and fully meet business and regulatory needs. The product is fully functional, including:

Automatic discovery of sensitive data.

Built-in rich masking rules.

Sensitive data is statically desensitized.

Diverse types of data masking.

Maintain the identity of the data.

Keep your data connected.

Behavioral operations audits, etc.

And on the basis of refining the user's personalized needs, the product can be developed and customized.

Deployment topology. Typical application scenarios

1.Data desensitization after classification and gradingOn July 24, 2023, the People's Bank of China drafted the Measures for the Management of Data Security in the Business Fields of the People's Bank of China (Draft for Comments), which was open to the public for comments, and the data security protection and management measures repeatedly put forward clear requirements for the sensitive level and desensitization of data. In order to meet the requirements of the Draft for Comments on data security management, it is necessary to realize the intelligence and automation of classification and grading and data desensitization through technical means.

Ming Dynasty Wanda data desensitization products perfectly meet the application needs of such scenarios: they can be deployed after the classification and grading product system, or they can be deployed as the first product system to meet the needs of on-demand desensitization after data classification and grading.

2.The three-layer association is aimed at desensitizing the data of natural personsIn some business tasks, you need to directly access the raw data resource pool, and users with certain permissions can view the original data, while other users cannot view the original data or even do not have the data viewing permission.

The masking system can be deployed serially and logically, and the relationship between the application account and data access can be automatically associated with the configured data masking policy, so that users with permissions can return the original data, and other users can return the masked data or prohibit access. Access control rules and policies can be flexibly configured to ensure the security of sensitive data and confidential information, and also ensure that the quality of data meets the requirements of the business system.

The value of the solution

Meet business needsProvide highly advanced masking rules for various sensitive data types to ensure that the masked data is irreversible; The original characteristics and semantics do not change; The data correlation of the same field between different tables does not change. The data can be stored smoothly. On the premise of meeting the needs of various development tests and big data analysis for data authenticity, while avoiding the leakage of sensitive data, it ensures the normal progress of various businesses.

Support for business system or third-party data migration tasks: You can integrate the masking and watermarking capabilities of the masking system through APIs or SDK integration calls.

Sensitive Data ProtectionBuilt-in sensitive data discovery rules, which can automatically scan data through simple and flexible configuration, proactively discover and desensitize sensitive data, and realize the overall exchange and migration protection of sensitive data, the traceability protection of sensitive data leakage events, and the real-time protection of sensitive data in the production environment.

Sensitive data tables can be transparently encrypted, which does not affect the business system and prevents sensitive data storage leakage. Connect classification and grading results, support the direct use of classification and grading results, and jointly formulate sensitive data desensitization rules.

Meet compliance needsManage the arbitrary export of sensitive data within the enterprise, prevent sensitive data from being copied, leaked, and leaked without processing, improve the enterprise's sensitive data protection capabilities and overall security level, and meet compliance requirements.

Related Pages