For enterprises as critical information infrastructure operators, before purchasing products and services from network product and service providers, enterprises need to predict the national security risks that the purchased network products and services may bring. If it affects or may affect national security, a cybersecurity review shall be reported to the Cybersecurity Review Office.
2. The Measures emphasize important data security risks
Article 10 of the "Measures" stipulates the national security risk factors that the network security review will focus on assessing, including "(5) the risk of core data, important data or a large amount of personal information being stolen, leaked, damaged, illegally used, or illegally exiting the country; ( 6) There is a risk that key information infrastructure, core data, important data or a large amount of personal information will be influenced, controlled, or maliciously used by foreign governments in the listing, as well as network information security risks”.
At present, the definition of important data is not clear, but Article 21 of the "Data Security Law" stipulates that "the national data security work coordination mechanism will coordinate relevant departments to formulate important data catalogs and strengthen the protection of important data", "all regions and departments". According to the data classification and grading protection system, the specific catalogue of important data in the region, the department, and related industries and fields should be determined, and the data included in the catalogue should be protected.” To avoid the risk of cybersecurity review, network platform operators should continue to track The formulation of relevant regulations and standards, actively identify the important data of the organization, strengthen the risk assessment of important data processing activities and the protection of important data.
When focusing on the protection of national core data and important data, the choice of database security products is particularly important. Palladium database security operation and maintenance treasure (abbreviation: DIM) is based on the "zero trust" security model, from personnel security authentication, application access control, database compliance login, operation and maintenance authority governance, work order process system, operation and maintenance operation audit, etc. In terms of comprehensive support for database operation and maintenance security management and database leakage prevention, it meets the requirements of database operation and maintenance security internal control and various laws and regulations, and finally solves the security governance, account risk control, transmission channel management and in-depth access control on the database operation and maintenance side. And the problem of database operation and maintenance authority governance.
3. Enterprises should improve safety awareness and actively report and review
According to Article 11 of the National Security Law of the People's Republic of China, citizens of the People's Republic of China, all state organs and armed forces, all political parties and people's organizations, enterprises, institutions and other social organizations have the responsibility and obligation to safeguard national security .
As part of the main body responsible for national security, network platform operators need to strengthen the main body responsibility awareness of national security to prevent the risks brought by listing to national security; the second is to master key information infrastructure, core data, important data or a large number of individuals When an information-based company goes public abroad, there is a risk of being influenced, controlled, or maliciously used by a foreign government, as well as network information security risks, and should actively apply for a cybersecurity review to prevent the listing of the company from bringing risks to national security.
3. Palladium builds a strong data security defense line
The "Measures for Cybersecurity Review" is an important legal system in the field of cybersecurity, which is of great significance to ensuring the security of the critical information infrastructure supply chain, ensuring network security and data security, and maintaining national security. Under the strict supervision situation, data security compliance has become the primary issue of corporate compliance development, and strengthening compliance management of data security is an inevitable trend for the future development of enterprises.
When it comes to data security, a topic that cannot be avoided is database security. As a warehouse for organizing, storing and managing data, the security risks it faces cannot be underestimated. In the process of enterprise digital transformation, database security has gradually become the "Achilles' heel" when enterprises maintain data security.
Over the years, Palladium has developed a complete set of database security products for data life cycle management by relying on in-depth research on the database security industry, relying on mature security technology strength, combined with the network security framework IPDRR, Gartner data protection methodology and other international mainstream security models. , to assist enterprises to fully realize the security protection and compliance management in the data center field.
Palladiumgm Database Security Product Overview
01-Palladium database security operation and maintenance treasure DIM
02-Palladium database security audit system DBXPERT
03-Palladium database access firewall DAF
04-Palladium Next Generation Database Application Defense System NGDAP
05-Palladium Next Generation WEB Application Firewall NGWAF
In the future, Palladium will continue to pay attention to the dynamic development of the security industry. On the basis of fully understanding the laws and regulations and the needs of local supervision, industry supervisors, operators and other business scenarios, it will provide a full range of data security compliance solutions for related network platforms. Operators, key information infrastructure operators and enterprises provide high-quality and comprehensive services in data security and network security construction.