一、数据防泄露(DLP)与数据安全治理 .....................................................................................................7
1、数据安全必须先做数据安全治理 ....................................................................................................7
2、数据防泄露(DLP)是数据安全治理的重要目标导向 ...................................................................8
二、数据防泄露(DLP)的定义 ..................................................................................................................9
三、数据防泄露(DLP)的应用 ....................................................................................................................9
1、数据防泄露(DLP)为实现数据分类分级保护提供技术支撑 .............................................................9
2、数据防泄露(DLP)在数据生命周期提供安全防护 ..........................................................................10
a)识别存储数据中敏感信息的位置 ...........................................................................................11
b)掌握流转中数据的数据流向及流转方式 .................................................................................11
3、对使用中的数据进行权限细分,并进行相应的控制 .....................................................................12
a)终端数据使用 ..........................................................................................................................12
b)应用数据使用 ..........................................................................................................................12
四、数据防泄露(DLP)的核心技术 ...........................................................................................................13
1、方案部署 .......................................................................................................................................13
a)分布式部署架构(分层管理).................................................................................................13
b)策略分级部署 ..........................................................................................................................13
c)证据文件外置部署 ...................................................................................................................13
d)管理服务器高可用 ..................................................................................................................14
e) 数据库高可用 ..........................................................................................................................14
2、策略定制 .......................................................................................................................................14
a)内容检测的组合检测 ...............................................................................................................14
b)检测对象的锁定与过滤 ...........................................................................................................14
c)策略响应动作 ..........................................................................................................................15
d)策略触发通知 ..........................................................................................................................15
3、数据识别 .......................................................................................................................................15
a)关键字识别 ..............................................................................................................................16
b)字典权重识别 ..........................................................................................................................16
c)正则表达式识别 ......................................................................................................................16
d)文件属性识别 ..........................................................................................................................17
e)图像识别 .................................................................................................................................17
f)标签识别 ..................................................................................................................................17
目录
文档被以下合辑收录
评论