当前位置:网站首页>Data security is mainly constructed and protected from the aspects of organization personnel, data classification, classification and compliance evaluation
Data security is mainly constructed and protected from the aspects of organization personnel, data classification, classification and compliance evaluation
2022-07-22 12:32:00 【maoguan121】
Mobile application data security management The basic requirements include agency personnel 、 Institutional safeguards 、 Classification and grading 、 Compliance assessment 、 Rights management 、 Security audit 、 Partner management 、 Emergency response 、 Complaint handling 、 Education and training .
Agency personnel
By clarifying the data security management Responsible department , Clarify the scope of responsibilities , It is conducive to the landing and implementation of specific work . That is, from a strategic height , Start with top-level design , Step down , Put it into practice . Different industries , Different companies , According to their own conditions , Define what meets the needs of the enterprise's own development Data security Responsible management department . For clearer explanation , Here are the practices of an Internet enterprise , For reference . For example, an Internet enterprise has set up a data asset management committee , Within the leading enterprise Data security Management work ; The members of the committee are led by the person in charge of the enterprise, such as CEO or CTO To take the lead , Data principals of all business and functional departments ; At the same time, it defines and clarifies the specific responsibilities of the committee : First, formulate the company's important data security rules and regulations , Second, the company data Safety technology Ability to make clear requirements , The third is to conduct regular compliance evaluation and inspection on the implementation of the company's data security related systems , Fourth, emergency disposal of major events related to data security . Clarify the responsibilities of the data security management department , The implementation and landing of these responsibilities need to be carried out by each department in the enterprise . Again , Different industries , Different companies , According to their own conditions , Divide the management responsibility and implementation responsibility into different departments . here , Continue to list the practices of an Internet enterprise , To illustrate .
for example , The specific data security management work of the data asset management committee is carried out by the security department , The internal control department of laws and regulations shall undertake . The executive departments of each work include , But not limited to, : Data management business department , Data user department , System operation and maintenance department . Responsibilities of the security department , Build enterprise data security protection system , Provide technical support in various activities of data security . Responsibilities of the internal control department , Conduct compliance inspection on the operation behavior of business departments in all links of the data life cycle , According to laws and regulations and formulated by the company , Accountability for illegal operations . Other departments implement the relevant data security specifications of the company in their daily work , Actively cooperate with data audit and compliance work .
After clarifying the division of responsibilities of the Department , The specific data security management work needs to be implemented by the specific responsible person , Enterprises can set up data security posts in responsible departments and executive departments , The personnel of this position shall undertake the corresponding work . alike , Different industries , Different companies , According to their own conditions , Assign or divide responsibilities to different people
Institutional safeguards
Enterprises should establish a complete data security management system , Cover data security policies 、 Management system 、 Operating procedures 、 Record forms, etc . Guide enterprise managers and operators to implement various data security activities , Make the data security management work in the enterprise have rules to follow . The data security management system includes but is not limited to : Data classification and hierarchical management 、 Data access rights management 、 Data security compliance assessment 、 Data Lifecycle Management 、 Data partner management 、 Data backup and recovery 、 Data security emergency response, etc .
Classification and grading
Regularly sort out the list of enterprise data assets , Including collecting through legal means 、 Produced , Stored in Computer information System or other storage medium Middle user Personal information , Including but not limited to user related data 、 Biometric information, etc .
stay 《 Financial data security Data security classification guide 》 The grading goal of data security in 、 Data security classification principle 、 The range of data security rating is explained , It also gives a detailed description of how to carry out data security classification , Each enterprise can refer to its own situation .
Around the whole life cycle of data , Take targeted security measures , The following safety assurance measures for each link , Provide some safety advice , For enterprises to combine their own reality , Make appropriate security .
Data collection needs to be fully authorized by users , The data transfer And storage needs to ensure data encryption , Data use process for minimum authorization , A large number of or high-risk operations need to be approved , Data exchange The compliance audit shall be conducted by the regulation and internal control department , Data destruction shall be carried out according to the company's system . For special data requirements , Such as data exit , It needs to be reported to the competent department for approval .
All data related operations , All need to be marked and recorded , Facilitate future audits
Compliance assessment
The enterprise shall be based on 《 Network security Law 》,《 Network security Class protection The basic requirements 》、《 Telecom and Internet users Personal information Protection specifications 》、《 Information Safety technology personal Information security standard 》 And other laws and regulations to carry out data security compliance evaluation .(1) Enterprises should take data security compliance assessment as an important content and starting point of data security management , according to “ Who operates 、 Who is in charge of 、 Who is responsible for ” Principles , From organization building 、 Institutional process 、 Technical tools 、 Carry out the evaluation of the overall data security protection level of the enterprise in terms of personnel ability and form an evaluation report . The evaluation report should include the basic information of the evaluation object 、 Assessment process 、 Benchmarking of evaluation points 、 Allocation of safeguard measures and description of supporting materials 、 Problem analysis and improvement measures .(2) The content of data security compliance evaluation includes but is not limited to the construction of data security system 、 Data classification 、 Data security incident emergency response level , And the compliance processing of key business and system data 、 Allocation of data security measures 、 Data security protection level of the partner .(3) Enterprises follow the data security system , Carry out data security compliance assessment of key businesses on an annual basis and form an assessment report . Focus on evaluating the implementation of relevant systems and norms in business data processing activities 、 Allocation of data security protection measures . Realize the new online business 、 The evaluation of key stock businesses covers , When the business data processing mode changes, it should be dynamically tracked and evaluated .(4) Enterprises follow the data security system , Carry out the core data processing activity platform system data security compliance assessment on an annual basis and form an assessment report . Focus on evaluating the implementation of internal management measures 、 Configuration of data security protection measures of platform construction and operation Department and partners .
Refer to data security for more information
Xintong hospital Data infrastructure white paper 2019
Xintong hospital Research Report on data security technology and industrial development -2021 year
Xintong hospital Data security governance practice guide -1.0
Xintong hospital Research on data security risk analysis and Countermeasures -2022 year
Xintong hospital Database Development Research Report
边栏推荐
猜你喜欢
Effect of database index on write operation
Swift compiler performance
ECCV 2022 | 通过分析图像匹配解释深度伪造检测
QGraphicsView图形视图框架使用(六)图元动画
微信小程序如何实现底部弹出框封装
Practical exercise | partition MySQL tables with Navicat
从头开始构建,DeepMind新论文用伪代码详解Transformer
[MySQL] 20-how MySQL creates and manages super detailed summaries of tables
云XR平台支持沉浸式体验应用快速落地
基于JSP/SERVLET学生管理系统
随机推荐
无代码生产新模式探索
A 15-year-old ABAP veteran's suggestion: understanding these basic knowledge is beneficial to ABAP development
spark学习笔记(二)——IO(input&output)流(字节流、字符流、缓冲流)
BGP routing principles
防患于未然是最好的解决勒索软件方法
【php环境搭建/wamp/解释器/下载】
How to give selenium Chrome write extension intercepts or forwards requests
history. Go () and history back(),history. Go() do not refresh
中国经济网:“元宇宙”炙手可热
Spark Learning Notes (I) -- simulating distributed computing
Spark Learning Notes (Introduction) -- three ways for spark core to realize wordcount
From basic to advanced, 100 test and development interview questions are necessary for entering a large factory to raise salary
Research and application of the resource management framework of the world wide web of goods
互联网企业怎样保证自研系统的安全
lapsus盗取微软bing源代码的详细分析过程
浅析IM即时通讯开发移动端DNS域名劫持问题
解锁CNN和Transformer正确结合方法,字节跳动提出有效的下一代视觉Transformer
Ansible project best practices
Taishan Office Technology Lecture: which layer should the paragraph border be handled
Data type conversion in MySQL 8 | learning functions cast() and convert()