97¹ú¼Ê

¹¤³§ÑÐѧ Ø­ 97¹ú¼ÊÍøÂçÊý×Ö»¯ÖÇÄܹ¤³§¡°ºÚ¿Æ¼¼¡±´ó½ÒÃØ
Ô¤Ô¼Ö±²¥
ÀÖÏíÓªÒµ°ü¹Ü·þÎñ Ø­ ÊØ»¤Ò½ÁÆÓªÒµÒ»Á¬ÎȹÌ
Ô¤Ô¼Ö±²¥
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
²úÆ·
< ·µ»ØÖ÷²Ëµ¥
²úÆ·ÖÐÐÄ
²úÆ·
½â¾ö¼Æ»®
< ·µ»ØÖ÷²Ëµ¥
½â¾ö¼Æ»®ÖÐÐÄ
ÐÐÒµ
ºÏ×÷»ï°é
·µ»ØÖ÷²Ëµ¥
Ñ¡ÔñÇøÓò/ÓïÑÔ
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾ 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾

dzÎöÊý¾ÝÇå¾²·À»¤

±¾ÎÄÏÈÈÝÁËÊý¾ÝÇå¾²·À»¤µÄÅä¾°¡¢ËùÃæÁÙµÄÎÊÌâÒÔ¼°¶ÔÓ¦µÄÕ½ÂÔ £¬²¢ÏÈÈÝ97¹ú¼Ê²úÆ·ÔÚÊý¾ÝÇå¾²·½ÃæµÄ½â¾ö¼Æ»®¡£

  • 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾

    Ðû²¼Ê±¼ä£º2022-09-13

  • 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾

    µã»÷Á¿£º

  • 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾

    µãÔÞ£º

·ÖÏíÖÁ

97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾

ÎÒÏë̸ÂÛ

1 Êý¾ÝÇå¾²·À»¤µÄÅä¾°

Êý¾ÝÇå¾²·À»¤ £¬ÊÇָͨ¹ý½ÓÄÉÐëÒª²½·¥È·±£Êý¾Ý´¦ÓÚÓÐÓñ£»¤ºÍÕýµ±Ê¹ÓõÄ״̬ £¬ÒÔ¼°¾ß±¸°ü¹ÜÒ»Á¬Ç徲״̬µÄÄÜÁ¦¡£Êý¾ÝÇå¾²Ó¦°ü¹ÜÊý¾ÝÉú²ú¡¢´æ´¢¡¢´«Êä¡¢»á¼û¡¢Ê¹Óá¢Ïú»Ù¡¢¹ûÕæµÈÈ«Àú³ÌµÄÇå¾² £¬²¢°ü¹ÜÊý¾Ý´¦Öóͷ£Àú³ÌµÄ±£ÃÜÐÔ¡¢ÍêÕûÐÔ¡¢¿ÉÓÃÐÔ¡£
Ëæ×ÅÐÅÏ¢ÓëͨѶÊÖÒյķÉËÙÉú³¤ £¬´óÊý¾ÝÔçÒÑÉøÍ¸µ½¸÷Ðи÷Òµ £¬Íƶ¯È«ÇòÊý×Ö¾­¼ÃÅÉú³¤¡£“ÍòÎﻥÁª”ʱ´úÏ £¬Ã¿ÄêÈëÍø×°±¸ÊýÄ¿ÔÚÒ»Ö±ÔöÌí £¬ËæÖ®±¬·¢µÄÊý¾ÝÁ¿Ò²ÒÔ³¬ºõÏëÏóµÄËÙÂʳÊÖ¸ÊýÄ¿¼¶ÔöÌí¡£IDC Global DataSphere£¨2022£©Ö¸³ö £¬2021Äê £¬È«ÇòÊý¾Ý¹æÄ£µÖ´ïÁË¿ÕǰµÄ84.5 ZB £¬Ô¤¼Æµ½2026Äê £¬È«ÇòÊý¾Ý¹æÄ£×ÜÁ¿ÓÐÍûµÖ´ï221.2 ZB¡£Êý×Ö¾­¼Ã´øÀ´µÄÉú³¤Ê±»ú´ÙʹÊý¾Ý³ÉΪÇý¶¯¾­¼ÃÉú³¤µÄµÚÎå´óÉú²úÒªËØ¡£
È»¶ø £¬Êý¾Ý¾­¼Ã¸ßËÙÉú³¤Ò²Åãͬ×ÅÖî´ó¶¼¾ÝÇå¾²·À»¤ÎÊÌâ¡£½üÄêÀ´ £¬È«ÇòÊý¾ÝÇå¾²Íþв·ºÆð¶àÑù»¯Ç÷ÊÆ £¬ÖÖÖÖÊý¾Ýй¶¡¢ÍøÂç¹¥»÷¡¢¶ñÒâÈí¼þ¡¢Êý¾ÝÏúÊÛµÈÎÊÌâ²ã³ö²»Çî £¬¼«´óΣº¦µ½ÍøÂçÇå¾²ºÍÆóÒµÀûÒæ¡£“ûÓÐÍøÂçÇå¾²¾ÍûÓйú¼ÒÇå¾²” £¬Êý¾ÝÇå¾²·À»¤ÊÇÍøÂçÇå¾²µÄ»ù´¡ £¬Êǹú¼ÒÇå¾²µÄÖ÷Òª²¿·Ö £¬Êý¾ÝÇå¾²·À»¤ÎÊÌâÔÚÈ«Çò¹æÄ£ÄÚÒýÆðÁËÆÕ±é¹Ø×¢¡£

2 Êý¾ÝÇå¾²·À»¤ÃæÁÙµÄÎÊÌâ
½üÄêÀ´ £¬ÓÉÊý¾Ýй¶Òý·¢µÄÍøÂçÇå¾²ÎÊÌâÒѾ­³ÉΪÖ÷ÒªµÄÍøÂçÇ徲Σº¦Ö®Ò»¡£ForgeRockÔÚ¡¶2022 ForgeRock Consumer Identity Breach Report¡·ÖÐÖ¸³ö£º2021Äê £¬È«ÇòÓÐԼĪ20ÒÚÌõÏûºÄÕßÐÅÏ¢£¨°üÀ¨Óû§ÃûºÍÃÜÂ룩й¶ £¬±È2020ÄêÔöÌíÁË35%¡£IBMµÄ¡¶Cost of a Data Breach Report 2022¡·±¨¸æÒ²ÏÔʾ£º2022ÄêÈ«ÇòÊý¾Ý×ß©µÄƽ¾ù±¾Ç®µÖ´ï435ÍòÃÀÔª £¬½Ï2021ÄêͬÆÚÉÏÕÇÁË12.7% £¬Êý¾Ý×ß©¹æÄ£ºÍÊý¾Ýй¶ƽ¾ù±¾Ç®¾ù´´Àúʷиß¡£Áè¼Ý83%µÄÊÜ·ÃÆóÒµÌåÏÖËûÃÇÂÄÀú¹ý²»Ö¹Ò»´ÎµÄÊý¾Ýй¶ÎÊÌâ¡£±ðµÄ £¬¸Ã±¨¸æ»¹Ö¸³ö£ºÒ½ÁÆÐÐÒµÒ»Á¬12Äê¶¼ÊÇÊý¾Ýй¶±¾Ç®½Ï¸ßµÄÐÐÒµ £¬²¢ÇÒ»¹ÔÚ¿ìËÙÔöÌíÖС£2022ÄêÒ½ÁÆÐÐÒµÒòÊý¾Ýй¶±¬·¢µÄƽ¾ùÎ¥¹æ±¾Ç®½Ï2021ÄêÔöÌíÁ˽ü100ÍòÃÀÔª £¬µÖ´ï´´¼Í¼µÄ1010ÍòÃÀÔª¡£
³ý´ËÖ®Íâ £¬ÐÅÏ¢ÊÖÒյĿìËÙÉú³¤ £¬´ßÉú³öÐí¶àÐÂÐ͸߼¶µÄÍøÂç¹¥»÷ÊÖ¶Î £¬Ê¹µÃ¹Å°åµÄ¼ì²â¡¢·ÀÓùÊÖÒÕ̻¶³öÑÏÖØÈ±·¦ £¬ÎÞ·¨ÓÐÓõÖÓùÍâ½çµÄÈëÇÖ¹¥»÷¡£ÍøÂçÇå¾²½â¾ö¼Æ»®ÌṩÉÌCheck PointµÄ±¨¸æÏÔʾ£º2022ÄêµÚ¶þ¼¾¶ÈÈ«ÇòÍøÂç¹¥»÷´´ÀúÊ·ÐÂ¸ß £¬½Ï2021ÄêͬÆÚÔöÌíÁË32% £¬È«ÇòµÄÿ¸ö»ú¹¹Æ½¾ùÿÖÜÔâÓöµÄ¹¥»÷´ÎÊý¿É¸ßµÖ´ï1200´Î¡£×ÝÈ»ÓйŰåµÄ·À»ðǽ¡¢ÍøÂç·À²¡¶¾µÈ±»¶¯µÄÊý¾ÝÇå¾²·À»¤ÊÖ¶Î £¬ÈÔÓÐÁè¼Ý80%µÄ×°±¸ÖÁÉÙÔâÊܹýÒ»´ÎÍøÂç¹¥»÷¡£Ò»Ö±ÅÊÉýµÄÊý¾ÝÇå¾²·À»¤ÎÊÌâÒѳÉΪµ±½ñÈ«ÇòÍøÂçÇå¾²µÄ½¹µã¹Ø×¢µã £¬×è°­×ÅÊý×Ö¾­¼ÃµÄÎȲ½Éú³¤¡£

3 Êý¾ÝÇå¾²·À»¤µÄÕ½ÂÔ
ΪӦ¶Ô²ã³ö²»ÇîµÄÊý¾ÝÇå¾²·À»¤ÎÊÌâ £¬È«ÇòÖî¶àÕþ¸®¡¢ÆóÒµºÍÍøÂçÇ徲ר¼Ò¶¼ÔÚÆð¾¢Ó¦¶Ô²¢ÊµÑéÈ«·½Î»µÄÊý¾ÝÇå¾²·À»¤Õ½ÂÔ¡£
3.1   Õþ²ß²ãÃæµÄÊý¾ÝÇå¾²·À»¤Õ½ÂÔ
ÃÀ¹úÊÇÈ«Çò×îÏÈÆô¶¯´óÊý¾ÝÕ½ÂԵĹú¼Ò £¬²¢½«ÆäÉÏÉýµ½¹ú¼ÒÕ½ÂÔ²ãÃæ £¬Öƶ©ÁËһϵÁÐÕþ²ßϵͳÀ´È·±£Êý¾ÝÇå¾² £¬°üÀ¨¡¶ÍøÂç¿Õ¼ä¿ÉÐÅÈÎÉí·ÝµÄ¹ú¼ÒÕ½ÂÔ£¨The National Strategy for Trusted Identities in Cyberspace£©¡·¡¢¡¶¹ú·À²¿Êý¾ÝÕ½ÂÔ£¨DoD Data Strategy£©¡·µÈ¡£Å·ÃËΪȷ±£Äܹ»³ÉΪÊý¾Ýʱ´úµÄÁ캽Õß £¬ÔÚÊý¾ÝÇå¾²·À»¤·½Ãæ¹¹½¨ÁËÍêÉÆµÄÖ´·¨¿ò¼Ü £¬ÌáÉýÊý¾ÝÇå¾²·À»¤µÄ͸Ã÷¶È £¬Í¨¹ý¹¹½¨“·ºÅ·Êý¾ÝÊг¡”ʵÏÖÆäÊý¾ÝÕ½ÂÔ¡£½üÄêÀ´ £¬ÎÒ¹úÏà¼Ì³ǫ̈¶à²¿Êý¾ÝÇå¾²·À»¤Ïà¹ØµÄ·¨°¸ £¬°üÀ¨¡¶ÖлªÈËÃñ¹²ºÍ¹úÍøÂçÇå¾²·¨¡·¡¢¡¶ÖлªÈËÃñ¹²ºÍ¹úÃÜÂë·¨¡·¡¢¡¶ÖлªÈËÃñ¹²ºÍ¹úÊý¾ÝÇå¾²±£»¤·¨¡·ºÍ¡¶ÖлªÈËÃñ¹²ºÍ¹úСÎÒ˽¼ÒÐÅÏ¢±£»¤·¨¡·µÈ £¬¼«´óÍêÉÆÁËÔÚÊý¾ÝÇå¾²²ãÃæµÄ¹æÔòÖÆ¶ÈºÍ±ê׼ϵͳ £¬¶ÔÕþ¸®Êý¾Ý¡¢ÆóÒµÉÌÒµÉñÃØºÍСÎÒ˽¼ÒÐÅÏ¢µÄ±£»¤Æðµ½Á˾öÒéÐÔµÄ×÷Óá£
3.2   ÊÖÒÕ²ãÃæµÄÊý¾ÝÇå¾²·À»¤Õ½ÂÔ
3.2.1  ·À»ðǽÊÖÒÕ
·À»ðǽÊÇÇ徲ϵͳÖеijõʼÇå¾²²ã £¬°²ÅÅÔÚÍøÂç½çÏß £¬¶ÔÊÕÖ§ÍøÂç½çÏßµÄÊý¾Ý¾ÙÐзÀ»¤ £¬±ÜÃâδ¾­ÊÚȨµÄÓû§»òÐÅÏ¢½øÈëÄÚ²¿ÍøÂç £¬°ü¹ÜÁËÍøÂçÊý¾ÝµÄÇå¾²¡£·À»ðǽÊÖÒÕÊÇÒ»ÖÖÓÐÓõÄÍøÂçÇå¾²»úÖÆ £¬·À»ðǽ²úÆ·ÄÚÖõķÀ»ðǽÊÖÒտɶÔÄÚ²¿ÍøÂç¾ÙÐл®·Ö £¬ÊµÏÖÄÚ²¿ÍøÂçÍø¶Î¸ôÀë £¬±ÜÃâ¾Ö²¿µÄÍøÂçÇå¾²ÎÊÌâ¶ÔÈ«¾ÖÍøÂ籬·¢Ó°Ïì £¬²¢ÇÒ°ü¹ÜÍø¶Î×ÔÁ¦ £¬ÃâÊÜÄÚ²¿Íø¶Î¹¥»÷ £¬Æðµ½Êý¾ÝÇå¾²·À»¤×÷Óá£
Ëæ×ÅÐÅÏ¢»¯Çå¾²ÎÊÌâÈÕÒæÖØ´ó £¬¹Å°åµÄ»ùÓڶ˿ھÙÐÐÓ¦ÓÃʶ±ðºÍ»á¼û¿ØÖƵķÀ»ðǽÊÖÒÕÒÑÔ¶Ô¶ÎÞ·¨Öª×ãÐÂÐÎÊÆÏµÄÊý¾ÝÇå¾²·À»¤ÐèÇó¡£´ó×ÚÍøÂçÇå¾²¹¦Ð§µÄÄÚÖÃÒÔ¼°Çå¾²²úÆ·×Ô¶¯¼¯³É»¯ £¬´ÙʹÏÂÒ»´ú·À»ðǽ³¯×ÅÍøÂçÇ徲ƽ̨µÄÆ«ÏòÉú³¤¡£97¹ú¼ÊÍøÂç˳ӦÊý¾ÝÇå¾²·À»¤ÐèÇóµÄת±ä £¬ÍƳöÁË97¹ú¼ÊÍøÂçÐÂÒ»´úZϵÁзÀ»ðǽ¡£¸ÃϵÁзÀ»ðǽ²úÆ·ÄÚÖÃÁËIPS£¨Intrusion Prevention System £¬ÈëÇÖ¼ì²âϵͳ£©ÌØÕ÷¿â £¬ÔÚ×°±¸ÊÕµ½Êý¾Ý±¨ÎÄʱ £¬°Ñ¸Ã±¨Îĵį«Ïò¡¢Ô´µØÖ·¡¢Ä¿µÄµØÖ·¡¢Ð­ÒéµÈÐÅÏ¢ºÍÓû§ÉèÖõÄÇå¾²Õ½ÂÔÆ¥Åä £¬¾öÒéÊÇ·ñ½¨ÉèÊý¾ÝÁ÷ÒÔ¼°Í¨¹ýµÄÊý¾ÝÀàÐÍ¡¢Êý¾ÝÊÕÖ§µÄλÖõÈÐÅÏ¢¡£ÔÚÓû§Î´ÉèÖÃÇå¾²Õ½ÂÔµÄÇéÐÎÏ £¬97¹ú¼Ê·À»ðǽϵͳ»áĬÈÏÒ»ÌõÈ«anyեȡµÄÕ½ÂÔ £¬Õ¥È¡ËùÓÐÊý¾Ý°üͨ¹ý×°±¸¡£ÁíÍâ £¬¸ÃϵÁзÀ»ðǽ²úÆ·»á¶Ô¾­ÓɵÄÁ÷Á¿¾ÙÐÐʵʱµÄÉî¶È¼ì²â £¬Ê¶±ðÁ÷Á¿ÖÐÒþ²ØµÄ¶ñÒâÐÅÏ¢ £¬ÊµÏÖʵʱ¸æ¾¯¡¢×è¶Ï £¬È·±£Óû§Êý¾Ý²»ÊÜÍþв £¬Æðµ½Êý¾ÝÇå¾²·À»¤µÄ×÷Óá£
ͼ3-1 RG-WALL 1600-Z5100ÐÂÒ»´úZϵÁÐÆóÒµ¼¶·À»ðǽ
 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
     
3.2.2  ¶àÒòËØÈÏÖ¤ÊÖÒÕ
MFA£¨Multi-factor authentication £¬¶àÖ÷ÒªËØÑéÖ¤£© £¬ÓÖ³ÆÎª¶àÒò×ÓÈÏÖ¤¡¢¶àÒòËØÑéÖ¤¡¢¶àÒòËØÈÏÖ¤ £¬ÊÇÒ»ÖÖ×°±¸»á¼û¿ØÖƵÄÒªÁì £¬Óû§ÒªÍ¨¹ý¶àÖÖÈÏÖ¤»úÖÆ £¬²Å»ª»ñµÃÊÚȨ»á¼ûij×ÊÔ´ £¬ÈçÓ¦ÓóÌÐò¡¢ÔÚÏßÕË»§¡¢VPN£¨Virtual Private Network £¬ÐéÄâרÓÃÍøÂ磩µÈ¡£MFAÊÇIAM£¨Identity and Access Management £¬Éí·Ýʶ±ðÓë»á¼û¹ÜÀí£©Õ½ÂԵĽ¹µã×é³É²¿·Ö £¬ÆäÖ÷ÒªµÄÓÅÊÆÊÇÏÞÖÆÑéÖ¤ÒòËØ²»µ«½öÊÇÓû§ÃûºÍÃÜÂë £¬»¹ÐèÒªÌØÁíÍâÑéÖ¤ÒòËØ £¬ÈçÖ¸ÎÆ¡¢ÊÚȨÂëµÈ £¬Õ⼫ºéÁ÷ƽÉϽµµÍÁËÊý¾Ýй¶µÄΣº¦ £¬Æðµ½Êý¾ÝÇå¾²·À»¤×÷Óá£
97¹ú¼ÊÍøÂçµÄRG-SMP+Çå¾²¹ÜÀíÆ½Ì¨ÊÇ97¹ú¼ÊÐÂÒ»´úµÄÖÕ¶ËÇå¾²ÖÇÄÜ×¼ÈëÓëÉí·ÝÇå¾²ÖÇÄÜ×¼ÈëÆ½Ì¨¡£Ê¹ÓöàÒòËØÈÏÖ¤ÊÖÒÕ £¬ÔÚ802.1xÈÏÖ¤¡¢WebÈÏÖ¤¡¢¶ÌÐÅÈÏÖ¤µÈ¹Å°åÈÏÖ¤·½·¨»ù´¡ÉÏ £¬ÒýÈëOauthʵÃûÈÏÖ¤¡¢¶þάÂëÈÏÖ¤¡¢ÊÚȨÂëÈÏÖ¤¡¢ÃâÈÏÖ¤µÈ·½·¨ £¬Í¬Ê±»¹ÔöÌíÁËÖ±½ÓÓë×°±¸Ö®¼ä½ÓÄÉSNMP£¨Simple Network Management Protocol £¬¼òÆÓÍøÂç¹ÜÀíЭÒ飩»òTelnetµÈÊÖÒÕÏ·¢×¼Èë¿ØÖÆÏÂÁî £¬ÊµÏÖ¶ÔÓû§Êý¾ÝÇå¾²¾ÙÐÐʵʱ·À»¤¡£
ͼ3-2 RG-SMP+Çå¾²¹ÜÀíÆ½Ì¨
 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
     
3.2.3  Ãô¸ÐÊý¾ÝÍÑÃôÊÖÒÕ
Ãô¸ÐÊý¾ÝÓÖ³ÆÎªÐ¡ÎÒ˽¼ÒÒþ˽Êý¾Ý £¬³£¼ûµÄÃô¸ÐÊý¾ÝÓÐÐÕÃû¡¢Éí·ÝÖ¤ºÅ¡¢ÒøÐÐÕ˺š¢Ò½ÁÆÐÅÏ¢µÈ¡£ÕâÀàÓëСÎÒ˽¼ÒÉúÑÄ¡¢ÊÂÇéϢϢÏà¹ØµÄÊý¾ÝÊܵ½²î±ðÌõÀíµÄÊý¾ÝÒþ˽¹æÔòµÄ¹ÜÖÆ £¬ÈôÊÇÎÞ·¨°ü¹ÜÕâÀàÊý¾ÝµÄÒþ˽ÐÔ £¬ÆóÒµ»òÕþ¸®ÔÚÓû§ÐÅÈη½Ã潫»áÊܵ½¼«´óµÄÖÊÒÉ¡£
Êý¾ÝÍÑÃôÊÖÒÕÊÇÃô¸ÐÊý¾ÝÇå¾²·À»¤µÄÒ»¸öÖ÷ÒªÐж¯¡£Êý¾ÝÍÑÃô £¬¼´Êý¾ÝÈ¥Òþ˽»¯ £¬ÊÇָͨ¹ý¼È¶¨µÄÍÑÃô¹æÔòºÍÍÑÃôÕ½ÂÔ £¬¶ÔijЩÃô¸ÐÐÅÏ¢¾ÙÐÐÊý¾ÝµÄת»»»òÐÞ¸Ä £¬ÊµÏÖÃô¸ÐÒþ˽Êý¾ÝÇå¾²·À»¤µÄÒ»ÖÖÊÖÒÕÊֶΡ£Êý¾ÝÍÑÃô¿ÉÊÊÓÃÓÚ¾ø´ó²¿·ÖÐèÒªÓë·ÇÉú²úÓû§¹²ÏíÉñÃØ»òÊÜî¿ÏµµÄÊý¾ÝµÄÇéÐÎ £¬ÕâÀàÓû§¿ÉÄܰüÀ¨ÆóÒµÄÚ²¿Ô±¹¤¡¢ÍⲿӪҵºÏ×÷»ï°éµÈ¡£Êý¾ÝÍÑÃôÊÖÒÕ¿É·ÖΪÁ½ÖÖ£º
¡ñSDM£¨Static Data Masking £¬¾²Ì¬Êý¾ÝÍÑÃô£©
SDMÊÖÒÕͨ¹ý½¨ÉèÊý¾Ý¸±±¾¾ÙÐÐÊý¾ÝÍÑÃôºó·Ö·¢ÖÁÖ¸¶¨Óû§ £¬Ê¹ÍÑÃôºóµÄÊý¾ÝÓëÉú²úÇéÐθôÀë £¬ÔÚÖª×ãÓªÒµÐèÇóµÄͬʱÆðµ½ÁËÊý¾ÝÇå¾²·À»¤µÄ×÷Óá£
¡ñDDM£¨Dynamic Data Masking £¬¶¯Ì¬Êý¾ÝÍÑÃô£©
DDMÊÖÒÕÖ÷ÒªÔÚÉú²úÇéÐÎÖоͶÔÃô¸ÐÊý¾Ý¾ÙÐÐʵʱÍÑÃô £¬²¢ÇÒÐèҪƾ֤²î±ðµÄÐèÇó¾ÙÐвî±ðˮƽµÄÍÑÃô¡£Êý¾ÝÍÑÃôÀú³ÌÖпÉÄÜÉæ¼°¶ÔÊý¾Ý¾ÙÐмÓÃÜ¡¢¼ÓÈÅ¡¢ÌÞ³ý¡¢¸³Ëæ»úÖµµÈ·½·¨¾ÙÐÐÃô¸ÐÊý¾ÝÇå¾²·À»¤ £¬È·±£Êý¾ÝÔÚ´«ÊäʹÓÃÀú³ÌÖеÄÒþ˽Çå¾²ÐÔ¡£
½üÄêÀ´ £¬ÎÒ¹úÖÂÁ¦ÓڿƽÌÐ˹úÕ½ÂԵݲÅÅ´ÙʹÐÅÏ¢ÊÖÒÕÔÚ¸ßУÖлñµÃ³ä·ÖµÄʹÓà £¬¸ßÐ£Ð£Ô°ÍøµÄ½¨É轫ÁãÐǵÄ×ÊÔ´¾ÙÐÐÕûºÏºÍ¹²Ïí £¬Í»ÆÆ×ÊÔ´µØÀí»®·ÖÉϵÄÏÞÖÆ £¬½â¾öÐÅÏ¢¹ÂµºÎÊÌâ¡£ÐèÒª×¢ÖØµÄÊÇ £¬ÔÚ¸ßУÖÇ»ÛУ԰½¨ÉèÖб£´æ´ó×ÚµÄÃô¸ÐÊý¾Ý £¬Éæ¼°¸ßУְԱµÄÐÕÃû¡¢Éí·ÝÖ¤ºÅÂë¡¢ÕË»§ÃÜÂëµÈ £¬ÕâÀàÃô¸ÐÊý¾ÝÔÚÈö²¥Àú³ÌÖоÍÐèÒª¶ÔÆä¾ÙÐÐÊý¾ÝÍÑÃô £¬°ü¹ÜÓû§Ð¡ÎÒ˽¼ÒÒþ˽Çå¾²¡£97¹ú¼ÊÍøÂçÔÚ¸ßУÖÇ»ÛУ԰½¨Éè·½Ãæ½¨Ê÷ÆÄ·á £¬ÆìÏÂÖÇ»ÛУ԰¹¤ÒµµÄµ×²ã½¹µãƽ̨——ÖÇ»ÛÉí·ÝÈÏ֤ƽ̨£¨RG-Source ID£© £¬¼¯³ÉÖÖÖÖÖ°Ô±¹ÜÀí¡¢¶àÖÖÉí·ÝÈÏÖ¤¡¢¶àÈë¿Úµ¥µãµÇ¼¡¢Éí·Ý±êÇ©¹ÜÀíµÈ³¡¾°¹¦Ð§ £¬Ö±»÷µ±ÏÂÃô¸ÐÊý¾ÝÇ徲ʹµã £¬ÄÚÖÿÉÊÓ»¯È«¶¯Ì¬Êý¾ÝÍÑÃô¼ÓÃܹ¤¾ß £¬Õë¶Ô²î±ðµÄÓû§ÐèÇóʵÏÖ²î±ðˮƽµÄÍÑÃôÉèÖà £¬²¢ÇÒ²»ÆÆËðµ×²ãÊý¾Ý¼äµÄ¹ØÏµ £¬ÊµÏÖÃô¸ÐÊý¾ÝÇå¾²·À»¤¹¦Ð§¡£

4 ½áÂÛ
×ÛÉÏËùÊö £¬ÃæÁÙÈÕÐÂÔÂÒìµÄÊÖÒÕת±ä £¬ÔÚ¹ú¼ÒÕþ²ßºÍСÎÒ˽¼ÒÈ¨ÒæµÄË«ÖØÇý¶¯Ï £¬Êý¾ÝÇå¾²·À»¤µÄÖ÷ÒªÐÔ½ûÖ¹ºöÊÓ¡£Êý¾ÝÇå¾²·À»¤ÊÖÒÕÔÚ¿ìËÙµü´úµÄͬʱ £¬ÆäÉú³¤Ç÷ÊÆÒ²ÔںϹæµÄ»ù´¡ÉÏ £¬¾ÙÐжàÒòËØÈÚºÏ £¬½«Êý¾ÝÇå¾²·À»¤Âäʵµ½²úÆ·¡¢ÓªÒµÓë·þÎñ¡£ÐÂÐ˿Ƽ¼¸³ÄÜÊý¾ÝÇå¾² £¬ÖúÁ¦È«ÉúÃüÖÜÆÚµÄÊý¾ÝÇå¾²·À»¤ÏµÍ³µÄ½¨Éè £¬°ü¹Ü¹ú¼ÒÓëÆóÒµµÄÊý×Ö»¯×ªÐÍ £¬ÊµÏÖÊý¾ÝÇå¾²Ò»Á¬¡¢ÓÐÓõķÀ»¤¡£

5 ²Î¿¼ÎÄÏ×
¡ñ¡¶ÍøÂç¹¥»÷Ç÷ÊÆ£º2022ÄêÄêÖб¨¸æ¡·2022£ºCheck Point
¡ñ¡¶Worldwide IDC Global DataSphere Forecast, 2022-2026¡·2022:IDC
¡ñ¡¶Cost of a Data Breach Report 2022¡·2022: IBM
¡ñ¡¶2022 ForgeRock Consumer Identity Breach Report¡·2022: ForgeRock
¡ñ¡¶Êý¾ÝÇå¾²ÖÎÀí°×ƤÊé 4.0¡·2022£ºÖйشåÍøÂçÇå¾²ÓëÐÅÏ¢»¯¹¤ÒµÍ¬ÃË £¬Êý¾ÝÇå¾²ÖÎÀíרҵίԱ»á
 

Ïà¹Ø±êÇ©£º

97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾ 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾

µãÔÞ

¸ü¶àÊÖÒÕ²©ÎÄ

ÈκÎÐèÒª £¬ÇëÁªÏµ97¹ú¼Ê

97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾ 97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾

·µ»Ø¶¥²¿

ÊÕÆð
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
ÎĵµÆÀ¼Û
¸Ã×ÊÁÏÊÇ·ñ½â¾öÁËÄúµÄÎÊÌ⣿
Äú¶ÔÄ¿½ñÒ³ÃæµÄÖª×ã¶ÈÔõÑù£¿
²»Õ¦µÎ
ºÜÊǺÃ
ÄúÖª×ãµÄÔµ¹ÊÔ­ÓÉÊÇ£¨¶àÑ¡£©£¿
Äú²»Öª×ãµÄÔµ¹ÊÔ­ÓÉÊÇ£¨¶àÑ¡£©£¿
ÄúÊÇ·ñÉÐÓÐÆäËûÎÊÌâ»ò½¨Ò飿
ΪÁË¿ìËÙ½â¾ö²¢»Ø¸´ÄúµÄÎÊÌâ £¬Äú¿ÉÒÔÁôÏÂÁªÏµ·½·¨
ÓÊÏä
ÊÖ»úºÅ
ллÄúµÄ·´À¡£¡
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
97¹ú¼Ê¡¤(ÖйúÇø)¼¯ÍŹٷ½ÍøÕ¾
ÇëÑ¡Ôñ·þÎñÏîÄ¿
¹Ø±Õ×Éѯҳ
ÊÛǰ×Éѯ ÊÛǰ×Éѯ
ÊÛǰ×Éѯ
ÊÛºó·þÎñ ÊÛºó·þÎñ
ÊÛºó·þÎñ
Òâ¼û·´Ïì Òâ¼û·´Ïì
Òâ¼û·´Ïì
¸ü¶àÁªÏµ·½·¨
ÍøÕ¾µØÍ¼