Changtai Data Security Governance Platform (CT-DSSA) is a data security protection and management platform product based on data access behavior analysis。The system centrally processes the information collected by database audit, database firewall, data encryption, data desensitization and other data security products,A variety of heterogeneous data is normalized,The correlation analysis was carried out,Dynamic display of data asset distribution and sensitive data access behavior,And predict the risk of data asset exposure。Restore and present to customers a clear, transparent, and controllable picture of data asset distribution and access behavior。
Product function
Data distribution analysis
Count the number of databases, identify sensitive databases and their number, number of tables, number of sensitive tables, number of fields, number of sensitive fields, sensitive data categories, etc。
Displays the static distribution and dynamic access of sensitive data, and displays the data distribution and actual access conditions in TOP10 mode based on different dimensions, such as the TOP10 sensitive tables with the most visits and the TOP10 sensitive tables with the most visits。
Data flow analysis
Statistics such as total data access, sensitive data visits, total requests, users and applications。
Displays TOP10 applications with the most sensitive data traffic, TOP10 data types with the most sensitive data traffic, TOP10 users with the most sensitive data traffic, TOP10IP with the most sensitive data traffic, and sensitive data flow maps。The real flow of data can be shown through an intuitive data flow map。
User behavior analysis
Collect basic user information, such as the latest active time, number of applications, total accessed data, and IP address used。
Displays the sensitive data access status of a user, including the distribution of the types of sensitive data accessed, the trend of the amount of sensitive data accessed, and the access popularity of sensitive data。
User trace tracing
It can track the associated information of database users, clients, applications, accessed databases, and operation behaviors, and intuitively display the complete behavior information of users accessing data。All access behavior information and details of the user are tracked through a multi-layer presentation。
Data traceability
Based on the leaked data,You can paste the leaked data directly,You can also text import leaked data according to key fields,Can trace back suspicious IP or user names,You can add traceback qualifications for database users, source IP addresses, database names, time, and so on,The more detailed the qualification, the more specific it becomes,The more accurate the backtracking results are。