当前位置:网站首页>Tencent cloud commercial password compliance solution appears at the 2021 high-end Seminar on commercial password application innovation
Tencent cloud commercial password compliance solution appears at the 2021 high-end Seminar on commercial password application innovation
2022-06-23 21:34:00 【Tencent security】
With global big data 、 Cloud computing 、 Internet 、 The development of information technology such as the Internet of things , Commercial password products are becoming more and more popular , Password application is also deepening and expanding . However , Ensure the security of encryption policy , Detailed strategic planning for data encryption is required .
12 month 18 Japan ,2021 The high-end Seminar on commercial password application innovation was held , With the code “ Integrate into the new era 、 Enabling new developments ” The theme of , Focus on the presentation of China's commercial cryptography theory 、 technology 、 product 、 service 、 Application and other latest achievements , Jointly explore the future development of password industry . Xie can, senior researcher of Tencent security Yunding laboratory, attended the sub forum of the high-end Seminar on commercial password application innovation of the conference , And made 《 Tencent cloud business secret technology research and industry integration practice 》 Share the theme of .
Around the contradiction between data security compliance requirements and performance , Xie can analyzed the three core challenges faced by the current enterprise data security management , And Tencent cloud's best practices in dealing with data protection security compliance issues .
The present , Data has become a core factor of production , Industry 、 The digitization of government affairs has accelerated , Let the traditional industry find a new development engine , But at the same time , Data security is also on the agenda . Especially in some important information systems involving the national economy and the people's livelihood and basic information resources 、 Important industrial control systems 、 Social service oriented government information system and other fields , Data security is particularly important .
Under the traditional commercial password encryption scheme , Enterprises and institutions usually face several major pain points , One is the high development threshold 、 The implementation cycle is long ; Second, it is difficult to balance the relationship between data security and business performance ; Third, there is a lack of professional password talents , Lead to development 、 Management and operation and maintenance are stretched .
According to the needs and pain points in the process of practical application , Tencent Yunding laboratory has accumulated many years of data security management practice and technical capacity , Launch a one-stop commercial password compliance solution , Help finance and other key industries to reduce costs 、 Efficiently achieve application system password compliance .
In the specific scheme design , From the bottom 、 Middle level 、 The upper layer has a clear hierarchy , The underlying hardware is highly available 、 High performance hardware password resource pool service , The middle driver provides authentication and password services 、 Terminal password service 、 Network and communication security services 、 Data storage security services 、 Manage and configure security services 、 Compliance password scheme consulting service , The upper application interface is supported by an efficient and intensive cipher middle platform , Provide complete cloud product ecological integration and data security services and encryption on demand API/SDK service . Open up the upstream and downstream links of the business secret password service industrial chain , Build a model that can be applied to finance 、 Application of wisdom 、 Integrated security service capability support platform for city code and other scenes .
Compared with the traditional commercial cipher scheme , The scheme has several major features :
One 、 Password as a service . Provide encryption free database , High performance scenario support , Minimal impact on database performance ; Unified access API/SDK, Reduce development costs ;
Two 、 Fusion architecture . Build a native compliance application architecture based on the compliance password service platform , brace “ Internet + industry ” Business
3、 ... and 、 Authors efficiency . Programme , Unified control , Dynamic extension , Improve the utilization of password infrastructure resources , Reduce maintenance costs ; Compliance , Combined with password ecology 、 Business Ecology , Minimize business transformation and compliance costs .
Four 、 Ecological protection . Cover secret assessment agencies 、 Password rectification organization 、 Innovative password products 、 Tencent application ecology 、 Software 、 Security integration developer ecosystem ;
In particular, it is worth mentioning that Tencent's proprietary cloud has passed the security assessment of commercial password applications with high scores by virtue of Tencent's secure one-stop commercial password compliance solution . In the face of high compliance costs 、 Inadequate security capabilities 、 The industry lacks mature transformation experience and various compatibility requirements , Tencent's proprietary cloud platform only 3 The transformation will be completed in three months , And the highest score in the cloud platform industry 85.84 Pass the secret evaluation .
at present , Tencent's commercial password compliance solution has been applied to the proprietary cloud TCE、 TenPay 、、 Enterprise WeChat 、 Health code 、WeCity、 Collaborative office and other industries ,“ Password as a service ” The way , It has been recognized by many industry customers and authoritative institutions .
边栏推荐
- Coding website hosting migration Tencent cloud cloud development webify
- Does FTP meet managed file transfer (MFT) requirements?
- 【Redis】有序集合的交集与并集
- This article introduces you to the necessity of database connection pooling
- . NET Core . NET Framework
- Aiot application innovation competition - get better code completion and jump experience with clion
- JS remove tabs and line breaks
- Go local variables & global variables
- How to make a label for an electric fan
- The printed picture is dark. It will make you clear in seconds
猜你喜欢

I am 30 years old, no longer young, and have nothing

发现一个大佬云集的宝藏硕博社群!

Four aspects of PMO Department value assessment

Uncover the secrets of Huawei cloud enterprise redis issue 16: acid'true' transactions beyond open source redis

How to view the role of PMO in agile organizations?

Steps for formulating the project PMO strategic plan
Application of JDBC in performance test

Lightweight, dynamic and smooth listening, hero earphone hands-on experience, can really create

What are the main dimensions of PMO performance appraisal?

How PMO uses two dimensions for performance appraisal
随机推荐
Full text search of MySQL
Retrofit magic, reject duplicate code!
Xgboost implements text classification and sklearn NLP library tfidfvectorizer
Initial experience of nodejs express framework
Is it safe to open an online securities account or to go to the business department
手机卡开户的流程是什么?在线开户安全么?
2021-12-25: given a string s consisting only of 0 and 1, assume that the subscript is from
Steps for formulating the project PMO strategic plan
Talk about how to customize data desensitization
What are the main dimensions of PMO performance appraisal?
. Net Core . Net FrameWork . Net 5
Global and Chinese market of roll up piano 2022-2028: Research Report on technology, participants, trends, market size and share
同花顺股票开户是安全的吗?
Cloud database smooth disassembly scheme
How to view the role of PMO in agile organizations?
Full instructions for databinding
SAP retail uses transaction code wb03 to display a factory configured in the background
How does PMO select and train project managers?
2021 three "myths" of science and technology industry -- yuancosmos, NFT and web 3
Wechat is new. You can create applications from Excel