laitimes

Brain holes! Admiral Five Tigers has encountered the problem of data security How to break?

author:A new reference for science and technology

"Five", Chinese prefer the numbers: Wugu Fengdeng, Wufu Linmen, Wuxing Bagua, Wuyue Famous Mountain... Therefore, when sealing officials and worshiping generals, they also like to use five characters. For example, the Five Tiger Generals in "Romance of the Three Kingdoms". "Water Margin" Liangshan Five Tigers, "Sui and Tang Dynasty" Wagang Five Tigers, to the 80s TVB Five Tigers...

Among them, the most popular are the five tiger generals under Liu Bei: Guan Yu, Zhang Fei, Zhao Yun, Ma Chao, and Huang Zhong.

Brain holes! Admiral Five Tigers has encountered the problem of data security How to break?

Recently, Qianxin released the Data Guard Suite, which includes a data security situational awareness operation center, and four capabilities of privilege guard, permission guard, API guard, and privacy guard, referred to as "one center and four guards", a total of five products.

If the Five Tigers travel to modern times and become CIO and CSO, how should they choose the corresponding data security products? Let's just think about it.

Guan Yu: "Insightful" data security situational awareness operation center

Guan Yu, the head of the Five Tiger Generals. Since Lü Bu's death, Guan Yu has seen that everyone is "inserting a sign and selling the first ear".

Brain holes! Admiral Five Tigers has encountered the problem of data security How to break?

Not to mention that Guan Yu in the interpretation, Wen Jiu beheaded HuaXiong, cut off Yan Liang, cut off six generals, Hua Rong Daoyi explained Cao Cao, it is said that in the history of Zheng, Guan Yu created the only one in three histories.

The only one who beheaded the commander of the enemy army in the Ten Thousand Horses Army. The Chronicle of the Three Kingdoms records: "Yu saw the good and the good, and the spur was good among the multitudes, and beheaded him, and the generals could not be the ones." ”

The only warrior known as "Wei Zhen Huaxia". Attacking Fancheng, flooding the Seventh Army, capturing bans and beheading Pound, frightened Cao Cao into preparing to move the capital. With the strength of one person, resisting the elite of Wei and Wu, it is difficult to find in ancient and modern times.

The only god worshipped by the Buddha, the Tao, and the Confucians. Guan Yu was given many honorific titles by his descendants: "Guan Di", "Guan Sheng", "Wu Sheng", "Guan Sheng Emperor Jun" and so on.

For a Jingzhou lord like Guan Yu, what kind of security products do you need most? In the Data Guard five-piece set, the Data Security Situational Awareness Operations Center is the best fit for him.

Safety is not only a victory or defeat of attack and defense, but a continuous process. Even if you win 99 times, if you lose once, you may lose everything and lose nothing. For enterprises and institutions, the common point is that "the continuous state of data security is difficult to maintain", and the risk cannot be fully insightful, and security is often hindsight and after-the-fact remediation.

The data security situational awareness operation center takes data asset discovery as the premise, classification and grading as the means, audit and monitoring as the basis, and continuous risk management as the core, forming a safe closed-loop process for timely detection of abnormalities and rapid response and disposal.

If Guan Yu had such a situational awareness operation center, while attacking Cao Jun, he had a full understanding of the security risks and situations of Jiangling and the public security in the rear, and could quickly detect the suspicious behavior of Lü Mengbai crossing the river, quickly call the police, and respond to it, and formulate countermeasures in a timely manner (early return to defense or retreat to Chengdu), there would be no passive situation of defeating Maicheng and being captured by Wu Jun.

Fei Zhang: Guardian of authority based on Zero Trust architecture

Zhang Fei, the second of the Five Tiger Generals. The Chronicle of the Three Kingdoms commented: "Fei Xiong is majestic and mighty, less than Guan Yu". Wei Mouchen Cheng Yu and other xian xian called Yu and fei wanren enemies also. In the main history, when Liu Bei was defeated at Changshanpo, Zhang Fei only led twenty horses to break, according to the Loud Drink at Dangyang Bridge, no one in Cao's army dared to approach, so Liu Bei was saved from difficulties. After Liu Bei entered Shu, Zhang Feiyi released Yan Yan, and defeated Zhang Gao at the Battle of Hanzhong, making countless contributions.

In "Yanyi", Zhang Fei is the only fierce man who fights with Lü Bu above Lily, and also defeats Cao Jun's martial force ceiling Xu Chu several times, and more than ten he kills Ji Ling, the chief general of Yuan Shu, who was once tied with Guan Yu... Guan Yu commented, "Brother Zhang Yide, take the first rank of general in the million army, such as probing the bag to take the ear!"

However, Zhang Fei respected gentlemen but never showed compassion for soldiers, and Liu Bei often warned Zhang Fei: "You often whip Jian'er, but then you let them serve around you, which is the way to take trouble." Sure enough, before Zhang Fei was sent to the army, he was murdered by his generals Zhang Da and Fan Jiang, and Zhang Fei's head was sent to Sun Quan.

Brain holes! Admiral Five Tigers has encountered the problem of data security How to break?

As the saying goes, a thief is hard to defend. A joint security survey by agencies such as the FBI and CSI shows that more than 85 percent of security threats come from within, far outweighing the damage caused by hacker attacks and viruses. The media has reported that the former cisco programmer left the library and ran away, with a loss of more than 16 million. Undoubtedly, Zhang Fei most needs permission guard products based on zero trust architecture.

Authority Defender focuses on access rights and carries out refined access control at the access level; at the same time, based on continuous trust assessment, the access rights are dynamically adjusted, "clarifying who is in what department, where, what tasks, and what fields in what data are accessed", so as to achieve "credible subject identity, behavior and operation compliance, and effective protection of computing environment and data entities" to ensure safe access to data.

If Zhang Fei has a guardian of authority, he can dynamically grant credit to his subordinates Zhang Da, Fan Jiang, etc., and re-evaluate their loyalty and reliability after just flogging the other party, he will not easily let them into the bedroom while sleeping, resulting in a generation of famous generals, so that the nest will die.

Zhao Yun: A privacy defender who pursues compliance and business balance

Zhao Yun, One Lü Two Zhao Three DianWei. Martial arts is second only to Lü Bu, loyal and unmatched, brave and strategic, whether it is film and television dramas, or games, is the most popular martial artist, almost perfect existence. Changsaka Po seven in and seven out, twice sacrificed his life to save Ah Dou, and the Battle of Hanshui saved Huang Zhong, which made Zhang Gao and Xu Huang terrified.

Brain holes! Admiral Five Tigers has encountered the problem of data security How to break?

Due to his high martial arts and bravery, Zhao Yun often acts as a personal bodyguard. When Liu Bei went to Eastern Wu to marry Sun Shangxiang, and when Zhuge Liang went to Chaisang to pay tribute to Zhou Yu, Zhao Yun served as a personal bodyguard. It can be said that Zhao Yun is the "sense of security" of Liu Bei, Zhuge Liang, Liu Chan and even Gongsun Zhan.

The most suitable data security suite for Zhao Yun's identity is naturally the Qianxin Privacy Guard System (hereinafter referred to as "Privacy Guard"). Privacy Guard is a privacy compliance detection and analysis for Android Apps, iOS Apps, Mini Programs, and IoT devices, providing a collaborative platform for corporate legal, R&D, product, security and other roles, assisting in discovering privacy and security risks through technical means, and avoiding the resulting risks of data leakage, asset loss, and regulatory penalties.

"Like is wanton, love is restraint." Compared with Guan Yu's pride and Zhang Fei's recklessness, Zhao Yun has more composure and self-discipline, and is the spokesman for "security". For enterprises, privacy guard is the "sense of security" to ensure compliance, and for individuals, privacy guard adds a layer of protection to avoid personal information leakage.

Ma Chao: Api Guard against foreign enemies

Ma Chao, after the Han Fubo general Ma Yuan, was the only military general of the Shu Han Dynasty with aristocratic blood. His image of being brave and good at war is deeply rooted in the hearts of the people, and as one of the five tiger generals of the Shu Han Dynasty, he is brave and invincible. Cao Cao, who had fought, abandoned his robe at Tongguan, seized the ship to avoid arrows in Weishui, Zhang Gao, Yu Ban, Cao Hong, and others were all defeated generals, and Cao Cao called him "the courage of Lü Bu" without diminishing Lü Bu.

Brain holes! Admiral Five Tigers has encountered the problem of data security How to break?

Ma Chao has the blood of the Qiang people, and is very prestigious among the Qiang people, and is regarded as the "General of The Divine Power". Zhuge Liang once commented on Ma Chao, saying that the Qiang people regarded Ma Chao as a god. With Ma Chao's town guard, the Qiang people did not say that they were attacking the Shu Han border, and even this thought did not dare to move. It can be seen that Ma Chao played an important role in Shu Han.

The most suitable for Ma Chao is the Qianxin API Guard. As a data connection tool, APIs should have extensive access to a large number of third-party and external institutions, carrying open responsibility. With the increasing number of problems such as unclear API assets, api vulnerabilities, and API transmission leaks, the use of API interface attacks has become a new type of attack method, and gartner, an international authority, predicts that API abuse will become the most common attack vector for digital services in 2022.

API Guard focuses on creating API security protection capabilities that continuously monitor responses, which can detect and warn sensitive data in API transmission while detecting traditional Web attacks, establish user portraits or behavior models based on user access behavior, and discover API unauthenticated access, weak password login, unauthorized access, abnormal access behavior, etc.

Huang Zhong: The privileged defender to avoid "overturning the ship in the gutter"

Huang Zhong, although old, is no less than the other four in martial arts and achievements. And Guan Yu lily fought a draw, and the sword split Cao Wei's commander-in-chief Xiahou Yuan... Old and strong is synonymous with him.

Brain holes! Admiral Five Tigers has encountered the problem of data security How to break?

Hundred steps through Yang, is Huang Zhong's special long-range attack skill, but also has the title of the first divine archer of the Three Kingdoms. However, unfortunately, when Huang Zong was taking advantage of the victory to pursue the Wu army, he was hit by a cold arrow due to carelessness, and he was overwhelmed with regret.

Success is also a bow and arrow, defeat is also a bow and arrow. Huang Zhong's story echoes an old saying, "Those who play with eagles are pecked by eagles." For many enterprises, weak passwords have been repeatedly hit and overturned in the gutter. According to public data, 82% of the respondents admitted to reusing passwords in multiple accounts, the prevalence of weak passwords lowered the threshold for attacks, and privileged accounts became the primary target of attackers, bringing serious data security risks and seriously threatening the overall security of government and enterprise organizations. It can be said that "success is also privileged, and failure is also privileged".

Thus, the Guardian of Privilege is born of the application. With the core of ensuring the security of privileged accounts, it can actively discover the account distribution of various infrastructure resources, identify account risks, manage account use, realize the whole life cycle management of various infrastructure resource accounts, help customers improve the active defense capabilities of account security, and reduce the risk of data leakage caused by account password leakage or illegal use.

Conclusion:

Gold has no feet, no one is perfect. The five tiger generals have both must-kill skills and shortcomings. The same is true for the digital construction of enterprises, while the rapid development of business, it is also necessary to pay attention to the protection and construction of data security, and conform to the trend of shifting from compliance to legality under strong supervision, in order to be invincible in the era of digital economy.

Read on