Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Database Security Project for The Social Security Department of A Province

Topsec Database Audit and Protection System ensures compliance with security regulations and responds quickly to risks. It provides accurate database protection through real-time access control and post-incident auditing of database operations in detail.

Background

The social security department of a province has many business systems and databases that store a large amount of personal information and other sensitive data. Leakage of sensitive data will bring severe negative influence. Moreover, access control requirements defined in Cybersecurity Classified Protection 2.0 for network and communication security include requirements for database access control. Therefore, the department has an urgent need for a database security solution that supports high-speed data forwarding for databases and controls database access SQL statements at a fine granularity to protect databases in accordance with applicable laws and regulations. After communication, the customer selects Topsec Database Audit and Protection System.

Activity & Announcement
Solution architecture

Two Database Audit and Protection Systems are deployed in the network in inline mode to provide database access control, and they act as the backup of each other to ensure high availability. Before any security incident occurs, administrators can add protection engines to the system as needed, and set access control and audit policies. When a security incident occurs, the gateways analyze real-time traffic on databases and execute the matching security policy to prevent unauthorized access to the databases. After end of the incident, the gateways can audit all operations on databases.

Value to the customer
Real-time interruption of risky operations

The system can detect and interrupt risky and unauthorized operations on data tables and columns in a database. Meanwhile, it generates alarms to notify administrators of such operations.

Threat identification and prevention

Empowered by virtual patching and SQL injection prevention technologies, the system can generate an alarm or take the specified preventive measure once database access triggered an access control policy.

Accurate auditing and effective tracing

The system provides fine-granularity audits on database access. It records access requests and database returns, and creates a variety of charts and reports for post-incident analysis and identification of personnel accountable.

High availability

The gateways provide the bypass capability, and the two-node deployment improves availability of the system.