The information system of any organization contains personal data (PND) about employees and customers, which Federal Law No. 152-FZ must protect.
Pds are subject to encryption by law from impersonal-general to personal, directly impacting a person (health, religious views, features of private life). The highest categorization of protection is required by the data transmitted to the Pension Fund (full name, salary, social status, disability, marital status, number of children, etc.).
The level of protection for each category should be different. Protection against leaks can be built internally within the company through visual or audio channels and using cryptography to use FSB/FSTEC-certified equipment. Different approaches to the levels of protection lead to the need to work with other IT architectures, up to the transfer of personal information to particularly highly protected databases.
Databases are divided into small, medium, and distributed databases. In large systems, it is essential to debug the event correlation system, which establishes the interconnection of messages about potential threats, conducting a comprehensive hazard assessment.
The protection of personal data is carried out to:
The Law on Encryption of Personal Data 152-FZ The Government of the Russian Federation has established an algorithm that allows you to safely work with information and penalties in case of non-compliance with the requirements up to criminal liability and cancellation of licenses. The encryption of personal data is subject to the following criteria:
Information protection uses encryption mechanisms, the certification of which the FSB checks. Everything is encrypted: databases, their transfer over the network, and all copies of backup databases. For safe operation, it is necessary to integrate Russian encryption algorithms up to the development of its products.
The need for regular updating of protection technologies made it possible to develop GOSTs for encrypting personal data (P 34.11-2012 “Stribog”, block R 34.12-2015 “Magma” / “Grasshopper”, P 34.13-2015). GOST algorithms are resistant to hacking and are characterized by high performance. Good parallelization data), allowing you to select the optimal protection for various (limited or full-fledged) resources of computing equipment.
The algorithm for protecting personal data in the organization includes a typical list of actions that must be performed to preserve:
The algorithm for building a personal data protection system consists of five stages:
For the common 1C platform, encryption is performed without external components to completely isolate it from binding to the operating system.
Also Read : Organization Of Data Processing And Protection At The Enterprise
Due to the abundance of options available in the field of cloud storage, it may…
Lately, I have been searching for YouTube alternatives. Even though I enjoy YouTube for its…
Internet marketing and entrepreneurship are dynamic fields, but BizGurukul assists fresh and experienced marketing personnel.…
Introduction To Homeworkify.net In the ever-evolving realm of educational technology, Homeworkify.net has set new benchmarks…
In the fast-paced life of technology, people are looking for apps that satisfy all their…
ZYN, a leader in tar-free and nicotine pouches, started the trend with its breakthrough reward…