DB Security Services is a service that supports DB professionals by installing the DB encryption solution Operations management to protect from an intrusion in a database, Authorized internal users' errors and malicious access.
Regulations | Act provisions | Penalty |
---|---|---|
Article 24, Paragraph (3)(Limitation to Processing Unique Identifier) | ③ In case the personal information processor processes the Unique Identifiers pursuant to each Subparagraph of Paragraph (1), the personal information processor shall take necessary measures to ensure the safety including encryption, as stated by the Presidential Decree, so that such Unique Identifiers may not be lost, stolen, leaked, altered or damaged.. | Less than 2 years imprisonment or a fine not exceeding 10 million won |
Article 29 (Duty of Safeguards) | The personal information processor shall take such technical, managerial and physical measures as internal management plan and preservation of log-on records, etc. necessary to ensure the safety as specified by the Presidential Decree so that personal information may not be lost, stolen, leaked, altered or damaged. | |
Article 30 (Establishment and Disclosure of Privacy Policy) |
① The personal information processor shall take measures to ensure the safety of each
of the following Subparagraphs pursuant to Article 29 of the Act: 1. To set up and implement the internal management plan for the safe processing of personal information; 2. To control access to the personal information and restrict the authority to access hereto; 3. To adopt such encryption technology as to store and transmit the personal information in safety and other measures equivalent hereto; 4. To retain log-in records in order to respond data breach incidents and to take measures to prevent the forgery and falsification hereof; 5. To install and upgrade security programs to protect personal information; 6.To take such physical measures as storage to keep personal information in safety or locking system; ② The MOPAS may provide such necessary assistance as building up the system with which the personal information processor may secure the safety measures subject to Paragraph (1). <Revised 2013.3.23> ③ The MOPAS shall make and notify the detailed standards regarding safety measures subject to Paragraph (1). <Revised 2013.3.23> |
Division | Hanbiro DB encryption | Product of different companies |
---|---|---|
Deployments | File Encryption method | PLUG IN, API, HYBRID method |
Source modification | Existing APPLICATION sources can not be modified | Source modification and DB tuning required (30~40% generated) 3 ~ 4M additional manpower required to modify |
Access control | Provide DB Access control/ audit record function | DB access control products require additional acquisition costs |
Performance issues | Almost no performance issues (2~3% generated) | Performance issues generated (maximum 10~20% generated) |
Building term | Maximum within 1-2 weeks (Including the stabilization period) | Maximum 2 to 3 months (Including the stabilization period) |
Restrictions | No restrictions | When using PK, FK, INDEX, restrictions will be arised When using tools such as TOAD, SQL MANAGEMENT, restrictions will be arised |
Certification and regulatory compliance | NIS encryption with Verification Module GS certification and administrative data protection product certification |
NIS encryption with Verification Module |