Background
With the increasing severity of information security situation, security has been placed at the primary position of enterprise information construction. Many enterprises have established perfect management and assessment mechanisms in the aspect of database information security, and meanwhile, many information security technical measures are adopted, so that the protection of resources such as information systems, data, operating systems, networks and the like is realized from multiple layers. In many enterprises, the security of a network environment is ensured and the random access of a computer and various devices is avoided through systems such as an intrusion detection system, a vulnerability scanning system, antivirus software, network access control and the like; by building the bastion host, the centralized management, authentication, authorization and audit of basic software and hardware equipment such as a server, an operating system, a database, a switch, a router and the like are realized; a CA authentication center is established, and the problem of identity authentication of an information system is solved. However, a blank exists for the centralized security management and control aspect of the database system.
Through the development of years, the informatization construction of most of group enterprises develops from a control period to an integration period, in the control period, the enterprises inevitably need to construct a plurality of database systems which operate independently in order to meet the requirements of actual production and informatization management, most of the enterprises mainly consider the integrity and the availability of business functions during the construction of the database systems, and do not consider the effectiveness and the safety of system operation and maintenance in a unified way, so that the database systems are different in technical implementation modes of account numbers, authentication, authorization and audit management, short boards of information safety are difficult to conduct unified investigation, and the development of the enterprises to the integration period is also retarded. With the increase of enterprise database systems, on one hand, higher technical and occupational literacy requirements are put forward for database managers in view of the increase of the operation and maintenance workload of the database, and certain measures must be taken to improve the working efficiency of system managers; on the other hand, the security of the business system is substantially reduced because a uniform security policy cannot be implemented on the database system, and measures of the information system in the aspects of account number, authority, authentication and audit need to be perfected and unified, so that the security of the enterprise database system is improved. Therefore, enterprises need to establish a unified management platform to provide unified authentication information for each system, provide accurate user data and authority data, and can efficiently and conveniently perform data security audit, the management platform is constructed through the 4A technology, legal and safe information system use of enterprise users can be realized, the maintenance workload of system managers is reduced, and the database is guaranteed to operate safely and reliably.
The typical 4A unified security management platform uses identity Authentication as a core, and is composed of 4 main parts, namely unified Account number (Account) management, unified Authentication (Authentication) management, unified authority (Authorization) management and unified Audit (Audit) management. The system isolates an external network and an internal network, can prevent external malicious invasion and attack through identity and authority authentication, can monitor and audit internal behaviors, and carries out all-round control on the whole application environment. The wide control range, the variety of personnel involved, the technical types and the complex workflow all bring great challenges to the deployment, test, operation and maintenance of the platform.
Disclosure of Invention
According to the characteristics of the prior art, the invention provides a database scanning method and a system based on 4A account identification, which start from two aspects of technology and standard, improve the safety level of the existing information system by a technical means provided by a platform, and standardize the construction modes of a newly-built information system in the aspects of authentication, authorization, audit and the like through corresponding technical standards. The technical scheme is as follows.
A database system based on 4A account identification configures a centralized account management and control platform, wherein the centralized account management and control platform is associated with a plurality of database systems to manage accounts, and the method comprises the following steps: the system comprises a centralized account management module, a centralized account authentication module, a centralized account authorization module and a centralized account auditing module, wherein:
the centralized account management module provides the most basic data of user information in an LDAP or database mode by taking a primary account as an account for uniquely identifying a natural person, and realizes account synchronization with an information system through an account interface;
the centralized account authentication module is used for performing centralized authentication on the login process of all information systems and forwarding the centralized authentication to an external authentication component through a forced login authentication mechanism provided by a centralized account management and control platform or by means of an authentication hub to realize forced authentication;
the centralized account authorization module is used for managing the authorization of all accessed information system resources and operation resources, and the authorization management comprises entity-level authorization of the information system resources and fine-grained authorization management in the information system;
and the centralized account auditing module acquires log information of account operation in an account interface mode, analyzes an unauthorized access behavior by means of the log, and quickly positions and responds to the behavior.
The invention has the beneficial effects that: by implementing the database security policy, the network and the system can be ensured to operate safely and efficiently, and the informatization service quality is improved.
Detailed Description
The embodiments of the invention will be described in detail below with reference to the drawings, but the invention can be implemented in many different ways as defined and covered by the claims.
As shown in fig. 1, the present patent mainly relates to data security in a database, and realizes functions of centralized management, centralized authentication, centralized authorization, and centralized audit of multiple sets of system user accounts by designing a set of centralized account management and control (4A) platform. A centralized account management module, a centralized account authentication module, a centralized account authorization module, a centralized account auditing module and the like are added in an original database system, and master-slave account mapping, single sign-on and authority mapping are used as main services.
As shown in fig. 1, the 4A technical framework architecture is composed of a presentation layer, a functional layer, a data layer, an access layer, and a resource layer, and the main functions of the system are as follows.
The presentation layer mainly accepts requests of users and returns data, and the targeted user group comprises system management personnel, operation and maintenance management personnel and general users.
The functional layer is a centralized account management and control platform, can be accessed to a plurality of databases, performs unified account management, unified authentication management, unified authority management and unified audit management on the databases, and is responsible for general management and safety management of the databases.
And the data layer encapsulates the operation of a plurality of databases accessed by the centralized account management and control platform into the data layer, and manages data through the functional layer. Including data acquisition, data storage, data management, data analysis, data backup, and the like.
And the access layer provides interface services including equipment interfaces, application interfaces, third-party interfaces, resource agents and the like.
The hardware equipment comprises a centralized account management and control platform consisting of a server, a router and a switch.
The technical scheme of the invention mainly explains a centralized account management module, a centralized account authentication module, a centralized account authorization module and a centralized account auditing module of the functional layer.
The centralized account management module provides the most basic data of user information in an LDAP or database manner with a primary account as an account uniquely identifying a natural person, and usually uses an account of a network access control system (such as an AD domain account of an employee) or an organizational structure and employee information provided in ERP. And the slave account numbers are all account numbers with the access authority of the information system, and account number synchronization with the information system is realized through an account number interface. The single-view management of the enterprise information system on the employee account is realized through centralized and role master-slave account management, the main management functions comprise the contents of account basic information, an aging strategy, a password strategy, an organization identifier and the like, the full life cycle management of the account is realized, one employee account is enabled to be effective, unique and traceable in the using process, and the account management safety of the information system is improved.
The centralized account authentication module realizes centralized authentication of all information system login processes by means of various authentication technologies such as dynamic authentication, PKI/CA authentication, biological authentication and the like, and realizes the forced authentication by forwarding to an external authentication component through a forced login authentication mechanism provided by a platform or by means of an authentication hub under the condition that part of function modules of the information system are not changed or only moderately changed, so that the mode that the original information system only has weak identity authentication is eliminated, and the safety requirement of the information system authentication mechanism is met. The realization of the centralized account login authentication also provides a single sign-on (SSO) function of an information system for enterprises, thereby not only avoiding the problem that multiple accounts use the same password, improving the safety of the information system, but also improving the working efficiency of staff, and enabling the staff to conveniently and rapidly enter different information systems to complete business processing.
And the centralized account authorization module is used for realizing management work of authorization of all accessed information system resources and operation resources, and the authorization management comprises entity-level authorization of the information system resources and fine-grained authorization management in the information system. Because the integrated authorization management relates to the transformation of a system authorization model, the workload is large, in the implementation process, the steps of entity-level authorization, role-level authorization and fine-grained authorization are carried out, a uniform authorization management model is formulated, the targets of 'old system access and new system reference' are achieved, the centralization of information system authorities is gradually realized, and the uniform operation and maintenance is finally realized.
The centralized account auditing module acquires log information in aspects of user access, data operation and the like of the information system in an interface mode by means of technologies such as Web Service, JDBC/ODBC, Telnet/SSH and the like, finds unauthorized access behaviors of a certain user on the system such as illegal login, illegal operation and the like by means of log analysis, and quickly positions and responds to the unauthorized behaviors, so that unsafe factors are eliminated in time, and the safety of the information system is ensured.
The safety technical framework provided by the centralized account management and control platform (4A platform) provides a high-performance safety guarantee mechanism for the information system, so that the safety performance of the information system can be improved, and the management level of the information system can be improved.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.