信息安全研究 ›› 2022, Vol. 8 ›› Issue (4): 392-.

• 数据安全治理专题 • 上一篇    下一篇

基于业务场景的数据安全治理模型

李雪莹;王玮;   

  1. (北京天融信网络安全技术有限公司北京100089)
  • 出版日期:2022-04-10 发布日期:2022-04-10
  • 通讯作者: 李雪莹 博士,副研究员(资格).主要研究方向为网络安全、安全管理与安全防护体系构建、安全大数据分析、云安全. li_xueying@topsec.com.cn
  • 作者简介:李雪莹 博士,副研究员(资格).主要研究方向为网络安全、安全管理与安全防护体系构建、安全大数据分析、云安全. li_xueying@topsec.com.cn 王玮 主要研究方向为数据安全治理. wh_wangwei@topsec.com.cn

Model of Data Security Governance Based on Business Scenarios

  • Online:2022-04-10 Published:2022-04-10

摘要: 数字经济快速发展至今,世界各国都将数据资产作为可能影响国家安全的重要资源,纷纷采取行动,颁布数据安全相关的法规、条例,旨在全面提升数据安全能力.在此背景之下,涉及数据处理活动的组织一方面需要面临数据安全政策要求相关的制约,另一方面又希望保护好可能会影响到组织切身利益的数据.所以,在做好数据安全合规工作之外,还需要切实落实数据安全相关要求.基于组织业务场景,将实现业务目标作为动能是数据安全能力可持续改进的关键要素.针对典型数据安全框架进行了审视,提出基于业务场景的数据安全治理模型,为组织在开展数据安全治理工作提供一些参考.关键词业务场景;数据安全治理模型;数据流转;数据分类分级;数据安全运营;数据安全风险

关键词: 业务场景, 数据安全治理模型, 数据流转, 数据分类分级, 数据安全运营, 数据安全风险

Abstract: With the rapid development of the digital economy, all countries around the world regard data assets as important resources that may affect national security, and have taken actions to issue laws and regulations related to data security in order to comprehensively improve data security capabilities. In this context, organizations involved in data processing activities on the one hand need to face constraints related to data security policy requirements; on the other hand, they want to protect the data that may affect the vital interests of the organization. Therefore, in addition to data security compliance work, it is also necessary to implement data securityrelated requirements effectively. Based on the organization’s own business, the realization of business goals as the driving force is the key element of sustainable improvement of data security capability. This paper reviews the typical data security framework and proposes a data security governance model based on business scenarios, which can provide some references for organizations to carry out data security governance work.Key words business scenarios; data security governance model; data flow transformation; data classification and grading; data security operation; data security risks

Key words: business scenarios, data security governance model, data flow transformation, data classification and grading, data security operation, data security risks