当前位置:网站首页>DGC best practice: how to ensure that confidential data is not leaked when entering the lake?
DGC best practice: how to ensure that confidential data is not leaked when entering the lake?
2022-07-19 02:06:00 【Hua Weiyun】
background :
In the business database, some table data belong to very confidential data , such as , Quotation information 、 Wages . If this batch of data is leaked , It will seriously affect the management of enterprises 、 Production and operation , Usually, it is only allowed to be used by high-level data analysts or data Owner visit , General Data Engineer 、 Average analyst , Do not allow access or only allow desensitization 、 Encrypted or aggregated data . that , How to be in DGC This kind of data is strictly controlled in ?
programme :
Introduce a good practical scheme , First map

Solutions that :
1、 stay DWS( Here to DWS For example ,DLI、MRS Also can reference ) Create a secret in Schema, Strictly control access . Be able to access this Schema Your account and password need to be strictly controlled .
2、DGC Create a separate secret space on , Configure sensitive business database connections in this space 、 Have access to DWS confidential Schema The connection of ( The connection account usually also needs to have a common Schema Access rights of , Facilitate the correlation analysis of confidential data ). Because in DGC Of workspace Inside , Generally, the developer role can use the data source connection to access data without distinction , And can modify and execute scripts and jobs , therefore , The workspace All members of the must be confidential personnel who can access confidential data .
3、 confidential Schema Table data in , Space developers can customize UDF Encrypt confidential fields , Ensure that the confidential field of the disk is the ciphertext storage , When accessing sensitive fields, use UDF Decrypt . actually , use UDF Encryption is optional , Only do it before removing the data from the data area , such as , Use CDM Migrate the table to the normal data warehouse schema Before , You need to encrypt the data first .
4、DGC If ordinary space developers need to use desensitized or aggregated confidential data , The developer of the confidential space needs to export the desensitization results . Cross space dependency can be established between jobs to coordinate operation .
边栏推荐
- [cute new problem solving] sum of three numbers
- Combined key screenshot analysis
- Characteristics and application points of electrolytic capacitor
- S32K148EVB 关于ENET Loopback实验
- 静态库与动态库
- 散列表、布隆过滤器、分布式一致性hash
- Leveraging Semi-Supervised Learning for Fairness using Neural Networks
- MATLAB :Warning: the font “Times” is not available
- gdb+vscode进行调试——release版本如何调试
- 高斯分布的性质(含代码)
猜你喜欢

gdb+vscode进行调试3——vscode以及gdb远程调试

02 design of smart home system based on ZigBee

性能强悍的图表组件库 ScottPlot

Prohibit smart Safari from playing automatically when opening a web page

边缘检测方法 -- 一阶边缘检测
![[literature reading] multi state MRAM cells for hardware neural computing](/img/55/141cb88dff35d5d0e7af1f860b78df.png)
[literature reading] multi state MRAM cells for hardware neural computing

SAE j1708/j1587 protocol details

03 design of urban road dedusting and cooling system based on ZigBee

Basic principle and parameter interpretation of operational amplifier

随机森林的理解
随机推荐
AURIX Development Studio安装
Hands on deep learning -- from full connection layer to convolution layer
在Oozie中配置 map-reduce workflow
gdb+vscode进行调试7——程序出现segmentation default/段错误,如何进行调试?
Static library and dynamic library
S32K148EVB 关于ENET Loopback实验
Remote sensing submission process
CMake常用命令
Allegro Design Entry CIS 和 Orcad Capture CIS 关系
Fisher线性判别分析Fisher Linear Distrimination
JS practical tips
03基于ZigBee的城市道路除尘降温系统设计
[literature reading] vaqf: full automatic software hardware co design framework for low bit vision transformer
递推与递归学习笔记
Configure map reduce workflow in oozie
gdb+vscode进行调试8——使用core分析死循环、死锁、段错误
openGauss Developer Day 2022|东方通诚邀您莅临“东方通生态工具分论坛”
[translation] transformers in computer vision
05 design of street lamp control fault detection system based on ZigBee
Suivi du mode de méthode de l'usine