DSA Data Security isolation is one of the effective methods in the current data anti-leak technology, which is mainly used to protect the source code of software and hardware development enterprise or department, whether it is located in the terminal or SVN server.
The basic principle of DSA data security isolation Technology
Build one or more source code security zones on demand across multiple endpoints by means of multiple isolation technologies such as disk, storage, and networking. The source code in the terminal security zone is used without any restrictions, or can be used in the normal flow between multiple security zones does not affect the daily work, only when the source code to be separated from a security zone when the necessary control. Because it does not deal with the source code itself during the whole protection process, it can fundamentally avoid the card, slow, blue screen and so on when encrypting the source code with the document encryption software .
DSA data security isolation technology to achieve results
1) Source code security isolation: through the PC terminal to build a security zone to ensure that the source code security. In the security zone of the PC terminal, the source code can not be leaked out of the security zone through any means such as disk, network, port peripherals, etc.
2) Source code safe flow: Between the security zones of each PC terminal, can be set through the policy, so that the source code can be used in normal circulation, including with the SVN server source code flow, can be unimpeded, safe and does not affect the normal work;
3) Source Code External audit: all security areas (by the SVN server and the security zone on the PC terminal) to send out the source, must be audited and have detailed log records, for follow-up inquiries, accountability.
Source code anti-leak-DSA data security isolation