doc-exports/docs/dataartsstudio/umn/dataartsstudio_03_0140.html
Xiong, Chen Xiao f3ee29a3dd DataArts UMN 20230329 version
Reviewed-by: Rechenburg, Matthias <matthias.rechenburg@t-systems.com>
Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com>
Co-authored-by: Xiong, Chen Xiao <chenxiaoxiong@huawei.com>
Co-committed-by: Xiong, Chen Xiao <chenxiaoxiong@huawei.com>
2023-05-11 17:09:25 +00:00

1.5 KiB

What Are the Security Protection Mechanisms of CDM?

CDM is a fully hosted service that provides the following capabilities to protect user data security:

  • Instance isolation: CDM users can use only their own instances. Instances are isolated from each other and cannot access each other.
  • System hardening: System hardening for security has been performed on the operating system of the CDM instance, so attackers cannot access the operating system from the Internet.
  • Key encryption: Keys of various data sources entered when users create links on CDM are stored in CDM databases using high-strength encryption algorithms.
  • No intermediate storage: During data migration, CDM processes only data mapping and conversion without storing any user data or data fragments.