Tagged articles
22 articles
Page 1 of 1
IT Architects Alliance
IT Architects Alliance
Dec 10, 2025 · Information Security

How to Build a Zero Trust Security Architecture: Principles, Code Samples, and Step‑by‑Step Guide

This article explains why traditional perimeter security fails in modern distributed environments and presents a comprehensive zero‑trust model, covering core design principles, technical implementation layers, practical YAML and Python examples, phased rollout strategies, technology choices, common challenges, and future trends.

IAMNetwork PolicyZero Trust
0 likes · 10 min read
How to Build a Zero Trust Security Architecture: Principles, Code Samples, and Step‑by‑Step Guide
Aikesheng Open Source Community
Aikesheng Open Source Community
Feb 27, 2025 · Information Security

Improving Data Export Workflows and Security: From 1.0 to 2.0 with Classification and Dynamic Approval

This article examines the security challenges of data export work orders in MySQL environments, outlines the shortcomings of the original 1.0 workflow, and presents a comprehensive 2.0 redesign that introduces dynamic approvals, data classification, execution‑plan analysis, and code‑level solutions to mitigate data leakage risks.

Data ExportDatabase SecuritySQL parsing
0 likes · 15 min read
Improving Data Export Workflows and Security: From 1.0 to 2.0 with Classification and Dynamic Approval
Data Thinking Notes
Data Thinking Notes
Aug 27, 2024 · Information Security

Understanding Data Security Regulations and Classification Standards

This article presents an overview of data security related regulations, outlines the standards for data classification and grading, and showcases industry-specific classification schemes through illustrative diagrams, providing a concise visual guide for implementing data security measures.

Data GovernanceRegulationsdata classification
0 likes · 2 min read
Understanding Data Security Regulations and Classification Standards
Data Thinking Notes
Data Thinking Notes
Jul 30, 2024 · Information Security

Mastering Data Classification: A Practical Guide to Secure Data Grading

This article outlines the evolution of data security in China, explains why data classification and grading are central to governance, and provides a step‑by‑step framework, principles, implementation details, adjustment triggers, and practical reflections for building effective data protection strategies.

Data Governancecompliancedata classification
0 likes · 11 min read
Mastering Data Classification: A Practical Guide to Secure Data Grading
Data Thinking Notes
Data Thinking Notes
Jun 12, 2024 · Information Security

How to Implement Data Classification and Grading for Robust Security

This article outlines the national‑standard‑based methodology for classifying and grading data, detailing industry‑specific processes, core and important data identification criteria, general data handling, and a privacy‑focused governance framework that enables organizations to protect sensitive information effectively.

Data ProtectionSecurity Governancedata classification
0 likes · 13 min read
How to Implement Data Classification and Grading for Robust Security
Data Thinking Notes
Data Thinking Notes
May 16, 2024 · Information Security

How a Data Security Governance Platform Secures the Full Data Lifecycle

This article explains how a data security governance platform protects data across its entire lifecycle—from warehouse construction and collection to application—by implementing fine‑grained permission controls, encryption, masking, authentication, and comprehensive auditing, while addressing scalability, high availability, and regulatory compliance challenges.

AuthenticationAuthorizationBig Data
0 likes · 13 min read
How a Data Security Governance Platform Secures the Full Data Lifecycle
Data Thinking Notes
Data Thinking Notes
May 7, 2024 · Information Security

What the New GB/T 43697‑2024 Standard Means for Data Classification and Security

The Chinese national standard GB/T 43697‑2024 on Data Security Technology – Data Classification and Grading Rules has been officially released, providing universal classification guidelines and set to take effect on October 1 2024, offering essential direction for implementing data classification and grading management.

GB/T 43697-2024data classificationdata security
0 likes · 1 min read
What the New GB/T 43697‑2024 Standard Means for Data Classification and Security
Data Thinking Notes
Data Thinking Notes
Apr 18, 2024 · Information Security

How to Implement Effective Data Classification and Grading for Secure Data Management

Data classification and grading, essential components of data security governance, involve defining data categories, assigning sensitivity levels, adhering to national standards, and establishing organizational processes to ensure compliant, secure, and value‑driven data handling across enterprises.

Data GovernanceData Managementdata classification
0 likes · 20 min read
How to Implement Effective Data Classification and Grading for Secure Data Management
政采云技术
政采云技术
Jan 23, 2024 · Big Data

Design and Implementation of a Big Data Permission Management System

This article outlines the background, importance, scenarios, challenges, objectives, and architectural design—including RBAC and ABAC models, metadata integration, data classification, and verification mechanisms—of a comprehensive big data permission management system for secure and fine‑grained data access.

ABACBig DataRBAC
0 likes · 14 min read
Design and Implementation of a Big Data Permission Management System
Data Thinking Notes
Data Thinking Notes
Oct 31, 2023 · Information Security

Why Data Classification & Grading Is Critical for Enterprise Security

This article explains the legal and strategic importance of data classification and grading in China, outlines the relevant regulations, describes the principles and processes for implementing classification, and offers practical steps for enterprises to secure data while meeting compliance and business needs.

Data GovernanceEnterprise Compliancedata classification
0 likes · 11 min read
Why Data Classification & Grading Is Critical for Enterprise Security
Ziru Technology
Ziru Technology
Jun 2, 2023 · Information Security

Mastering Data Classification & Grading: Ziroom’s Compliance Blueprint

This article explains how Ziroom implements a comprehensive data classification and grading system to meet the 2021 Data Security Law, improve risk management, optimize security resources, and boost user trust through automated tools, multi‑level categorization, and continuous manual verification.

Data Governancecompliancedata classification
0 likes · 12 min read
Mastering Data Classification & Grading: Ziroom’s Compliance Blueprint
dbaplus Community
dbaplus Community
Dec 18, 2022 · Information Security

Simplify Large‑Scale Database Security: Discover, Classify & Encrypt Sensitive Data

This article outlines Vivo’s comprehensive approach to large‑scale database security, covering recent data‑leak incidents, legal compliance, the current challenges of sensitive data governance, a field‑level discovery method, classification standards, automated scoring, and multiple encryption solutions including Proxy, MyBatis, and ShardingSphere.

compliancedata classificationdata security
0 likes · 17 min read
Simplify Large‑Scale Database Security: Discover, Classify & Encrypt Sensitive Data
政采云技术
政采云技术
Nov 7, 2022 · Information Security

Zhejiang Government Procurement Cloud's Data Security and Compliance Framework

Zhejiang Government Procurement Cloud's CTO Liu Changyu presented at the Cloud Summit, detailing the company's comprehensive data security and compliance framework including 'three-in-one' certifications, 'four-in-one' data security construction, and intelligent data classification strategies.

Regulatory Compliancecompliance frameworkdata classification
0 likes · 5 min read
Zhejiang Government Procurement Cloud's Data Security and Compliance Framework
Tencent Cloud Developer
Tencent Cloud Developer
Sep 20, 2022 · Information Security

Data Classification and Grading Architecture for Enterprise Data Security

The article details a practical, reusable enterprise architecture for data classification and grading that combines scanning tools, a rule‑engine with hot‑updates, a high‑performance identification service, and a security enforcement platform, addressing massive real‑time data volumes, diverse storage types, cross‑department isolation, and compliance with China’s data security laws.

Big DataCloud NativeKafka
0 likes · 14 min read
Data Classification and Grading Architecture for Enterprise Data Security
Airbnb Technology Team
Airbnb Technology Team
Aug 26, 2022 · Information Security

Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection

Airbnb’s second privacy‑security article describes how the Inspekt service automatically classifies personal and sensitive data across diverse stores using regexes, Aho‑Corasick tries, machine‑learning models and custom validators, measures validator quality, and how the Angmar system scans code repositories for secrets via CI checks and pre‑commit hooks, with plans to broaden coverage to more APIs and data stores.

Secret Detectioncloud securitydata classification
0 likes · 16 min read
Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection
Big Data Technology & Architecture
Big Data Technology & Architecture
Jun 29, 2021 · Big Data

Huawei Data Governance Practices and Metadata Management

This article outlines Huawei's data governance practices, detailing its digital transformation vision, two-stage data management evolution, structured and unstructured data classification frameworks, external data compliance, and comprehensive metadata management architecture, highlighting challenges and solutions for enterprise-wide data assets.

Digital TransformationHuaweidata classification
0 likes · 20 min read
Huawei Data Governance Practices and Metadata Management
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 1, 2021 · Fundamentals

How Huawei Built a Comprehensive Data Governance Framework for Digital Transformation

Huawei’s 2017 digital‑transformation vision led to a five‑step data‑governance blueprint that evolved through two phases, defining a detailed data‑classification framework, structured and unstructured data management methods, metadata governance, and compliance‑driven external data handling to support enterprise‑wide intelligent operations.

Data Governancedata classificationmetadata
0 likes · 20 min read
How Huawei Built a Comprehensive Data Governance Framework for Digital Transformation
Qunar Tech Salon
Qunar Tech Salon
Aug 6, 2019 · Information Security

Data Security Construction at Qunar: Practices and Experience

This article describes Qunar's comprehensive data security framework, covering data classification, warehouse access control, permission compliance, encryption, leakage detection, and the supporting institutional policies that together enable a small security team to protect large‑scale business data.

Qunaraccess controldata classification
0 likes · 13 min read
Data Security Construction at Qunar: Practices and Experience
Didi Tech
Didi Tech
Dec 26, 2018 · Industry Insights

How Didi Implements Full‑Chain Data Tiered Protection for Reliable Operations

Facing growing data‑driven pressures, Didi designed a full‑link data tiered protection framework that defines classification standards, integrates data levels across the entire pipeline, and applies concrete safeguards and tooling to improve resource allocation, backup reliability, and overall data reliability.

Big DataData GovernanceDidi
0 likes · 7 min read
How Didi Implements Full‑Chain Data Tiered Protection for Reliable Operations
360 Quality & Efficiency
360 Quality & Efficiency
Feb 5, 2018 · Artificial Intelligence

Fundamentals of Recommendation Engines: User Profiling, Data Classification, and Testing Methods

The article explains the core concepts of recommendation engines—user profiling and data classification—describes how large‑scale data processing tools are used to build models, and outlines common offline and A/B testing approaches for evaluating recommendation performance.

AB testingdata classificationmachine learning
0 likes · 4 min read
Fundamentals of Recommendation Engines: User Profiling, Data Classification, and Testing Methods