Logo

dev-resources.site

for different kinds of informations.

Acra. Features: Data leakage detection

Published at
3/23/2022
Categories
cryptography
security
database
riskmanagement
Author
cossacklabs
Author
11 person written this
cossacklabs
open
Acra. Features: Data leakage detection

Data encryption is a passive security control, it works well in combination with active controls that scan the data flow and analyse the system's behaviour. We equipped Acra with several techniques to detect unauthorised behavior and effectively respond to it. Let’s explore them in more detail.

Use Acra Community Edition for free. Check out Acra Enterprise Edition tailored for solutions with high security requirements.

7️⃣ Data leakage detection

Poison records/Honeytokens

Acra provides intrusion detection capabilities using poison records (aka honeytokens).

Acra puts special data blobs in database tables that look like regular encrypted records, but their content is different (“poison”). Once they’re requested through Acra, Acra understands that it is not a typical record, raises security alarms and halts decryption.

Poison records are records specifically designed to sit quietly in the database and not be queried by legitimate users under normal circumstances. Nice to your database, fierce to intruders :)

Poison records. Acra by Cossack Labs

Intruders, malicious applications, or SQL injections don’t know which records are poison, and if they read more data than they should, i.e. using SELECT * requests, then poison records appear in the database response and trigger Acra.

Arbitrary patterns

Acra can be used as conventional DLP for the database, making sure that chosen patterns or data blocks never pass Acra without an alarm.

For more technical details you can check out other blog posts related poison records:

With poison records and arbitrary patterns implemented, you give your valuables another strong level of protection. Use them in combination with other Acra features and you will always know if someone is trying to steal your data.

riskmanagement Article's
30 articles in total
Favicon
There's more to risk management than what engineers typically see
Favicon
IT Security Risk Management: A Comprehensive Approach to Safeguarding Digital Assets
Favicon
Streamlining Supply Chains: How Incident Response and Automation Platforms Transform Logistics
Favicon
Third-Party Risk Management Questionnaire Best Practice
Favicon
IT Risk Management Software: Essential Features for Safeguarding Digital Assets
Favicon
Unleashing Agile Potential with Risk Storming Cards
Favicon
Unlocking the Secrets: How to Live Off Forex Trading Successfully
Favicon
Proactive Risk Management in DevSecOps
Favicon
The Growth of Cybersecurity and the significance of Virtual CISO Consulting Services for Modern Businesses
Favicon
Essential Risk Management Techniques for Investors
Favicon
What Are Regulatory Compliance Services in the UAE?
Favicon
Navigating Crisis: Preparation Strategies for Unforeseen Events
Favicon
Navigating Crisis: Preparation Strategies for Unforeseen Events
Favicon
Crafting a Long-term Sustainable Business: Your 2024 Continuity Checklist
Favicon
The Role of AI in Construction Risk Management
Favicon
Quantum Computing in Finance Revolutionizing the Industry
Favicon
Risk Management Strategies for Government Contractors
Favicon
Harnessing Predictive Analytics for Proactive Construction Risk Management
Favicon
Engineering Success: Mastering Risk Management In Product Design
Favicon
Cybersecurity Best Practices for Small Businesses
Favicon
Top GRC Trends for 2024 and Beyond
Favicon
Risk management frameworks
Favicon
Rethinking Project Management Tools: Our Switch from Trello to MS Planner
Favicon
Strategies for Maximizing Engagement and Minimizing Risks with Remote Software Developers
Favicon
SBOM Explained: 📚 An Enterprise Guide to Security Risk Management
Favicon
A.I. Risk
Favicon
Acra. Features: Data leakage detection
Favicon
Treat security as a risk
Favicon
How cryptography 💪works to protect ML models
Favicon
Mitigating Risk When Implementing an Analytics Platform

Featured ones: