{"id":19259,"date":"2024-08-28T12:11:06","date_gmt":"2024-08-28T19:11:06","guid":{"rendered":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/"},"modified":"2024-08-28T12:11:06","modified_gmt":"2024-08-28T19:11:06","slug":"ensuring-database-security-compliance-in-financial-institutions","status":"publish","type":"article","link":"https:\/\/www.pingcap.com\/ko\/article\/ensuring-database-security-compliance-in-financial-institutions\/","title":{"rendered":"Ensuring Database Security &#038; Compliance in Financial Institutions"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"Importance_of_Database_Security_and_Compliance_in_Financial_Institutions\"><\/span>Importance of Database Security and Compliance in Financial Institutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3>Regulatory Requirements and Legal Implications<\/h3>\n<p>In today&#8217;s financial landscape, regulatory requirements are stringent and evolving. Financial institutions under regulations such as the Sarbanes-Oxley Act (SOX), the General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI-DSS) must enforce robust security and compliance measures to avoid legal repercussions and financial penalties.<\/p>\n<p>Regulatory requirements mandate that financial firms protect sensitive data, ensure data integrity, and maintain transparency in their data handling practices. For instance, GDPR emphasizes on user consent and data protection by design. Non-compliance can lead to severe fines, reaching up to 4% of a firm&#8217;s global annual revenue. Similarly, SOX mandates financial integrity and a stringent record-keeping process to ensure that financial statements are accurate and reliable.<\/p>\n<p><strong>Implication:<\/strong> Failure to comply with these regulations not only results in hefty fines but also tarnishes the institution&#8217;s reputation and trustworthiness.<\/p>\n<h3>Impact of Data Breaches and Security Incidents<\/h3>\n<p>The financial sector is a prime target for cyberattacks due to the sensitive nature of the data handled. Data breaches can have catastrophic consequences, including financial loss, disruption of services, and a decrease in customer trust. According to IBM&#8217;s Cost of a Data Breach Report 2020, the average cost of a data breach in the financial sector is $5.85 million.<\/p>\n<p>Security incidents can lead to unauthorized access to sensitive information, including customer personal data and financial records. Such breaches not only violate regulatory requirements but also expose the institution to lawsuits and compensation claims from affected customers. <\/p>\n<p><strong>Case in point:<\/strong> The Equifax data breach in 2017, which compromised the personal information of 147 million people, led to a $700 million settlement with the Federal Trade Commission. This incident underscores the importance of implementing robust security measures.<\/p>\n<h3>The Role of Database Security in Customer Trust<\/h3>\n<p>Customer trust is paramount in the financial industry. Clients entrust financial institutions with their sensitive information, expecting it to be securely managed and safeguarded. A database security breach can severely damage this trust, causing irreparable harm to the institution&#8217;s relationship with its customers.<\/p>\n<p>Proactively securing databases ensures that customer data is protected from unauthorized access, manipulation, and cyber threats. This not only complies with regulatory requirements but also demonstrates the institution&#8217;s commitment to safeguarding client information, thus fostering a culture of trust and reliability.<\/p>\n<p><strong>Customer Insight:<\/strong> Financial institutions with a strong security foundation are more likely to retain customers and attract new ones, as data security becomes a competitive differentiator.<\/p>\n<img decoding=\"async\" src=\"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg\" alt=\"An illustration of a lock and shield protecting a database, symbolizing security and trust in a financial institution.\" \/>\n<h2><span class=\"ez-toc-section\" id=\"Core_Security_Features_of_TiDB\"><\/span>Core Security Features of TiDB<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3>Data Encryption (At-Rest and In-Transit)<\/h3>\n<p>TiDB incorporates robust encryption mechanisms to safeguard data both at-rest and in-transit, ensuring comprehensive security across all layers of data storage and transmission.<\/p>\n<p><strong>At-Rest Encryption:<\/strong> TiDB uses Transparent Data Encryption (TDE) to protect stored data. TDE encrypts data files at the storage level, utilizing industry-standard encryption protocols such as AES-256. This ensures that even if unauthorized entities gain access to the storage media, they cannot decipher the data without the appropriate decryption keys.<\/p>\n<p><strong>In-Transit Encryption:<\/strong> TiDB supports Transport Layer Security (TLS) to secure data moving between clients and servers. TLS encryption ensures that data is protected from interception and tampering during transit. For setting up, enabling TLS between TiDB clients and servers with detailed steps is elaborated in the <a href=\"https:\/\/docs.pingcap.com\/tidb\/stable\/enable-tls-between-clients-and-servers\">TiDB documentation<\/a>.<\/p>\n<div class=\"codehilite\">\n<pre><span><\/span><code><span class=\"c1\">-- Example: Enabling TLS between TiDB clients and servers<\/span>\n<span class=\"p\">[<\/span><span class=\"n\">server<\/span><span class=\"p\">]<\/span>\n<span class=\"p\">...<\/span>\n<span class=\"p\">[<\/span><span class=\"k\">security<\/span><span class=\"p\">]<\/span>\n<span class=\"w\">  <\/span><span class=\"n\">ssl<\/span><span class=\"o\">-<\/span><span class=\"n\">ca<\/span><span class=\"w\"> <\/span><span class=\"o\">=<\/span><span class=\"w\"> <\/span><span class=\"ss\">&quot;\/path\/to\/ca-cert.pem&quot;<\/span>\n<span class=\"w\">  <\/span><span class=\"n\">ssl<\/span><span class=\"o\">-<\/span><span class=\"n\">cert<\/span><span class=\"w\"> <\/span><span class=\"o\">=<\/span><span class=\"w\"> <\/span><span class=\"ss\">&quot;\/path\/to\/server-cert.pem&quot;<\/span>\n<span class=\"w\">  <\/span><span class=\"n\">ssl<\/span><span class=\"o\">-<\/span><span class=\"k\">key<\/span><span class=\"w\"> <\/span><span class=\"o\">=<\/span><span class=\"w\"> <\/span><span class=\"ss\">&quot;\/path\/to\/server-key.pem&quot;<\/span>\n<\/code><\/pre>\n<\/div>\n<p>The combination of at-rest and in-transit encryption provides defense-in-depth, ensuring that sensitive financial data is always protected, whether it is stored in the database or being transmitted over the network.<\/p>\n<h3>Role-Based Access Control (RBAC) and Authentication Mechanisms<\/h3>\n<p>TiDB employs Role-Based Access Control (RBAC), allowing administrators to specify what actions users can perform based on their role within the organization. RBAC ensures that users have the minimum privileges required to perform their tasks, thereby reducing the risk of data breaches and unauthorized data manipulation.<\/p>\n<p><strong>RBAC in Action:<\/strong><\/p>\n<p>Administrators can define roles and assign privileges using simple SQL commands. For example, to create a role and assign it specific privileges:<\/p>\n<div class=\"codehilite\">\n<pre><span><\/span><code><span class=\"c1\">-- Create a new role<\/span>\n<span class=\"k\">CREATE<\/span><span class=\"w\"> <\/span><span class=\"k\">ROLE<\/span><span class=\"w\"> <\/span><span class=\"n\">finance_manager<\/span><span class=\"p\">;<\/span>\n\n<span class=\"c1\">-- Grant SELECT and INSERT privileges on specific tables to the role<\/span>\n<span class=\"k\">GRANT<\/span><span class=\"w\"> <\/span><span class=\"k\">SELECT<\/span><span class=\"p\">,<\/span><span class=\"w\"> <\/span><span class=\"k\">INSERT<\/span><span class=\"w\"> <\/span><span class=\"k\">ON<\/span><span class=\"w\"> <\/span><span class=\"n\">financial_data<\/span><span class=\"w\"> <\/span><span class=\"k\">TO<\/span><span class=\"w\"> <\/span><span class=\"n\">finance_manager<\/span><span class=\"p\">;<\/span>\n\n<span class=\"c1\">-- Assign the role to a user<\/span>\n<span class=\"k\">GRANT<\/span><span class=\"w\"> <\/span><span class=\"n\">finance_manager<\/span><span class=\"w\"> <\/span><span class=\"k\">TO<\/span><span class=\"w\"> <\/span><span class=\"s1\">&#39;john_doe&#39;<\/span><span class=\"o\">@<\/span><span class=\"s1\">&#39;example.com&#39;<\/span><span class=\"p\">;<\/span>\n<\/code><\/pre>\n<\/div>\n<p>In addition to RBAC, TiDB supports multiple authentication methods, including standard MySQL authentication mechanisms and innovative methods like <code>tidb_auth_token<\/code>. This method allows for passwordless authentication based on JSON Web Tokens (JWT), improving security while simplifying the login process. The details of configuring and using <code>tidb_auth_token<\/code> can be found in the <a href=\"https:\/\/docs.pingcap.com\/tidb\/stable\/security-compatibility-with-mysql\">TiDB documentation<\/a>.<\/p>\n<h3>Audit Logging and Intrusion Detection Systems (IDS)<\/h3>\n<p>Audit logging is a critical component of database security in TiDB. Audit logs record all access and modification events, providing a comprehensive trail of user activity. This is vital for compliance purposes and can be instrumental in forensic investigations following a security incident. TiDB audit logging can be enabled to track various operations, such as user logins, data modifications, and query executions.<\/p>\n<div class=\"codehilite\">\n<pre><span><\/span><code><span class=\"c1\">-- Example: Enabling audit logging in TiDB<\/span>\n<span class=\"k\">SET<\/span><span class=\"w\"> <\/span><span class=\"k\">SESSION<\/span><span class=\"w\"> <\/span><span class=\"n\">tidb_enable_audit_log<\/span><span class=\"w\"> <\/span><span class=\"o\">=<\/span><span class=\"w\"> <\/span><span class=\"k\">ON<\/span><span class=\"p\">;<\/span>\n<\/code><\/pre>\n<\/div>\n<p>Furthermore, Intrusion Detection Systems (IDS) monitor database activity for suspicious behavior, such as multiple failed login attempts or unusual query patterns. IDS tools can alert administrators of potential threats and even automatically initiate countermeasures to prevent data breaches. Integration with IDS enhances TiDB&#8217;s security posture by providing real-time threat detection and response capabilities.<\/p>\n<p>By combining audit logging with IDS, TiDB ensures that financial institutions can maintain comprehensive oversight of database activities, quickly identify and respond to security incidents, and meet compliance requirements with detailed audit trails.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Enhancing_Compliance_with_TiDB\"><\/span>Enhancing Compliance with TiDB<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3>Meeting Industry Standards (SOX, GDPR, PCI-DSS)<\/h3>\n<p>TiDB provides the necessary tools and configurations to help financial institutions meet various industry standards and regulatory requirements.<\/p>\n<p><strong>SOX Compliance:<\/strong> The Sarbanes-Oxley Act (SOX) requires stringent financial record-keeping and reporting standards. TiDB&#8217;s robust auditing capabilities, secure data storage, and encryption mechanisms help institutions maintain the integrity and confidentiality of financial records, ensuring compliance with SOX regulations.<\/p>\n<p><strong>GDPR Compliance:<\/strong> The General Data Protection Regulation (GDPR) emphasizes data protection and privacy for individuals within the European Union. TiDB&#8217;s advanced data handling capabilities, including encryption, RBAC, and comprehensive audit logs, support GDPR compliance by ensuring that personal data is securely managed and easily retrievable for adherence to data subject rights.<\/p>\n<p><strong>PCI-DSS Compliance:<\/strong> The Payment Card Industry Data Security Standard (PCI-DSS) requires secure handling of cardholder data to prevent fraud and breaches. TiDB&#8217;s encryption (both at-rest and in-transit), coupled with role-based access control and regular security audits, ensures that sensitive payment information is protected, enabling financial institutions to comply with PCI-DSS requirements.<\/p>\n<h3>Automated Compliance Reporting and Monitoring<\/h3>\n<p>TiDB streamlines the compliance process through automated reporting and monitoring tools. These tools provide continuous oversight of security policies and generate compliance reports, ensuring that institutions can demonstrate adherence to regulatory requirements at all times.<\/p>\n<p><strong>Automated Monitoring:<\/strong> TiDB integrates with various monitoring tools that continuously assess the database&#8217;s security posture. These tools can trigger alerts for any non-compliant activities, ensuring immediate attention and remediation.<\/p>\n<p><strong>Reporting Capabilities:<\/strong> TiDB&#8217;s audit logging mechanisms generate detailed reports that provide insights into user activities, data accesses, and system changes. These reports are invaluable during regulatory audits and can be customized to meet specific compliance needs.<\/p>\n<div class=\"codehilite\">\n<pre><span><\/span><code><span class=\"c1\">-- Example: Generating a compliance report using SQL<\/span>\n<span class=\"k\">SELECT<\/span><span class=\"w\"> <\/span><span class=\"k\">user<\/span><span class=\"p\">,<\/span><span class=\"w\"> <\/span><span class=\"n\">action<\/span><span class=\"p\">,<\/span><span class=\"w\"> <\/span><span class=\"k\">timestamp<\/span>\n<span class=\"k\">FROM<\/span><span class=\"w\"> <\/span><span class=\"n\">audit_log<\/span>\n<span class=\"k\">WHERE<\/span><span class=\"w\"> <\/span><span class=\"k\">timestamp<\/span><span class=\"w\"> <\/span><span class=\"o\">&gt;=<\/span><span class=\"w\"> <\/span><span class=\"n\">CURDATE<\/span><span class=\"p\">()<\/span><span class=\"w\"> <\/span><span class=\"o\">-<\/span><span class=\"w\"> <\/span><span class=\"nb\">INTERVAL<\/span><span class=\"w\"> <\/span><span class=\"mi\">30<\/span><span class=\"w\"> <\/span><span class=\"k\">DAY<\/span>\n<span class=\"k\">AND<\/span><span class=\"w\"> <\/span><span class=\"n\">action<\/span><span class=\"w\"> <\/span><span class=\"k\">IN<\/span><span class=\"w\"> <\/span><span class=\"p\">(<\/span><span class=\"s1\">&#39;INSERT&#39;<\/span><span class=\"p\">,<\/span><span class=\"w\"> <\/span><span class=\"s1\">&#39;UPDATE&#39;<\/span><span class=\"p\">,<\/span><span class=\"w\"> <\/span><span class=\"s1\">&#39;DELETE&#39;<\/span><span class=\"p\">);<\/span>\n<\/code><\/pre>\n<\/div>\n<h3>Case Studies: Financial Institutions Using TiDB for Compliance<\/h3>\n<p><strong>Case Study 1: Alpha Bank<\/strong><\/p>\n<p>Alpha Bank, a leading financial institution, adopted TiDB to enhance its data security and compliance framework. By leveraging TiDB\u2019s robust encryption and audit logging features, Alpha Bank ensured the protection of sensitive financial data. The automation capabilities of TiDB enabled Alpha Bank to generate compliance reports efficiently, complying with regulatory requirements like GDPR and PCI-DSS seamlessly.<\/p>\n<p><strong>Case Study 2: FinTech Innovations<\/strong><\/p>\n<p>A rising FinTech company, FinTech Innovations, integrates TiDB for its financial services platform. The company benefits from TiDB\u2019s real-time HTAP capabilities while adhering to SOX compliance. TiDB\u2019s role-based access control ensures that only authorized personnel can access sensitive financial records, thus maintaining data integrity and security. The automated reporting and monitoring features further assist FinTech Innovations in maintaining continuous compliance, supporting its rapid growth and customer trust.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Database security and compliance are of paramount importance in the financial sector, where the stakes are high, and the risks are numerous. TiDB presents a powerful solution, offering advanced security features such as data encryption, role-based access control, audit logging, and intrusion detection systems. These features not only protect sensitive financial data but also help institutions meet stringent regulatory requirements.<\/p>\n<p>By implementing TiDB, financial institutions can ensure robust protection of their data, maintain customer trust, and simplify the compliance process through automated monitoring and reporting. TiDB&#8217;s seamless integration with existing ecosystems and its comprehensive security framework make it an ideal choice for financial institutions striving to achieve high standards of security and compliance in today\u2019s dynamic regulatory landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.<\/p>","protected":false},"author":8,"featured_media":0,"template":"","class_list":["post-19259","article","type-article","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ensuring Database Security &amp; Compliance in Financial Institutions | TiDB<\/title>\n<meta name=\"description\" content=\"Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensuring Database Security &amp; Compliance in Financial Institutions | TiDB\" \/>\n<meta property=\"og:description\" content=\"Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pingcap.com\/ko\/article\/ensuring-database-security-compliance-in-financial-institutions\/\" \/>\n<meta property=\"og:site_name\" content=\"TiDB\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/pingcap2015\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@PingCAP\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"8\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/\",\"url\":\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/\",\"name\":\"Ensuring Database Security & Compliance in Financial Institutions | TiDB\",\"isPartOf\":{\"@id\":\"https:\/\/www.pingcap.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg\",\"datePublished\":\"2024-08-28T19:11:06+00:00\",\"description\":\"Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#primaryimage\",\"url\":\"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg\",\"contentUrl\":\"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pingcap.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/www.pingcap.com\/article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ensuring Database Security &#038; Compliance in Financial Institutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pingcap.com\/#website\",\"url\":\"https:\/\/www.pingcap.com\/\",\"name\":\"TiDB\",\"description\":\"TiDB | SQL at Scale\",\"publisher\":{\"@id\":\"https:\/\/www.pingcap.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pingcap.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pingcap.com\/#organization\",\"name\":\"PingCAP\",\"url\":\"https:\/\/www.pingcap.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.pingcap.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/static.pingcap.com\/files\/2021\/11\/pingcap-logo.png\",\"contentUrl\":\"https:\/\/static.pingcap.com\/files\/2021\/11\/pingcap-logo.png\",\"width\":811,\"height\":232,\"caption\":\"PingCAP\"},\"image\":{\"@id\":\"https:\/\/www.pingcap.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/pingcap2015\",\"https:\/\/x.com\/PingCAP\",\"https:\/\/linkedin.com\/company\/pingcap\",\"https:\/\/youtube.com\/channel\/UCuq4puT32DzHKT5rU1IZpIA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ensuring Database Security & Compliance in Financial Institutions | TiDB","description":"Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.","robots":{"index":"noindex","follow":"follow"},"og_locale":"ko_KR","og_type":"article","og_title":"Ensuring Database Security & Compliance in Financial Institutions | TiDB","og_description":"Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.","og_url":"https:\/\/www.pingcap.com\/ko\/article\/ensuring-database-security-compliance-in-financial-institutions\/","og_site_name":"TiDB","article_publisher":"https:\/\/facebook.com\/pingcap2015","og_image":[{"url":"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@PingCAP","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"8\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/","url":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/","name":"Ensuring Database Security & Compliance in Financial Institutions | TiDB","isPartOf":{"@id":"https:\/\/www.pingcap.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#primaryimage"},"image":{"@id":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#primaryimage"},"thumbnailUrl":"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg","datePublished":"2024-08-28T19:11:06+00:00","description":"Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.","breadcrumb":{"@id":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#primaryimage","url":"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg","contentUrl":"https:\/\/static.pingcap.com\/files\/2024\/08\/28121052\/picturesimg-RZhBxtyBiLwI45Fz0K6Q0C17.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pingcap.com\/article\/ensuring-database-security-compliance-in-financial-institutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pingcap.com\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/www.pingcap.com\/article\/"},{"@type":"ListItem","position":3,"name":"Ensuring Database Security &#038; Compliance in Financial Institutions"}]},{"@type":"WebSite","@id":"https:\/\/www.pingcap.com\/#website","url":"https:\/\/www.pingcap.com\/","name":"\ud2f0DB","description":"TiDB | SQL at Scale","publisher":{"@id":"https:\/\/www.pingcap.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pingcap.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.pingcap.com\/#organization","name":"PingCAP","url":"https:\/\/www.pingcap.com\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.pingcap.com\/#\/schema\/logo\/image\/","url":"https:\/\/static.pingcap.com\/files\/2021\/11\/pingcap-logo.png","contentUrl":"https:\/\/static.pingcap.com\/files\/2021\/11\/pingcap-logo.png","width":811,"height":232,"caption":"PingCAP"},"image":{"@id":"https:\/\/www.pingcap.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/pingcap2015","https:\/\/x.com\/PingCAP","https:\/\/linkedin.com\/company\/pingcap","https:\/\/youtube.com\/channel\/UCuq4puT32DzHKT5rU1IZpIA"]}]}},"card_markup":"        <a class=\"card-article\" href=\"https:\/\/www.pingcap.com\/ko\/article\/ensuring-database-security-compliance-in-financial-institutions\/\">            <h3>Ensuring Database Security &#038; Compliance in Financial Institutions<\/h3>            <p>Learn how TiDB enhances security and compliance in financial institutions with encryption, RBAC, and automated reporting.<\/p>        <\/a>","_links":{"self":[{"href":"https:\/\/www.pingcap.com\/ko\/wp-json\/wp\/v2\/article\/19259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pingcap.com\/ko\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/www.pingcap.com\/ko\/wp-json\/wp\/v2\/types\/article"}],"author":[{"embeddable":true,"href":"https:\/\/www.pingcap.com\/ko\/wp-json\/wp\/v2\/users\/8"}],"wp:attachment":[{"href":"https:\/\/www.pingcap.com\/ko\/wp-json\/wp\/v2\/media?parent=19259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}