SecCT-AUTO Data Security Edition
Data security protection requirements
With the development of the connected car industry, data will play an increasingly important role in intelligent connected car products. According to relevant standards and regulations, enterprises need to take effective data security protection measures for the data and all aspects of the data lifecycle in the process of connected car information service activities.
There are hidden risks in data security
The effectiveness of data protection measures needs to be verified through technical means to identify security issues in the data processing process, prevent data abuse and sensitive data leakage, and ensure the data security and compliance of vehicles in the cloud, management, and end ranges.
Solutions
  • Data security technology verification
    Conduct data security technology verification for various stages of the entire lifecycle of intelligent connected vehicle data, including collection, transmission, storage, sharing, destruction, backup, and recovery.
  • Built in scanning strategy
    Covering various types of data such as vehicle basic attribute data, vehicle operating condition data, vehicle environment perception data, vehicle control data, application service data, user personal information, etc., through built-in scanning strategies.
  • Compliance testing of regulatory standards
    Conduct compliance testing in accordance with laws and standards such as the "Data Security Law", "Information Security Technology – Security Requirements for Data Collected by Connected Vehicles", "Personal Information Protection Requirements for Vehicle Internet Information Services", and "Data Security Technical Requirements for Vehicle Internet Information Services".
Highlights of the plan
Data scanning engine
Comprehensive high-speed data scanning engine: Identify and analyze the risks of various types of data in different application scenarios.
Reduce costs
Automated penetration testing technology: Built in multiple simulated attack items to comprehensively identify whether data security protection measures are effective, reduce the professional threshold for testers, and shorten testing time.
Multiple encryption algorithm detection
Support multiple encryption algorithm detection, including national encryption SM2/SM3/SM4, RSA, ECC and other algorithms.
Featured Features
Vehicle end safety inspection
  • Scan the vehicle terminal's file system to detect plaintext and sensitive data based on the built-in strateg
  • Capture and detect sensitive information in data packets, including IP addresses, MAC addresses, GPS data, email addresses, URLs, and phone numbers, based on scanning strategies.
  • Detecting sensitive data leakage risks in firmware using binary and hard-coded tools.
  • Detect security risks in areas such as permission management, data storage, data encryption, and data leakage in the APP

Sensitive Data

Storage Scan

Sensitive Data

Transmission detection

Firmware sensitivity

Information detection

APP scanning

Cloud security detection
  • Conduct data security management and protection capability checks on the cloud based on the basic requirements of Equal Protection 2.0 and the requirements for big data security extensions
  • Including baseline configuration check of database, database leakage scan, and sensitive information scan
  • SQL injection, XSS cross site scripting, webpage suspension, buffer overflow, upload vulnerability, source code leak, hidden directory leak, database leak

Waiting for Protection 2.0 Data

Security evaluation

Database

Security evaluation

WEB Scan