메뉴 바로가기 본문 바로가기
Galea Database Encryption Solution
Personal Information Encryption Solution

Galea is an encryption solution that simultaneously supports formal (database) data and informal (file) data. Galea keeps information assets safe from intruders and prevents illegal incidents of information leaks to raise a company’s reliability. Additionally, it allows clients to cope with various domestic and foreign information protection laws such as Korea’s Personal Information Protection Act. Galea uses secure and safe encryption modules that have been confirmed by the National Intelligence Service Korea (NIS), supports both domestic and foreign standard encryption algorithms, and has acquired CC certification (EAL3). Clients can selectively apply rule-based and role-based access controls to ensure efficient management of decryption rights. The solution is equipped with various high availability architectures for safe key management and operation stability, and supports linked operations with WareValley’s database access control and personal information asset management solutions to ensure effective and reasonable information security activities. When used in conjunction with WareValley’s OrangeTM in database management environments, Galea makes it much easier to understand the status of encryption and decryption and change their settings.

Database Encryption
  • Galea supports standard domestic and foreign encryption algorithms.
  • The solution is equipped with the IT Security Certification Center’s cryptographic encryption module.
  • It supports APIs suitable for application environments and database encryptions through the API support.
  • It supports the plug-in method of encryption for databases by using the View and Trigger of databases.
  • The web-based Galea GUI provides users with initial encryption, and various database constraints and index management functions.
Encryption of Informal Data (Files)
  • Galea supports the encryption of various types of files, including documents, images, videos, and recordings.
  • It supports APIs suitable for application environments and informal data encryptions through the API support.
  • It supports security CLI (Command Line Interface) to ensure easily accessible encryption, such as operation system commands.
  • It allows users to manage files or directories for encryption through policies, and also supports scheduled encryption.
  • It supports password verification for controlling the right to decrypt files.
Security
  • Galea utilizes an encryption module that has acquired the Korea Cryptographic Module Validation Program (KCMVP) from the National Intelligence Service Korea (NIS).
  • The solution has received recognition for its security by earning EAL3 CC certification, GS mark , and Tibero mutual interlocked certification.
  • It can prevent the loss of encryption keys even in unexpected situations arising from a failure to manage plain text encryption keys within the database or file server.
  • It stores and manages access records regarding important personal information on a separate device (Galea KMS server).
  • Important access records are encrypted and managed to prevent any possible cases of forgery, falsification, or damage.
  • It supports dualization, with encryption keys being managed on a separate device for additional security and dualized encryption being applied to them.
  • It supports the optional use of encryption algorithms such as ARIA, AES, SEED, SHA, and RSAES.
Access Control
  • In the case of database encryption, Galea provides rule or role-based access control by utilizing information on IP addresses, MAX addresses, DB accounts, application programs, dates, days of the week, and time.
  • In the case of informal data encryption, it provides access control by utilizing information on IP addresses of remote locations, OS accounts, application programs, dates, days of the week, and time.
  • It provides user role definitions, and decryption rights and access controls based on them.
  • It provides alert functions when detecting anomalies such as attempts to decrypt mass amounts of data.
Audit
  • Galea provides users with thorough records of encryption and decryption.
  • It warns users when inappropriate cases of decryption are taking place, and provides reports of the records.
  • It can keep the performance degradation of databases and file servers as a result of data collection under a certain level.
  • It can connect with the access control solution Chakra Max TM to provide audit reports.
  • It provides comprehensive records of administrator setting changes, backups, scheduled jobs, and automated system operation.
Convenience
  • Galea supports the integrated management of file servers having various databases and informal data through a unified web-based management GUI.
  • It supports encryption scheduling and monitoring of current encryption processes, and also administrator tasks such as managing rights, index management, decryption, backup, and recovery through GUI.
  • It provides convenience in development through not just APIs for various programming languages but also manuals and examples.
  • In the case of the plug-in method using database View and Trigger, the applied states of column properties (PK/FK/UK) and various constraints do not change after encryption and decryption.