Solution

QueryPie

QueryPie
QueryPie

Cloud Data Protection Platform QueryPie is a Cloud Data Protection Platform, CDPP,
that consolidates IT assets such as databases and servers in both cloud and traditional data centers, providing access control and audit support.
It is used by over 70% of domestic unicorns/startups such as Kakao Pay, Kakao Enterprise, Yanolja, Dunamu, Karrot, Musinsa, and Toss to comply with and manage personal information regulations, financial regulations, and compliance.

Challenges with cloud data security

In the era of cloud computing, enterprises face various issues related to data security. The proliferation of vast amounts of data and the complexity of infrastructure make it challenging to apply consistent security measures across all resources. This difficulty can lead to serious problems in business operations, including incidents of personal information breaches.

OVERVIEW

QueryPie performs access control and auditing through a centralized access control system between authenticated users and target resources. It identifies users and grants minimal privileges to authorized users, ensuring the secure management of databases and systems.

FEATURES

In the era of the cloud, protecting data involves identifying and integrating critical data and personal information within the cloud's diverse ecosystem. Optimized features such as account system integration and collaboration with
cloud providers enable the establishment of a more secure security system in the cloud environment.

Database Access Control
  • Integrated Management of Various Data Sources

    With its proprietary engine developed for over 20 different data sources, including RDBMS and NoSQL, QueryPie enables standardized SQL syntax for access control.

  • Supporting Users’ web SQL Editor

    Users can access databases and execute queries through a web browser, regardless of the operating system.

  • Supporting Agent for Proxy Access

    You can connect to external tools such as Datagrip and DBeaver through the desktop agent. Additionally, connection is possible without an agent through the URL Proxy method.

Key Features
  • Access Control based on RBAC & ABAC
  • Execution Control through SQL Syntax Combination
  • Data Masking Policy of Personal Information Data
  • Table & Column Access Control Policy
  • Alert on Accessing Sensitive Data
  • DB Access History & Query Execution History Logging
  • Request of DB Access & SQL Execution
Supported Data Source (DAC)

QueryPie supports connectivity to over 20 different databases,
including RDBMS, data warehouses, Hadoop ecosystems, and NoSQL.

RDBMS
Data Warehouse & Hadoop Ecosystem
NoSQL & Query Engine
System Access Control
  • Unified SSH & SFTP Access Management

    Users can centrally manage permissions for all resources, including various systems, servers, and network devices dispersed across cloud and on-premises environments, that are accessible via SSH.

  • User Web Terminal Support

    Users can perform tasks and execute commands through the web terminal provided via a web browser, regardless of the operating system.

  • coming soon
    Agent Support for Proxy Access

    QueryPie provides a desktop agent to allow users to connect to systems and server equipment through existing access programs.

Key Features
  • SSH & SFTP Protocol Access Control
  • Segmented Policy-based Access Control
  • SSH Command-based Access Control
  • Tag-based filtering for server and permission management
  • Easy account management through server account templates
  • Logging of system access records and command execution history
DeploymetMethods

It is possible to configure a dual configuration in the form of Active-Active or Active-Standby, and flexible expansion is achievable by deploying L4/L7 based on the user scale. Moreover, it can consolidate policies and logs in one place for multi-cloud environments or hybrid infrastructure (data center and public cloud).

Certifications

QueryPie maintains compliance with 10 domestic & international security certifications, ensuring development with globally high levels of security.

  • ISO/IEC27001

    Information Security Management System

  • ISO/IEC27701

    Privacy Information Management System

  • ISO/IEC27017

    Information Security Controls within a Cloud environment

  • ISO/IEC27018

    Privacy Controls within a Cloud Environment

  • ISO22301

    Business Continuity Management

  • ISMS-P

    Information & Privacy Security Management System

  • CSA-STAR

    Security, Trust, Assurance and Risk (Level 1 - Bronze)

  • CSA-STAR

    Security, Trust, Assurance and Risk (Level 2-Gold)

  • PCI DSS

    Payment Card Industry Data Security Standard

  • GOOD Software

    Good Software Level 1