CPC G06F 21/6218 (2013.01) [G06F 16/184 (2019.01); H04L 9/0816 (2013.01); H04L 63/1416 (2013.01); G06F 2221/2107 (2013.01)] | 30 Claims |
1. A system comprising:
at least one hardware processor; and
at least one memory storing instructions that cause the at least one hardware processor to perform operations comprising:
generating a file encryption key based on a first private key of a user and a root key associated with a primary deployment of a database system;
encoding file data at a source account of the user, the source account configured at the primary deployment of the database system, and the encoding using the file encryption key;
performing replication of the file data from the source account into a target account of the user to generate replicated file data;
detecting a network intrusion event associated with the source account of the user;
generating a notification of the network intrusion event for transmission to the user; and
performing a failover of the source account to the target account of the user based on the notification, the failover granting the user access to the replicated file data based at least on a second private key of the user.
|