Help Center > > Service Overview> DBSS

DBSS

Updated at: Dec 23, 2019 GMT+08:00

Database Security Service (DBSS) provides the database audit service in bypass mode. It records user access to the database in real time, generates fine-grained audit reports, sends real-time alarms for risky operations and attacks. In addition, database audit generates compliance reports that meet data security standards (such as Sarbanes-Oxley) to locate internal violations and improper operations, thus ensuring data asset security.

Database audit provides the database audit function in bypass disposition pattern for the following databases on HUAWEI CLOUD:

  • RDS instances
  • Databases on ECSs
  • Databases on BMSs
Database audit supports the following database types and versions.
Table 1 Database types and versions supported by database audit

Database Type

Version

MySQL

  • 5.0, 5.1, 5.5, 5.6, 5.7
  • 8.0

Oracle

  • 11g

    11.1.0.6.0, 11.2.0.1.0, 11.2.0.2.0, 11.2.0.3.0, and 11.2.0.4.0

  • 12c

    12.1.0.2.0, 12.2.0.1.0

PostgreSQL

  • 7.4
  • 8.0, 8.1, 8.2, 8.3, 8.4
  • 9.0, 9.1, 9.2, 9.3, 9.4, 9.5, 9.6
  • 10.0, 10.1, 10.2, 10.3, 10.4, 10.5
  • 11

SQL Server

  • 2008, 2008R2
  • 2012
  • 2014
  • 2016
  • 2017
Database audit can:
  • Help you meet security compliance requirements.
    • Multi-Level Protection Scheme (MLPS) requirements for database audit
    • China and international laws and regulations and compliance reports that meet data security standards (such as Sarbanes-Oxley)
  • Back up and restore database audit logs and meet the audit data retention requirements.
  • Monitor risks, sessions, session distribution, and SQL distribution in real time.
  • Report alarms for risky behaviors and attacks and responds to database attacks in real time.
  • Locate internal violations and improper operations and keep data assets secure.
Deployed in bypass pattern, database audit can perform flexible audit on the database without affecting user services.
  • Monitors database login, operation type (data definition, operation, and control), and operation object based on risky operations to effectively audit the database.
  • Analyzes risks, sessions, and SQL injection to help you master the database situation in a timely manner.
  • Provides a report template library to generate daily, weekly, or monthly audit reports according to your configurations. Sends real-time alarm notifications to help you obtain audit reports in a timely manner.

Did you find this page helpful?

Submit successfully!

Thank you for your feedback. Your feedback helps make our documentation better.

Failed to submit the feedback. Please try again later.

Which of the following issues have you encountered?







Please complete at least one feedback item.

Content most length 200 character

Content is empty.

OK Cancel