This section describes how to audit the security of a relational database instance. (Applications connected to this DB instance are deployed on ECS.) DBSS can audit certain types of relational databases without installing agents.
DBSS without agents is easy to configure and use, but the following functions are not supported:
GaussDB(DWS) has the permission control policy for the log audit function. Only accounts and users with the Security Administrator permission can enable or disable the DWS database audit function.
The DBSS instance receives the logs sent from databases, such as certain GaussDB(for MySQL) or RDS for MySQL versions, and saves the logs to its log library for security analysis, aggregation statistics, and compliance analysis.
Take the GaussDB(for MySQL) database as an example. Assume you need to locate and track internal violations and improper operations in the database to meet compliance requirements. This section describes how to enable the database audit function and check audit results.
The database audit instance and the database to be audited must be in the same region.
Configure and apply for the database audit service. For details, see the "Database Audit Instance" section.
After applying for database audit, add a database to the database audit instance and enable audit for the database.
You can check audit results on the dashboard page, or generate, preview, or download reports.
In the navigation pane, choose Dashboard.
The Dashboard page displays the audit duration, total number of SQL statements and risks, statements and risks today, and today's sessions of an instance.
You can click the Statements or Sessions tab to view session distribution.
The Reports page will be displayed. You can view the report status on this page. After a report is generated, you can click Preview or choose . See Figure 2.
To preview a report online, use Google Chrome or Mozilla FireFox.