doc-exports/docs/dbss/umn/dbss_01_0237.html
Li, Qiao 6eff629de3 First upload for DBSS UMN.
Reviewed-by: Belejkanic, Lukas <lukas.belejkanic@t-systems.com>
Co-authored-by: Li, Qiao <qiaoli@huawei.com>
Co-committed-by: Li, Qiao <qiaoli@huawei.com>
2023-08-07 08:50:48 +00:00

3.5 KiB

Functions

Database audit delivers functions such as user behavior detection and audit, multi-dimensional lead analysis, real-time alarms, and reports.

  • User Behavior Detection and Audit
    • Associates access operations in the application layer with those in the database layer.
    • Uses built-in or user-defined privacy data protection rules to mask private data (such as accounts and passwords) in audit logs displayed on the console.
  • Multi-dimensional Lead Analysis
    • Behavior analysis

      Supports analysis in multiple dimensions, such as audit duration, statement quantity, risk quantity, risk distribution, session statistics, and SQL distribution.

    • Session analysis

      Conducts analysis based on time, user, IP address, and client.

    • Statement analysis

      Provides multiple search criteria, such as time, risk severity, user, client IP address, database IP address, operation type, and rule.

  • Real-time Alarms for Risky Operations and SQL Injection
    • Risky operation

      Defines a risky operation in fine-grained dimensions such as operation type, operation object, and risk severity.

    • SQL injection

      Provides an SQL injection library, which facilitates alarm reporting for database exceptions based on the SQL command feature or risk severity.

    • System resource

      Reports alarms when the usage of system resources (CPU, memory, and disk) reaches configured threshold.

  • Fine-grained Reports for Various Abnormal Behaviors
    • Session behavior

      Provides session analysis report of the client and database users.

    • Risky operation

      Provides the risk distribution and analysis report.