Updated on 2023-12-27 GMT+08:00

DBSS

Database Security Service (DBSS) provides the database audit service in out-of-path mode. It records user access to the database in real time, generates fine-grained audit reports, sends real-time alarms for high-risk operations and attacks. In addition, database audit generates compliance reports that meet data security standards (such as Sarbanes-Oxley) to locate internal violations and improper operations, thus ensuring data asset security.

Supported Databases

Database audit provides the audit function in out-of-path mode for the following databases on the management console:
  • Relational Database Service (RDS)
  • Databases built on ECS
  • Databases built on BMS

Database audit supports the following database types and versions.

Table 1 Database types and versions supported by database audit

Database Type

Edition

MySQL

  • 5.0, 5.1, 5.5, 5.6, 5.7
  • 8.0 (8.0.11 and earlier)
  • 8.0.23

Oracle

  • 11g

    11.1.0.6.0, 11.2.0.1.0, 11.2.0.2.0, 11.2.0.3.0, and 11.2.0.4.0

  • 12c

    12.1.0.2.0, 12.2.0.1.0

  • 19c

PostgreSQL

  • 7.4
  • 8.0

    8.0, 8.1, 8.2, 8.3, 8.4

  • 9.0

    9.0, 9.1, 9.2, 9.3, 9.4, 9.5, 9.6

  • 10.0

    10.0, 10.1, 10.2, 10.3, 10.4, 10.5

  • 11.0
  • 12.0
  • 13.0

SQL Server

  • 2008, 2008R2
  • 2012
  • 2014
  • 2016
  • 2017

DWS

  • 1.5

SHENTONG

V7.0

GBase 8a

V8.5

GBase 8s

V8.8

Gbase XDM Cluster

V8.0

TAURUS

MySQL 8.0

Service Features

  • Back up and restore database audit logs and meet the audit data retention requirements.
  • Monitor risks, sessions, session distribution, and SQL distribution in real time.
  • Report alarms for risky behaviors and attacks and responds to database attacks in real time.
  • Locate internal violations and improper operations and keep data assets secure.
Deployed in out-of-path pattern, database audit can perform flexible audit on the database without affecting user services.
  • Monitors database login, operation type (data definition, operation, and control), and operation object based on risky operations to effectively audit the database.
  • Analyzes risks, sessions, and SQL injection to help you master the database situation in a timely manner.
  • Provides a report template library to generate daily, weekly, or monthly audit reports according to your configurations. Sends real-time alarm notifications to help you obtain audit reports in a timely manner.