Help Center > > Service Overview> DBSS


Updated at: Feb 04, 2021 GMT+08:00

Database Security Service (DBSS) is developed based on Huawei's 30 years of experience in database security practices. It provides database audit services in bypass mode, records user access to the database in real time, generates fine-grained audit reports, and reports real-time alarms on risky operations and attack behaviors. In addition, database audit generates compliance reports that meet data security standards (such as Sarbanes-Oxley) to locate internal violations and improper operations, thus ensuring data asset security.

Database audit provides the database audit function in bypass disposition pattern for the following databases on HUAWEI CLOUD:

  • RDS instances
  • Databases on ECSs
  • Databases on BMSs
Database audit supports the following database types and versions.
Table 1 Database types and versions supported by database audit

Database Type



  • 5.0, 5.1, 5.5, 5.6, 5.7
  • 8.0


  • 11g,,,, and

  • 12c,

  • 19c


  • 7.4
  • 8.0, 8.1, 8.2, 8.3, 8.4
  • 9.0, 9.1, 9.2, 9.3, 9.4, 9.5, 9.6
  • 10.0, 10.1, 10.2, 10.3, 10.4, 10.5
  • 11

SQL Server

  • 2008, 2008R2
  • 2012
  • 2014
  • 2016
  • 2017



GaussDB for Mysql

Mysql 8.0





Database audit can:
  • Help you meet security compliance requirements.
    • Comply with DJCP (graded protection) standards for database audit.
    • Comply with security laws and regulations, and provide compliance reports that meet data security standards (such as Sarbanes-Oxley).
  • Back up and restore database audit logs and meet the audit data retention requirements.
  • Monitor risks, sessions, session distribution, and SQL distribution in real time.
  • Report alarms for risky behaviors and attacks and responds to database attacks in real time.
  • Locate internal violations and improper operations and keep data assets secure.
Deployed in bypass pattern, database audit can perform flexible audit on the database without affecting user services.
  • Monitors database login, operation type (data definition, operation, and control), and operation object based on risky operations to effectively audit the database.
  • Analyzes risks, sessions, and SQL injection to help you master the database situation in a timely manner.
  • Provides a report template library to generate daily, weekly, or monthly audit reports according to your configurations. Sends real-time alarm notifications to help you obtain audit reports in a timely manner.

Did you find this page helpful?

Submit successfully!

Thank you for your feedback. Your feedback helps make our documentation better.

Failed to submit the feedback. Please try again later.

Which of the following issues have you encountered?

Please complete at least one feedback item.

Content most length 200 character

Content is empty.

OK Cancel