Updated on 2024-04-11 GMT+08:00

Audit and Logs

  • Audit

DBSS can audit all operations performed by database common users and administrators and generate compliance reports. DBSS can record traffic, intrusion, anomaly monitoring, data masking, and remote work, locate the operators of abnormal actions, generate alarms for specific events in real time, and display statistics graphs for top operations. DBSS meets the database audit requirements from ISO 27001 and DJCP compliance standards.

Table 1 DBSS audit function

Function

Description

System operation audit

DBSS records all system operations and reports alarms for high-, medium-, and low-risks operations as configured.

  • SQL Injection Detection: You can add SQL injection rules to audit your databases.
  • Adding Risky Operations: DBSS has built-in rules for detecting data reduction and slow SQL statements. You can also add risky operations and customize detection rules.
  • Alarm Notification: You can configure different alarm reporting methods and alarm severity levels for system operations and your application environment. Once a system exception or abnormal user operation occurs, the system will send you alarm notifications by email or system messages in a timely manner.

Cloud Trace Service (CTS) records operations on the cloud resources in your account. You can use the logs generated by CTS to perform security analysis, track resource changes, audit compliance, and locate faults.

After you enable CTS and configure a tracker, CTS records the management traces of DBSS for auditing.

For details about how to enable and configure CTS, see Enabling CTS.

For details about DBSS operations that can be tracked, see Auditable Operations.

  • Logs

After you enable CTS, the system starts recording operations on DBSS. You can view the operation records of the last 7 days on the CTS console.

For details on how to view CTS logs, see How Do I View CTS Logs?