Updated on 2024-07-01 GMT+08:00

Event Management

DSC integrates with key security components, including Database Audit, Cloud Bastion Host, API Security, Database Encryption and Access Control, and Database O&M, enabling centralized event management and real-time event delivery to DSC. This allows users to promptly verify and handle events. You can also convert alarms on the Alarm Management page to events.

Prerequisites

DBSS/CBH has been enabled and there are assets on it.

Creating an Event

  1. Log in to the management console.
  2. Click in the upper left corner and select a region or project.
  3. In the navigation tree on the left, click . Choose Security and Compliance > Data Security Center .
  4. In the navigation tree on the left, choose Data Security Operations > Event Management. The Event Management page is displayed.
  5. Click Create in the upper left corner. The page for creating an event is displayed.
  6. Set the event parameters based on Table 1.

    Table 1 Event parameters

    Parameter

    Description

    Event Name

    The value can contain 4 to 255 characters, including letters, digits, hyphens (-), and underscores (_), and must start with a letter.

    Type

    Select an event type from the drop-down list box.

    • Databases
      • SQL Injection
      • Risky operations
    • Application APIs
      • Unauthorized access
      • Login security
      • Interface security
      • Service security
      • Data security

    Event Level

    Select an event level from the drop-down list box.

    • Suggestion
    • Low
    • Medium
    • High
    • Critical

    Status

    Select a status from the drop-down list box.

    • Open
    • Blocked
    • Closed

    Module

    Select a source function module from the drop-down list box.

    • Database auditor
    • Cloud bastion host
    • Database encryption gateway
    • Database operation
    • API security gateway

    Instance

    Select an event source instance from the drop-down list box.

    Owner

    Select an event handling owner from the drop-down list box.

    Affected Assets (Optional)

    Enter the information about the assets affected by the event.

    Occurred On

    Time when an event occurs for the first time.

    Planned Closure Time

    Time when an event is planned to be closed.

    Recommended Handling Method (Optional)

    Enter the recommended event handling method. A maximum of 1000 characters can be entered.

    Verification Status

    Select an event verification status from the drop-down list box.

    • Unknown
    • Confirmed
    • False

    Description

    Enter the event description.

  7. Click OK.

Viewing the Event Management List

  1. Log in to the management console.
  2. Click in the upper left corner and select a region or project.
  3. In the navigation tree on the left, click . Choose Security and Compliance > Data Security Center .
  4. In the navigation tree on the left, choose Data Security Operations > Event Management. The Event Management page is displayed.
  5. View the number of unhandled events and the total number of events, as shown in Figure 1.

    The doughnut chart displays the number of expired and unexpired events.

    Figure 1 Event handling statistics

  6. View the alarm list. For details about the parameters, see Table 2.

    Figure 2 Event parameters
    Table 2 Data risk event parameters

    Parameter

    Description

    Event Name/ID

    • Name of an event. The event name should denote the content of the event. You can click the event name on the right of the event name to view the basic information, handling suggestions, and associated alarms of the event.
    • Click the event name to view the event details.

    Event Level

    There are five event levels:

    • Suggestion
    • Low
    • Medium
    • High
    • Critical

    Subcategory/Category

    Event sources are classified into the following categories:

    • Database attacks
    • API attacks

    Source

    Database Audit, Database Security Gateway, and API Security Gateway instances

    Status

    The status options are:

    • Open
    • Blocked
    • Closed

    Affected Assets

    Affected database assets or APIs.

    Verification Status

    Its value can be:

    • Unknown
    • Confirmed
    • False

    Owner

    Username.

    Created

    Event creation time

    Occurred On

    Time when an event occurs for the first time.

    Planned Closure Time

    Time when an event is planned to be closed.

Related Operations

  • Close
    • Click Close in the Operation column of the alarm list to disable the alarm.
  • Edit

    Click Edit in the Operation column of the alarm list to edit the alarm.

  • Delete

    Click Delete in the Operation column of the alarm list to delete the alarm.