DBSS
Database Security Service (DBSS) is an intelligent database security service. Based on the big data analytics technologies, it can audit your databases, detect SQL injection attacks, and identify high-risk operations.
Supported Databases
Database audit provides the audit function in out-of-path disposition pattern for the following databases on Huawei Cloud:
- Relational Database Service (RDS)
- Databases built on ECS
- Databases built on BMS
Databases of some types and versions can be audited without using agents, as shown in Table 1.
Type |
Supported Edition |
---|---|
MySQL |
All editions are supported by default. |
PostgreSQL
NOTICE:
If the size of an SQL statement exceeds 4 KB, the SQL statement will be truncated during auditing. As a result, the SQL statement is incomplete. |
All editions are supported by default. |
SQLServer |
|
GaussDB(for MySQL) |
Mysql8.0 |
DWS |
|
MariaDB |
10.2 |
Database audit supports the following database types and versions.
Database Type |
Edition |
---|---|
MySQL |
|
Oracle (The Oracle database uses closed-source protocol and has complex adaptation versions. If you need to audit the Oracle database, contact customer service.) |
|
PostgreSQL |
|
SQL Server |
|
GaussDB(for MySQL) |
MySQL 8.0 |
DWS |
|
DAMENG |
DM8 |
KINGBASE |
V8 |
SHENTONG |
V7.0 |
GBase 8a |
V8.5 |
GBase 8s |
V8.8 |
Gbase XDM Cluster |
V8.0 |
Greenplum |
V6.0 |
HighGo |
V6.0 |
GaussDB |
|
MongoDB |
V5.0 |
DDS |
4.0 |
Hbase (Supported by CTS instance 23.02.27.182148 and later versions) |
1.3.1 2.2.3 |
Hive |
1.2.2 2.3.9 3.1.2 3.1.3 |
MariaDB |
10.6 |
TDSQL |
10.3.17.3.0 |
Service Features
- Help you meet security compliance requirements.
- Comply with DJCP (graded protection) standards for database audit.
- Comply with security laws and regulations, and provide compliance reports that meet data security standards (such as Sarbanes-Oxley).
- Back up and restore database audit logs and meet the audit data retention requirements.
- Monitor risks, sessions, session distribution, and SQL distribution in real time.
- Report alarms for risky behaviors and attacks and responds to database attacks in real time.
- Locate internal violations and improper operations and keep data assets secure.
- Monitors database login, operation type (data definition, operation, and control), and operation object based on risky operations to effectively audit the database.
- Analyzes risks, sessions, and SQL injection to help you master the database situation in a timely manner.
- Provides a report template library to generate daily, weekly, or monthly audit reports according to your configurations. Sends real-time alarm notifications to help you obtain audit reports in a timely manner.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot