当前位置:网站首页>How to deal with data leakage and deletion related to business life and death?
How to deal with data leakage and deletion related to business life and death?
2020-11-07 20:15:00 【InfoQ】
One 、 introduction
1. What is database auditing ?
For a warehouse , If you want to guard against theft , The common practice is to install monitoring at the entrance and exit , Once there's a problem , Call the monitor to find the abnormal situation . It's similar to databases , There's also access to the database , Monitor all connections and entrances , You can record all the movements , Once there's a problem , By querying historical actions and analyzing them , You can find key information .
Therefore, database audit can be understood as recording the user's behavior of accessing the database , Positioning illegal actions , Go back to the source afterwards , The function of improving database security .
2. Common auditing methods
Common audit methods include the following categories :
(1) Application level audit
Audit directly in the application system , Before the statement is sent to the database background, the audit is done first , Does not affect database performance , I don't care what database is used at the bottom , But the pressure on the application system is relatively large , And the application system needs to parse statements , There's a certain amount of complexity .
(2) Transport layer audit
Often capture packet parsing implementation , It has no effect on the upper and lower levels , But also parse the statement , There's a certain amount of complexity , And if the transport layer is communicating through encryption , Will not be able to parse .
(3) Kernel audit
Directly on the kernel , All functions can be realized , It also minimizes performance impact , But it will have an impact on backstage stability , High requirements for developers , Whether it's open source or not , Will be very careful to support auditing directly on the kernel .
(4) Plug in audit
For open source databases , There are usually plug-ins to add functionality . Auditing can be embedded directly in the kernel as plug-ins , Of course, it will have a certain impact on database performance , But also because it's directly embedded in the kernel , A lot of first-hand information can be obtained directly , For example, if there is no way to avoid the above syntax parsing, there is no need to do , And it can also get more information about the running state directly , Can develop powerful and flexible audit functions .
Link to the original text :【https://www.infoq.cn/article/a4DNNeVBNuGqLJMR0HhK】. Without the permission of the author , Prohibited reproduced .
版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
边栏推荐
- Classroom exercises
- ajax 载入html后不能执行其中的js解决方法
- 快速上手Git
- 「混合云」会是云计算的下一个战场吗?
- vscode 配置
- C language I blog assignment 03
- Reflection on a case of bus card being stolen and swiped
- The JS solution cannot be executed after Ajax loads HTML
- 使用RabbitMQ实现分布式事务
- Key points of C language -- index article (let you fully understand indicators) | understand indicators from memory | complete analysis of indicators
猜你喜欢
vscode 配置
【涂鸦物联网足迹】物联网主流通信方式
CI / CD of gitlab continuous integrated development environment
Advanced concurrent programming series 9 (lock interface analysis)
awk实现类sql的join操作
C language I blog assignment 03
Using rabbitmq to implement distributed transaction
Git submission specification
Code Review最佳实践
课堂练习
随机推荐
Classroom exercises
嘉宾介绍|2020 PostgreSQL亚洲大会中文分论坛:潘娟
Win10官方1909版本无法打开windows安全中心中病毒和威胁防护的实时保护解决方案。
Exclusive interview with Yue Caibo
【原創】ARM平臺記憶體和cache對xenomai實時性的影響
从技术谈到管理,把系统优化的技术用到企业管理
Solution to st link USB communication error in stlink Download
一次公交卡被“盜刷”事件帶來的思考
A kind of super parameter optimization technology hyperopt
课堂练习
留给快手的时间不多了
Didi's distributed ID generator (tinyid), easy to use
课堂练习
The official 1909 version of win10 cannot open the real-time protection solution of virus and threat protection in windows security center.
[漫谈] 软件设计的目标和途径
编程界大佬教你:一行Python代码能做出哪些神奇的事情?
The JS solution cannot be executed after Ajax loads HTML
Come on in! Take a few minutes to see how reentrantreadwritelock works!
聊聊Go代码覆盖率技术与最佳实践
【笔记】Error while loading PyV8 binary: exit code 1解决方法