当前位置:网站首页>How to deal with data leakage and deletion related to business life and death?
How to deal with data leakage and deletion related to business life and death?
2020-11-07 20:15:00 【InfoQ】
One 、 introduction
1. What is database auditing ?
For a warehouse , If you want to guard against theft , The common practice is to install monitoring at the entrance and exit , Once there's a problem , Call the monitor to find the abnormal situation . It's similar to databases , There's also access to the database , Monitor all connections and entrances , You can record all the movements , Once there's a problem , By querying historical actions and analyzing them , You can find key information .
Therefore, database audit can be understood as recording the user's behavior of accessing the database , Positioning illegal actions , Go back to the source afterwards , The function of improving database security .
2. Common auditing methods
Common audit methods include the following categories :
(1) Application level audit
Audit directly in the application system , Before the statement is sent to the database background, the audit is done first , Does not affect database performance , I don't care what database is used at the bottom , But the pressure on the application system is relatively large , And the application system needs to parse statements , There's a certain amount of complexity .
(2) Transport layer audit
Often capture packet parsing implementation , It has no effect on the upper and lower levels , But also parse the statement , There's a certain amount of complexity , And if the transport layer is communicating through encryption , Will not be able to parse .
(3) Kernel audit
Directly on the kernel , All functions can be realized , It also minimizes performance impact , But it will have an impact on backstage stability , High requirements for developers , Whether it's open source or not , Will be very careful to support auditing directly on the kernel .
(4) Plug in audit
For open source databases , There are usually plug-ins to add functionality . Auditing can be embedded directly in the kernel as plug-ins , Of course, it will have a certain impact on database performance , But also because it's directly embedded in the kernel , A lot of first-hand information can be obtained directly , For example, if there is no way to avoid the above syntax parsing, there is no need to do , And it can also get more information about the running state directly , Can develop powerful and flexible audit functions .
Link to the original text :【https://www.infoq.cn/article/a4DNNeVBNuGqLJMR0HhK】. Without the permission of the author , Prohibited reproduced .
版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
边栏推荐
- Technical debt is a lack of real understanding of business functions- daverupert.com
- The samesite problem of cross domain cookie of Chrome browser results in abnormal access to iframe embedded pages
- 一次公交卡被“盜刷”事件帶來的思考
- 【QT】QThread原始碼淺析
- STlink下载出现st-link usb communication error解决方法
- 【原創】ARM平臺記憶體和cache對xenomai實時性的影響
- 技术总监7年自述——如何选择一家好公司
- C enumerates the differences between permissions |, and |
- vue踩坑:axios使用this指针
- 大数据算法——布隆过滤器
猜你喜欢

全网最硬核讲解计算机启动流程

9.集群之间服务通信 RoutingMesh

vue踩坑:axios使用this指针

傲視Kubernetes(一):Kubernetes簡介

Reflection on a case of bus card being stolen and swiped

Didi's distributed ID generator (tinyid), easy to use

利用线程通信、解决缓存穿透数据库雪崩

Vue: Axios uses this pointer

11. Service update

【笔记】Error while loading PyV8 binary: exit code 1解决方法
随机推荐
如何高效的学习技术
课堂练习
在pandas中使用pipe()提升代码可读性
gitlab 持续集成开发环境之CI/CD
一万四千字分布式事务原理解析,全部掌握你还怕面试被问?
9. Routingmesh service communication between clusters
栈-括号的匹配
Classroom exercises
傲視Kubernetes(一):Kubernetes簡介
想要忘记以前连接到Mac的WiFi网络,试试这个方法!
小熊派开发板实践:智慧路灯沙箱实验之真实设备接入
凯撒密码实现
如何应对事关业务生死的数据泄露和删改?
使用LWA和Lync模拟外部测试无边缘单前端环境
我是如何失去团队掌控的?
Web API系列(三)统一异常处理
chrome浏览器跨域Cookie的SameSite问题导致访问iframe内嵌页面异常
低代码 vs 模型驱动,它们之间到底是什么关系?
【QT】QThread原始碼淺析
聊聊先享後付