当前位置:网站首页>How to deal with data leakage and deletion related to business life and death?
How to deal with data leakage and deletion related to business life and death?
2020-11-07 20:15:00 【InfoQ】
One 、 introduction
1. What is database auditing ?
For a warehouse , If you want to guard against theft , The common practice is to install monitoring at the entrance and exit , Once there's a problem , Call the monitor to find the abnormal situation . It's similar to databases , There's also access to the database , Monitor all connections and entrances , You can record all the movements , Once there's a problem , By querying historical actions and analyzing them , You can find key information .
Therefore, database audit can be understood as recording the user's behavior of accessing the database , Positioning illegal actions , Go back to the source afterwards , The function of improving database security .
2. Common auditing methods
Common audit methods include the following categories :
(1) Application level audit
Audit directly in the application system , Before the statement is sent to the database background, the audit is done first , Does not affect database performance , I don't care what database is used at the bottom , But the pressure on the application system is relatively large , And the application system needs to parse statements , There's a certain amount of complexity .
(2) Transport layer audit
Often capture packet parsing implementation , It has no effect on the upper and lower levels , But also parse the statement , There's a certain amount of complexity , And if the transport layer is communicating through encryption , Will not be able to parse .
(3) Kernel audit
Directly on the kernel , All functions can be realized , It also minimizes performance impact , But it will have an impact on backstage stability , High requirements for developers , Whether it's open source or not , Will be very careful to support auditing directly on the kernel .
(4) Plug in audit
For open source databases , There are usually plug-ins to add functionality . Auditing can be embedded directly in the kernel as plug-ins , Of course, it will have a certain impact on database performance , But also because it's directly embedded in the kernel , A lot of first-hand information can be obtained directly , For example, if there is no way to avoid the above syntax parsing, there is no need to do , And it can also get more information about the running state directly , Can develop powerful and flexible audit functions .
Link to the original text :【https://www.infoq.cn/article/a4DNNeVBNuGqLJMR0HhK】. Without the permission of the author , Prohibited reproduced .
版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
边栏推荐
- 不要把异常当做业务逻辑,这性能可能你无法承受
- Opencv computer vision learning (10) -- image transform (Fourier transform, high pass filter, low pass filter)
- 如何高效的学习技术
- OpenCV計算機視覺學習(10)——影象變換(傅立葉變換,高通濾波,低通濾波)
- Analysis of the original code of [QT] qthread
- graph generation model
- Solution to st link USB communication error in stlink Download
- Why do we need software engineering -- looking at a simple project
- 栈-括号的匹配
- AFO记
猜你喜欢
Big data algorithm - bloon filter
Ac86u KX Online
Don't treat exceptions as business logic, which you can't afford
CI / CD of gitlab continuous integrated development environment
A kind of super parameter optimization technology hyperopt
How to learn technology efficiently
Rech8.0 learning days 12 rh134
Git submission specification
我们为什么需要软件工程——从一个简单的项目进行观察
The samesite problem of cross domain cookie of Chrome browser results in abnormal access to iframe embedded pages
随机推荐
使用 Xunit.DependencyInjection 改造测试项目
What should be considered in the promotion plan outside the station?
Key points of C language -- index article (let you fully understand indicators) | understand indicators from memory | complete analysis of indicators
凯撒密码实现
The most hard core of the whole network explains the computer startup process
11.Service更新
Vue: Axios uses this pointer
graph generation model
bgfx编译教程
Using thread communication to solve the problem of cache penetrating database avalanche
想要忘记以前连接到Mac的WiFi网络,试试这个方法!
不要把异常当做业务逻辑,这性能可能你无法承受
awk实现类sql的join操作
vscode 配置
C# 枚举权限 |和||,&和&&的区别
Reflection on a case of bus card being stolen and swiped
动态规划——用二进制表示集合的状态压缩DP
DOM node operation
Chinese sub forum of | 2020 PostgreSQL Asia Conference: Pan Juan
廬山真面目之二微服務架構NGINX版本實現