当前位置:网站首页>How to deal with data leakage and deletion related to business life and death?
How to deal with data leakage and deletion related to business life and death?
2020-11-07 20:15:00 【InfoQ】
One 、 introduction
1. What is database auditing ?
For a warehouse , If you want to guard against theft , The common practice is to install monitoring at the entrance and exit , Once there's a problem , Call the monitor to find the abnormal situation . It's similar to databases , There's also access to the database , Monitor all connections and entrances , You can record all the movements , Once there's a problem , By querying historical actions and analyzing them , You can find key information .
Therefore, database audit can be understood as recording the user's behavior of accessing the database , Positioning illegal actions , Go back to the source afterwards , The function of improving database security .
2. Common auditing methods
Common audit methods include the following categories :
(1) Application level audit
Audit directly in the application system , Before the statement is sent to the database background, the audit is done first , Does not affect database performance , I don't care what database is used at the bottom , But the pressure on the application system is relatively large , And the application system needs to parse statements , There's a certain amount of complexity .
(2) Transport layer audit
Often capture packet parsing implementation , It has no effect on the upper and lower levels , But also parse the statement , There's a certain amount of complexity , And if the transport layer is communicating through encryption , Will not be able to parse .
(3) Kernel audit
Directly on the kernel , All functions can be realized , It also minimizes performance impact , But it will have an impact on backstage stability , High requirements for developers , Whether it's open source or not , Will be very careful to support auditing directly on the kernel .
(4) Plug in audit
For open source databases , There are usually plug-ins to add functionality . Auditing can be embedded directly in the kernel as plug-ins , Of course, it will have a certain impact on database performance , But also because it's directly embedded in the kernel , A lot of first-hand information can be obtained directly , For example, if there is no way to avoid the above syntax parsing, there is no need to do , And it can also get more information about the running state directly , Can develop powerful and flexible audit functions .
Link to the original text :【https://www.infoq.cn/article/a4DNNeVBNuGqLJMR0HhK】. Without the permission of the author , Prohibited reproduced .
版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
边栏推荐
- 当 TiDB 与 Flink 相结合:高效、易用的实时数仓
- Kylin on Kubernetes 在 eBay 的实践
- Why do we need software engineering -- looking at a simple project
- 【QT】QThread原始碼淺析
- 使用LWA和Lync模拟外部测试无边缘单前端环境
- Advanced concurrent programming series 9 (lock interface analysis)
- HMS Core推送服务,助力电商App开展精细化运营
- Classroom exercises
- A kind of super parameter optimization technology hyperopt
- Design pattern of facade and mediator
猜你喜欢
随机推荐
Kubernetes (1): introduction to kubernetes
Huawei HCIA notes
graph generation model
Implementation of nginx version of microservice architecture
深入浅出大前端框架Angular6实战教程(Angular6、node.js、keystonejs、
Ac86u KX Online
PHP security: the past and present of variables
屏读时代,我们患上了注意力缺失候群症
Awk implements SQL like join operation
What should be considered in the promotion plan outside the station?
Is blazor ready to serve the enterprise?
是时候结束 BERTology了
Classroom exercises
vscode 配置
AC86U kx上网
一万四千字分布式事务原理解析,全部掌握你还怕面试被问?
技术债务是对业务功能缺乏真正的理解 -daverupert.com
Didi's distributed ID generator (tinyid), easy to use
Facebook开源框架如何简化 PyTorch 实验
模型预测准确率高达94%!利用机器学习完美解决2000亿美元库存难题




