当前位置:网站首页>How to deal with data leakage and deletion related to business life and death?
How to deal with data leakage and deletion related to business life and death?
2020-11-07 20:15:00 【InfoQ】
One 、 introduction
1. What is database auditing ?
For a warehouse , If you want to guard against theft , The common practice is to install monitoring at the entrance and exit , Once there's a problem , Call the monitor to find the abnormal situation . It's similar to databases , There's also access to the database , Monitor all connections and entrances , You can record all the movements , Once there's a problem , By querying historical actions and analyzing them , You can find key information .
Therefore, database audit can be understood as recording the user's behavior of accessing the database , Positioning illegal actions , Go back to the source afterwards , The function of improving database security .
2. Common auditing methods
Common audit methods include the following categories :
(1) Application level audit
Audit directly in the application system , Before the statement is sent to the database background, the audit is done first , Does not affect database performance , I don't care what database is used at the bottom , But the pressure on the application system is relatively large , And the application system needs to parse statements , There's a certain amount of complexity .
(2) Transport layer audit
Often capture packet parsing implementation , It has no effect on the upper and lower levels , But also parse the statement , There's a certain amount of complexity , And if the transport layer is communicating through encryption , Will not be able to parse .
(3) Kernel audit
Directly on the kernel , All functions can be realized , It also minimizes performance impact , But it will have an impact on backstage stability , High requirements for developers , Whether it's open source or not , Will be very careful to support auditing directly on the kernel .
(4) Plug in audit
For open source databases , There are usually plug-ins to add functionality . Auditing can be embedded directly in the kernel as plug-ins , Of course, it will have a certain impact on database performance , But also because it's directly embedded in the kernel , A lot of first-hand information can be obtained directly , For example, if there is no way to avoid the above syntax parsing, there is no need to do , And it can also get more information about the running state directly , Can develop powerful and flexible audit functions .
Link to the original text :【https://www.infoq.cn/article/a4DNNeVBNuGqLJMR0HhK】. Without the permission of the author , Prohibited reproduced .
版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
边栏推荐
猜你喜欢

Application and principle of handlermethodargumentresolver

Big data algorithm - bloon filter

垃圾分类知识竞赛

A kind of super parameter optimization technology hyperopt

C语言I博客作业03

laravel8更新之维护模式改进

年薪90万程序员不如月入3800公务员?安稳与高收入,到底如何选择?

OpenCV計算機視覺學習(10)——影象變換(傅立葉變換,高通濾波,低通濾波)

C# 枚举权限 |和||,&和&&的区别

Knowledge competition of garbage classification
随机推荐
Deep into web workers (1)
What should be considered in the promotion plan outside the station?
一次公交卡被“盜刷”事件帶來的思考
Business Facade 与 Business Rule
滴滴的分布式ID生成器(Tinyid),好用的一批
微服務 - 如何進行服務限流和熔斷
Web API series (3) unified exception handling
快進來!花幾分鐘看一下 ReentrantReadWriteLock 的原理!
Analysis of the original code of [QT] qthread
小熊派开发板实践:智慧路灯沙箱实验之真实设备接入
【涂鸦物联网足迹】物联网主流通信方式
Exclusive interview with Yue Caibo
留给快手的时间不多了
Win10官方1909版本无法打开windows安全中心中病毒和威胁防护的实时保护解决方案。
C# 枚举权限 |和||,&和&&的区别
[note] error while loading pyv8 binary: exit code 1 solution
DOM节点操作
HandlerMethodArgumentResolver使用和原理
Exception calling 'downloadstring' with '1' arguments: 'operation timed out'
PHP安全:变量的前世今生