当前位置:网站首页>How to deal with data leakage and deletion related to business life and death?
How to deal with data leakage and deletion related to business life and death?
2020-11-07 20:15:00 【InfoQ】
One 、 introduction
1. What is database auditing ?
For a warehouse , If you want to guard against theft , The common practice is to install monitoring at the entrance and exit , Once there's a problem , Call the monitor to find the abnormal situation . It's similar to databases , There's also access to the database , Monitor all connections and entrances , You can record all the movements , Once there's a problem , By querying historical actions and analyzing them , You can find key information .
Therefore, database audit can be understood as recording the user's behavior of accessing the database , Positioning illegal actions , Go back to the source afterwards , The function of improving database security .
2. Common auditing methods
Common audit methods include the following categories :
(1) Application level audit
Audit directly in the application system , Before the statement is sent to the database background, the audit is done first , Does not affect database performance , I don't care what database is used at the bottom , But the pressure on the application system is relatively large , And the application system needs to parse statements , There's a certain amount of complexity .
(2) Transport layer audit
Often capture packet parsing implementation , It has no effect on the upper and lower levels , But also parse the statement , There's a certain amount of complexity , And if the transport layer is communicating through encryption , Will not be able to parse .
(3) Kernel audit
Directly on the kernel , All functions can be realized , It also minimizes performance impact , But it will have an impact on backstage stability , High requirements for developers , Whether it's open source or not , Will be very careful to support auditing directly on the kernel .
(4) Plug in audit
For open source databases , There are usually plug-ins to add functionality . Auditing can be embedded directly in the kernel as plug-ins , Of course, it will have a certain impact on database performance , But also because it's directly embedded in the kernel , A lot of first-hand information can be obtained directly , For example, if there is no way to avoid the above syntax parsing, there is no need to do , And it can also get more information about the running state directly , Can develop powerful and flexible audit functions .
Link to the original text :【https://www.infoq.cn/article/a4DNNeVBNuGqLJMR0HhK】. Without the permission of the author , Prohibited reproduced .
版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
边栏推荐
- chrome浏览器跨域Cookie的SameSite问题导致访问iframe内嵌页面异常
- C language I blog assignment 03
- Opencv computer vision learning (10) -- image transform (Fourier transform, high pass filter, low pass filter)
- 【QT】QThread原始碼淺析
- 站外推广的计划需要考虑哪些呢?
- [random talk] the goal and way of software design
- PHP security: the past and present of variables
- Awk implements SQL like join operation
- HMS Core推送服务,助力电商App开展精细化运营
- 盘点那些争议最大的编程观点,你是什么看法呢?
猜你喜欢
随机推荐
编程界大佬教你:一行Python代码能做出哪些神奇的事情?
After pulling four message queues into a group, they quarreled
屏读时代,我们患上了注意力缺失候群症
Tips for Mac novices
Mac新手必备小技巧
Deep into web workers (1)
PHP安全:变量的前世今生
Come on in! Take a few minutes to see how reentrantreadwritelock works!
快進來!花幾分鐘看一下 ReentrantReadWriteLock 的原理!
工作1-3年的程序员,应该具备怎么样的技术能力?该如何提升?
DOM node operation
STlink下载出现st-link usb communication error解决方法
Technical debt is a lack of real understanding of business functions- daverupert.com
使用“1”个参数调用“DownloadString”时发生异常:“操作超时”
Andque.
盘点那些争议最大的编程观点,你是什么看法呢?
Awk implements SQL like join operation
laravel8更新之维护模式改进
Classroom exercises
【C++学习笔记】C++ 标准库 std::thread 的简单使用,一文搞定还不简单?