当前位置:网站首页>How to deal with data leakage and deletion related to business life and death?
How to deal with data leakage and deletion related to business life and death?
2020-11-07 20:15:00 【InfoQ】
One 、 introduction
1. What is database auditing ?
For a warehouse , If you want to guard against theft , The common practice is to install monitoring at the entrance and exit , Once there's a problem , Call the monitor to find the abnormal situation . It's similar to databases , There's also access to the database , Monitor all connections and entrances , You can record all the movements , Once there's a problem , By querying historical actions and analyzing them , You can find key information .
Therefore, database audit can be understood as recording the user's behavior of accessing the database , Positioning illegal actions , Go back to the source afterwards , The function of improving database security .
2. Common auditing methods
Common audit methods include the following categories :
(1) Application level audit
Audit directly in the application system , Before the statement is sent to the database background, the audit is done first , Does not affect database performance , I don't care what database is used at the bottom , But the pressure on the application system is relatively large , And the application system needs to parse statements , There's a certain amount of complexity .
(2) Transport layer audit
Often capture packet parsing implementation , It has no effect on the upper and lower levels , But also parse the statement , There's a certain amount of complexity , And if the transport layer is communicating through encryption , Will not be able to parse .
(3) Kernel audit
Directly on the kernel , All functions can be realized , It also minimizes performance impact , But it will have an impact on backstage stability , High requirements for developers , Whether it's open source or not , Will be very careful to support auditing directly on the kernel .
(4) Plug in audit
For open source databases , There are usually plug-ins to add functionality . Auditing can be embedded directly in the kernel as plug-ins , Of course, it will have a certain impact on database performance , But also because it's directly embedded in the kernel , A lot of first-hand information can be obtained directly , For example, if there is no way to avoid the above syntax parsing, there is no need to do , And it can also get more information about the running state directly , Can develop powerful and flexible audit functions .
Link to the original text :【https://www.infoq.cn/article/a4DNNeVBNuGqLJMR0HhK】. Without the permission of the author , Prohibited reproduced .
版权声明
本文为[InfoQ]所创,转载请带上原文链接,感谢
边栏推荐
猜你喜欢
嘉宾专访|2020 PostgreSQL亚洲大会阿里云数据库专场:王旭
11. Service update
The JS solution cannot be executed after Ajax loads HTML
Big data algorithm - bloon filter
HMS Core推送服务,助力电商App开展精细化运营
一万四千字分布式事务原理解析,全部掌握你还怕面试被问?
深入浅出大前端框架Angular6实战教程(Angular6、node.js、keystonejs、
chrome浏览器跨域Cookie的SameSite问题导致访问iframe内嵌页面异常
Huawei HCIA notes
C语言I博客作业03
随机推荐
当 TiDB 与 Flink 相结合:高效、易用的实时数仓
【QT】QThread原始碼淺析
Let you have a deep understanding of gitlab CI / CD principle and process
The most hard core of the whole network explains the computer startup process
Git submission specification
Exception calling 'downloadstring' with '1' arguments: 'operation timed out'
Mate 40系列发布 搭载华为运动健康服务带来健康数字生活
不懂数据库索引的底层原理?那是因为你心里没点b树
高级并发编程系列九(Lock接口分析)
Solution to st link USB communication error in stlink Download
OpenCV計算機視覺學習(10)——影象變換(傅立葉變換,高通濾波,低通濾波)
Microservice - how to limit and fuse service current
STlink下载出现st-link usb communication error解决方法
聊聊先享後付
Is blazor ready to serve the enterprise?
graph generation model
Opencv computer vision learning (10) -- image transform (Fourier transform, high pass filter, low pass filter)
In simple terms, the large front-end framework angular6 practical course (angular6 node.js 、keystonejs、
快速上手Git
Classroom exercises