DBSS Editions and Specifications
Online SQL statements are counted based on the assumption that each one is 1 KB.
Why Huawei Cloud DBSS?
Multi-dimensional audits and attack source tracing
Functions such as user behavior detection and audit, multi-dimensional analysis are provided for RDS databases and self-built databases on ECS/BMS.
Database audit trails to help trace attackers. Traces can be performed based on the source IP address, user identity, access time, or operations performed.
Meet compliance requirements
Audit reports, log masking, and remote log storage.
Monitoring and cybersecurity protection, network logs stored for at least 180 days.
Simplified deployment and quick identification
DBSS implements 99%+ application association audit and accurate protocol analysis. You can import tens of thousands of data records per second, store mass data, and process hundreds of millions of data records within seconds.
DBSS is deployed in out-of-path mode. It is simple to set up and operate. Agent-free audit is supported for MySQL and GaussDB(for MySQL).
Refined exception monitoring and risk alarms
Users can specify the type, operation object, and risk level of operations to be monitored.
DBSS provides an SQL injection library, which facilitates alarm reporting for database exceptions based on the SQL command feature or risk severity.
Multi-dimensional Audit, a Powerful Tool for Protecting Cloud Data Security
Multi-dimensional Audit, a Powerful Tool for Protecting Cloud Data Security
Auditing an RDS DB Instance
Database audit is deployed in bypass mode. Traffic data is uploaded to the audit system where you can enter various commands to conduct a security audit of your RDS databases.
Auditing a Self-built Database on ECS
The database audit agent is deployed on the database. It uploads traffic data to the audit system, where it can receive various system commands. The agent helps you audit the security of self-built ECS databases.
Checking for Slow SQL Statements
You can learn the execution duration, number of affected rows, and database details for slow SQL statements, and optimize the statements accordingly.
Detecting Dirty Tables in the Database
Unnecessary databases, tables, or columns are called dirty tables. This function can identify dirty table, which can often contain malware.