dbsec-k8凯发天生赢家

dbsec data security products and services
lower the data breach risks,prevent sensitive data from being threatened,and meet the requirements of laws and regulations
data security products series
dbsec database audit system (das)
product overview
dbsec database audit system (das) is a database security audit system based on database communication protocol analysis and sql statement analysis technologies, featuring comprehensive and efficient database monitor, alarm and tracing capability. based on the behavior analysis, das describes databases risks and attack behaviors efficiently by its powerful risk behavior description language, sends alarm for access behaviors that violated security policies to keep database compliance, achieves database risk inspection and alarming rapidly through its built-in database risk feature library.
product values
compliance
requirement about database security management and auditing that organizaitons have to meet generally are described as follows:
◆information security technology-baseline for classified cybersecurity protection.
◆guidelines for internal control of commercial banks—internal control of computer information system.
◆pci dss—requirement and security assessment procedure (2008).
◆guidelines for e-banking security assessment (2007).
◆new cybersecurity law of the people's republic of china.
challenges
database security events happen frequently, which bring security challenges to database management. database security challenges can be divided into the following three aspects:
auditing: current auditing methods depend completely on the database logs that have many disadvantages, such as the opening of the database audit function may bring a performance loss and place database log files at a risk of being tampered. the authenticity of audit information cannot be guaranteed.
technology: the illegal behaviors of internal users, such as malicious operations, resource abuse and sensitive data breaches, can not be controlled by traditional external security tool, such as firewall, ids, ips, etc.
management: security event can not be traced due to management problems, such as unclear personnel responsibility, improper flow, nonstandard database operation by internal personnel, non-monitor third-party personnel’s operations, etc.
product advantages
comprehensive audit records
das has comprehensive database access audit capabilities based on the database protocol analysis and the professional sql statement grammar and morphology analysis.
◆comprehensive log records
das can audit 4w1h informations, as follows, which is an obvious advantage over traditional database audit products.
who: database username, operating system username, application username.
where: ip address and mac address of the database client, ip address of application client.
what: operating object, specific operation, executed succeed or not, affect rows.
when: happen time, time-consuming.
how: sql statement, parameter.
◆comprehensive audit source
das supports audit: bypass mirroring, data collected by agent, virtual machine vds drainage, remote login behavior, telnet behavior records and traffic from local loopback interfaces.
◆comprehensive database types support
international mainstream databases: oracle, mssql, db2, sybase ase, informix, postgresql, cahcedb, hadoop and mysql.
domestic mainstream database: gbase, dm, kingbase and oscar.
big data: das provides related audit and monitor capabilities for hadoop big data and non relational database to adapt to the analysis market requirement of big data.
database behaviors modeling
das analysis database communication protocal completely. at the beginning of model establishing, it experiences a learning period, classify sql statement templates, and build the database behavior model by combining session information and application associated information. then das analysis efficiently and dig deeply based on the waving status of model sql statements, sends alarm based on modeling analysis when backdoor is startup, to decrease the risk of database information breaches.
◆objects statistics
das can gather statistics of objects, the statistics elements could be: object operation type, access source information object operation type, object operation type affect line numbers, and access source information object operation type affect line numbers.objects statistics enables customers to monitor the operation and access to object tables in real-time. and customers can sign a sensitive table, so as to gather operation statistics and tracing deeply of sensitive table, to monitor the sensitive data.
◆application associated audit
when das audits the application data, it gets the application user information and url information in application session, and associates the application data, the database data, the application operation and database operation to perform associatedly analysis, audit, tracing and statistics. besides, customers can configure rules for application data operation. after that, when security event happens, customers can dig deeply the audit logs according to the alarm information and quickly locates the client in network, to find out the responsible person.
网站地图