Application Scenarios

2024-08-21 02:12:34

Regulation Compliance

In response to the requirements of industry policies, Database Audit covers the security audit of database systems, with rich built-in reports to quickly and easily pass compliance reviews.

Data Leakage Prevention

Database Audit has more than 900 built-in security rules, which can accurately identify security issues that are likely to lead to data leakage, such as data reduction, credential stuffing, brute force attacks, and large-traffic responses. The bidirectional audit function ensures a comprehensive audit of database requests and responses, and sends alarms for and contains data leakage at the earliest stage.

SQL Injection Detection

Database Audit has rich SQL injection rules built-in, which can accurately identify SQL injections, including Boolean-based blind injection, OR injection, SLEEP time-based blind injection, BENCHMARK time-based blind injection, GENERATE_SERIES time-based blind injection, RECEIVE_MESSAGE time-based blind injection, WAITFOR time-based blind injection, GET_LOCK time-based blind injection, and CTXSYS_DRITHSX_SN error-based injection. It issues timely alarms to effectively cut off continuous external attacks.

Vulnerability Exploit Detection

Criminals may use scanning devices to detect vulnerabilities in the database and then exploit the vulnerabilities to steal data. Database Audit has built-in security rules that can detect multiple types of vulnerability exploits, such as buffer overflow, stored procedure abuse, covert channel attacks, and denial of service (DoS) attacks.

Account Security Risk Detection

Database account security risks can also lead to data security incidents. Database Audit monitors abnormal account login behaviors, such as credential stuffing, brute force attacks, and password expiration, to prevent malicious incidents caused by database account security risks.

Data Leakage Detection

Responses to database access contain a large amount of valuable information. Excessive data access in a single operation or too frequent data exports may also lead to data leakage. In response, Database Audit can monitor numerous operations that may lead to data leakage, including credential stuffing, database external communications, large-traffic responses, and unauthorized access.

Illegal Operation Detection

The staff of some entities may violate regulations and collaborate with external attackers to steal valuable data for personal gain. In response, Database Audit can monitor illegal operations of application accounts and O&M personnel, database detection and other practices with potential internal violation risks.

Security Prevention

Detailed analysis reports are sent to you regularly for you to fully grasp the database performance, statements, access, sessions, alarms and so on. Database Audit intelligently learns the database behavior routines and issues alarms for behaviors that exceed the baseline to prevent issues before they even happen.


7tHwNeRcOgyd