Auditing an RDS Database

2025-06-11 01:35:20

Background

In order to protect the data security of a database, prevent various attacks, and meet national security compliance requirements, protecting your database is a must.

Database Audit provides you with the database security auditing function in a bypass mode. It records user access to the database in real time, generates fine-grained audit reports, and sends real-time alarms for high-risk operations and attacks. In addition, Database Audit generates compliance reports that meet data security standards (e.g., Sarbanes-Oxley) to locate internal violations and improper operations, thus ensuring data asset security.

 

Step 1: Purchase a Database Audit Instance

You need to purchase Database Audit instances and configure database security audit parameters based on your business requirements. For detailed operations, see Purchase Database Audit Instance.

 

Step 2: Add Database Assets

1. In the left menu, select Assets > Asset Management to enter the Asset Management page, select the Asset Management tab, and click Add.

2. In the pop-up Add Asset window, edit the relevant information. For the parameter filling rules, see the table below.

Parameter

Parameter Description

Enable   recommended rules when saved

If   this option is checked, the rules recommended by the system will apply to the   added assets when they are saved; if not, the rules recommended by the system   will not apply to the added assets when they are saved.

Type

Select   Relational database. The following takes MySQL 5.7 as an example.

Asset   Group

Set   the asset group to which the asset belongs.

Name

The   name of an asset must consist of Chinese characters, letters, numbers,   underlines (_), dots (.) or dashes (-), within 64   characters.

OS

The   following takes the Linux system as an example.

IP   Port

Set   the IP address and port number of the server where the asset is located.

3. Then, click Save to add the database to the assets.

 

Step 3: Add Agent

1. In the left menu, select System Management > Agent Management, to enter the Agent Management page, select the Agent Installation tab, and select a suitable version of Agent installation package and download.

Note:

  • The downloaded Agent will forward      traffic to the current Database Audit instance by default. If you need to      forward traffic to other Database Audit instances, find the serviceIp      option in the agent.ini configuration file in the unzipped Agent path and      change the address.

  • Whether it is the Linux version      installation package, AIX version installation package or Windows version      installation package, there is a ReadMe document in the folder,      which contains instructions for use, file description, precautions,      running environment description, and configuration file description.      Please read this document carefully before installation and follow the      requirements strictly.

2. After downloading the installation package, upload the Agent installation package to the specified directory of the Linux server.

Description

  • Do not execute binary files      directly.

  • The decompression directory cannot      contain spaces.

  • Each time you change the running or      decompression directory, you need to re-run the installation script.

  • In a Linux environment, you need to      run the script as the root user and specify Bash as the interpreter, or      run the script directly without specifying an interpreter.

3. Use the tar –xf dbAgent_V2.28.tar.gz command to decompress the Agent installation package and enter the Agent installation directory.

4. Execute the ./install.sh command in the installation directory to install the Agent program.


 


FOK.adrm1AqH