栏目

Security audit products - Database audit system

Product introduction
Changtai Data Security Audit System (CT-DAS) is a data security protection product developed by Anhui Changtai Technology Co., Ltd. with completely independent intellectual property rights。By monitoring the multiple states and communication contents of the database, the system can not only accurately assess the risks faced by the database, but also provide a post-tracing mechanism through logging。The main functions include single-directional audit, log search, risk alarm, flexible policy configuration, real-time reports, automatic learning, sensitive data discovery, performance monitoring, and risk scanning。Supports multiple deployment modes, such as mirroring and software probe。
Product function

Sensitive data discovery and evaluation

Service discovery, database sensitive data discovery, and classification help enterprises understand the distribution of database servers and sensitive data。


Database performance monitoring

Monitors the database running status in real time and alerts the database when the status is abnormal to prevent service breakdown and ensure service system availability。


Database risk scanning

Discover the full range of configuration, management, and system risks to help fix risks and vulnerabilities。


Log retrieval

Efficient retrieval of a large number of audited logs。


Risk alarm

Alarms are generated for database access matching risk policies based on the risk level。


Business audit

General audit rules

Engine name, database instance, and database type

Database user, operating system user, and host

Database IP address and client IP address

Database MAC and client MAC

Client program, client port

Request occurrence time and execution duration

SQL content keyword, execution result

……


Advanced audit rules

Multiple keywords

Regular expression

Statement level rule


Behavior Baseline - Automatically establish access models

The system will automatically learn the access statements of each application, carry out pattern extraction and classification, automatically generate the behavior feature model, and can edit the learning results。The system identifies risks by checking for deviations in access behavior from the baseline。


Three-tier audit

Trace back to the end user, providing a complete audit trail。

Application scenario
" class="hidden">邳州在线论坛