tencent cloud

All product documents
Overview
Last updated: 2024-10-16 16:43:53
Overview
Last updated: 2024-10-16 16:43:53

Background

As the depth of social informatization increases, enterprise IT systems are rapidly expanding, with more and more business data being transferred to public clouds. Cloudifying business data can provide a stable and long-term storage mode, enable rapid and efficient enterprise data analysis, and offer the convenience of cloud computing. Meanwhile, enterprises still face data security issues, which have evolved on the cloud. In recent years, there have been frequent news reports of companies suffering significant losses due to data loss and various criminal cases of data theft, highlighting the reality of data security issues. Common data risks on public clouds include:
Audit information is incomplete, failing to meet the requirements of the Cybersecurity Law and the security level of cybersecurity.
Malicious attacks are increasingly covert, making it difficult to effectively detect and formulate countermeasures.
Internal preventive measures are inadequate, leaving private network personnel with opportunities to exploit.
Database pressure monitoring is insufficient, leading to sudden performance issues.
It is difficult to obtain evidence of data breaches.

Product Introduction

To address the above data security issues, Tencent Cloud CDS (Data Security Audit) provides services for both private assets of enterprises and public cloud assets on Tencent Cloud or other cloud vendors. It performs full auditing and storage of various session information, access operations, and SQL statements in the enterprise’s network database.
It helps enterprises meet the requirements of the Cybersecurity Law and Level 3 cybersecurity classified protection.
After obtaining audit data, CDS can identify malicious behavior in operations through various rule libraries and threat detection engines, and promptly notify administrators to take corresponding security measures.
For security incidents that have already occurred, CDS supports auditing and analyzing logs from several years ago, providing references for enterprises to restore the full picture of security incidents and locate those responsible.
With an AI threat detection engine, CDS timely predicts threat changes in a challenging security environment, informing administrators of various new variant attacks, helping enterprises confidently face attacks of all forms.
CDS can handle the audit challenge posed by massive volumes of data access. Based on Tencent's TKE technology SaaS architecture, CDS can expand computing power according to enterprise database traffic at any time, with SQL throughput reaching hundreds of thousands, and a storage rate of tens of millions per hour, helping enterprises address audit issues in highly concurrent environments.

Features

Extensive Database Support

CDS supports common cloud databases, self-built databases, and big data components.
CloudDB: Relational databases including MySQL, PostgreSQL, SQL Server, and MariaDB; NoSQL databases including Redis and MongoDB; enterprise-level Tencent Distributed SQL.
Self-built databases: MySQL, PostgreSQL, SQL Server, Oracle, MariaDB, Redis, MongoDB, HBase, and Hive.
Big data components: HBase and Hive.

Cross-Cloud and Multi-Region Centralized Audit

CDS supports centralized auditing of data assets across multiple regions and VPCs in Tencent Cloud. It can also connect and audit assets from other cloud providers and IDCs via the internet or dedicated lines.

Automatic Cloud Database Discovery

Based on cloud-native architecture, CDS can automatically retrieve the list of cloud databases with user authorization, eliminating the need for manual input and avoiding asset omission.

Threat Identification by Artificial Intelligence

By using Tencent Cloud's professional deep learning technology and extensive sample training environment, the built-in AI engine can handle a variety of threat scenes. With a rule library that includes up to 186 built-in rules, it can identify security events based on the characteristics of threat attacks, malicious operations, and SQL injection.

Custom Audit Rules

It supports setting audit rules based on various dimensions such as databases, tables, fields, access sources, and database instances. The security policies are flexible and free, enabling precise monitoring. It can be customized for different scenes and application types, allowing precise control over database access information.

Full Audit

CDS possesses a comprehensive database CloudAudit feature, going beyond traditional security audit concepts by encompassing all SQL operations within the database. With a complete range of session audit categories, it can audit various data operation behaviors, supporting the traceability of database security events.

Threat Alarms

Upon detecting threat actions, CDS can alert the relevant administrators. Alarm methods include Enterprise WeChat Alert, SMS Alert, and Email Alert, offering a variety of ways to ensure administrators are promptly notified.
Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback

Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

7x24 Phone Support
Hong Kong, China
+852 800 906 020 (Toll Free)
United States
+1 844 606 0804 (Toll Free)
United Kingdom
+44 808 196 4551 (Toll Free)
Canada
+1 888 605 7930 (Toll Free)
Australia
+61 1300 986 386 (Toll Free)
EdgeOne hotline
+852 300 80699
More local hotlines coming soon