tencent cloud

Feedback

Overview

Last updated: 2024-10-16 16:43:53

    Background

    As the depth of social informatization increases, enterprise IT systems are rapidly expanding, with more and more business data being transferred to public clouds. Cloudifying business data can provide a stable and long-term storage mode, enable rapid and efficient enterprise data analysis, and offer the convenience of cloud computing. Meanwhile, enterprises still face data security issues, which have evolved on the cloud. In recent years, there have been frequent news reports of companies suffering significant losses due to data loss and various criminal cases of data theft, highlighting the reality of data security issues. Common data risks on public clouds include:
    Audit information is incomplete, failing to meet the requirements of the Cybersecurity Law and the security level of cybersecurity.
    Malicious attacks are increasingly covert, making it difficult to effectively detect and formulate countermeasures.
    Internal preventive measures are inadequate, leaving private network personnel with opportunities to exploit.
    Database pressure monitoring is insufficient, leading to sudden performance issues.
    It is difficult to obtain evidence of data breaches.

    Product Introduction

    To address the above data security issues, Tencent Cloud CDS (Data Security Audit) provides services for both private assets of enterprises and public cloud assets on Tencent Cloud or other cloud vendors. It performs full auditing and storage of various session information, access operations, and SQL statements in the enterprise’s network database.
    It helps enterprises meet the requirements of the Cybersecurity Law and Level 3 cybersecurity classified protection.
    After obtaining audit data, CDS can identify malicious behavior in operations through various rule libraries and threat detection engines, and promptly notify administrators to take corresponding security measures.
    For security incidents that have already occurred, CDS supports auditing and analyzing logs from several years ago, providing references for enterprises to restore the full picture of security incidents and locate those responsible.
    With an AI threat detection engine, CDS timely predicts threat changes in a challenging security environment, informing administrators of various new variant attacks, helping enterprises confidently face attacks of all forms.
    CDS can handle the audit challenge posed by massive volumes of data access. Based on Tencent's TKE technology SaaS architecture, CDS can expand computing power according to enterprise database traffic at any time, with SQL throughput reaching hundreds of thousands, and a storage rate of tens of millions per hour, helping enterprises address audit issues in highly concurrent environments.

    Features

    Extensive Database Support

    CDS supports common cloud databases, self-built databases, and big data components.
    CloudDB: Relational databases including MySQL, PostgreSQL, SQL Server, and MariaDB; NoSQL databases including Redis and MongoDB; enterprise-level Tencent Distributed SQL.
    Self-built databases: MySQL, PostgreSQL, SQL Server, Oracle, MariaDB, Redis, MongoDB, HBase, and Hive.
    Big data components: HBase and Hive.

    Cross-Cloud and Multi-Region Centralized Audit

    CDS supports centralized auditing of data assets across multiple regions and VPCs in Tencent Cloud. It can also connect and audit assets from other cloud providers and IDCs via the internet or dedicated lines.

    Automatic Cloud Database Discovery

    Based on cloud-native architecture, CDS can automatically retrieve the list of cloud databases with user authorization, eliminating the need for manual input and avoiding asset omission.

    Threat Identification by Artificial Intelligence

    By using Tencent Cloud's professional deep learning technology and extensive sample training environment, the built-in AI engine can handle a variety of threat scenes. With a rule library that includes up to 186 built-in rules, it can identify security events based on the characteristics of threat attacks, malicious operations, and SQL injection.

    Custom Audit Rules

    It supports setting audit rules based on various dimensions such as databases, tables, fields, access sources, and database instances. The security policies are flexible and free, enabling precise monitoring. It can be customized for different scenes and application types, allowing precise control over database access information.

    Full Audit

    CDS possesses a comprehensive database CloudAudit feature, going beyond traditional security audit concepts by encompassing all SQL operations within the database. With a complete range of session audit categories, it can audit various data operation behaviors, supporting the traceability of database security events.

    Threat Alarms

    Upon detecting threat actions, CDS can alert the relevant administrators. Alarm methods include Enterprise WeChat Alert, SMS Alert, and Email Alert, offering a variety of ways to ensure administrators are promptly notified.
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support