No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


FusionCloud Solution Description 04

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Application Scenarios

Application Scenarios

Attack Defense

Multiple policies prevent database attacks and ensure database security on the cloud. See Figure 32-1.

  • End-to-end database firewall

    Users can use the intrusion prevention system or intrusion detection system based on actual database risks. DBSS provides anti-SQL injection and access control capabilities.

  • Multi-dimensional security policy rules

    Security policy rules based on query groups, tables, or storage procedures

  • Learning mode

    Instances have the self-learning mode. Once the pre-set learning time has ended, instances automatically generate security policy rules. Users can accept or reject the rules.

    Figure 32-1 Attack defense

Data Masking

Detects and dynamically masks sensitive data in the user database. See Figure 32-2.

  • Compliance

    Sensitive data detection complies with industry regulations.

  • Multiple data masking rules

    Users can set data masking rules for specified database tables and queries from specific source IP addresses, users, and applications.

  • No impact on user data

    The precise data masking engine is used to anonymize sensitive user data in real time without performance loss or changing the data storage in the database.

    Figure 32-2 Data masking


Provides database audit function. See Figure 32-3.

  • Compliance

    Remote storage of audit logs, meeting compliance requirements

  • Multi-dimensional statistics

    Provides audit reports from dimensions such as pre-event, post-event, common user, and administrator.

  • Exception monitoring

    Monitors performance, data, and behavior exceptions.

    Figure 32-3 Audit
Updated: 2019-10-23

Document ID: EDOC1100063247

Views: 72765

Downloads: 191

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next