Method for customizing database security audit in cloud environment
A security audit and database technology, applied in the computer field, can solve the problem of high operation and maintenance cost of database security audit system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0098] As an implementable manner, the above-mentioned method also includes:
[0099] Allocating computing resources to the cloud tenant according to the cloud tenant information.
[0100] As an implementable manner, the above-mentioned method also includes:
[0101] Send the audit result to the log storage terminal according to the tenant flag.
[0102] As an implementable manner, before the acquisition of cloud tenant database traffic and cloud tenant information, it also includes:
[0103] Install proxy service on client or cloud.
[0104] As an implementable manner, in the above S3, according to the cloud tenant information, add the tenant flag of the cloud tenant to the log information, and based on the key-value pair information and the Audit the log information and obtain the audit results, which can be achieved in the following ways:
[0105] Based on the payment information in the cloud tenant information, add the tenant logo of the cloud tenant to the log, and th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


