Some time ago, a hotel group data leakage caused a great uproar, the leaked data contains user name, mobile phone number, email, ID number and other information. The seller sold the package of about 500 million pieces of data for 8 bitcoin, or 520 menlo.

The cause of the leak has yet to be determined. It is reported that a programmer of the group leaked the server and database information to Github, which was used by hackers to break into the hotel server and database system through weak password attacks. But that is speculative at the moment.

Lax internal controls, leaks and hacking were the main causes of the data breach. We can still defend against external attacks, but how should we defend ourselves against internal operations and maintenance? In the daily use of the database, operation and maintenance personnel can directly access the data in the database in data analysis, online troubleshooting, temporary data correction and other links, that is to say, problems may occur in these links.

Traditional database security control schemes have frequent loopholes. Traditional manual data security control schemes are centralized management and decentralized management. Centralized management scheme requires to create independent read/write accounts and read only accounts in addition to business code accounts, which are only given to specific personnel such as DBA and operation and maintenance. However, the disadvantage of this scheme is that for some scenarios requiring quick response to view data and make decisions, cumbersome steps will directly affect the efficiency of R&D.

In the daily use of database, online service access of application code is the most important way, but people also need to contact database directly based on data analysis, online problem investigation, new requirements to change the structure, temporary data correction and other demands.

If decentralized management is adopted, independent read/write accounts and read-only accounts are created and distributed to front-line managers. Compared with centralized management, the efficiency is improved to some extent. However, there are many people who have access to database accounts and passwords.

These two schemes not only have their own disadvantages, and in the case of mass management, the difficulty of implementation will be exponentially magnified. So how else can companies avoid human-induced data breaches?

To solve this problem, Ali Cloud DATA Management DMS enterprise edition provides a perfect and mature data security access solution from the source of access protection.

DMS Enterprise edition ensures data security and improves r&d efficiency

Compared with traditional data access solutions, DMS Enterprise edition eliminates personnel bottlenecks and takes into account enterprise research and development efficiency while ensuring data security. DMS Enterprise edition implements security control from two aspects: access and change.

On the access method, different from traditional solutions, without direct database, only need to input in advance to manage the database instance, access to the database, when need to access the database, table, can be directly within the product according to the need to apply for or authorized by the data owner actively, have permission to login after DMS enterprise edition can directly access the database, No more access to any database account passwords.

In addition, the granularity of access permission is standardized. If there is no corresponding permission, massive data export and data change (DML, DDL, etc.) operations cannot be submitted, preventing massive data leakage. At the same time, DMS Enterprise edition supports the unique field level permission control, convenient enterprises in the ID card, bank card, password and other sensitive information for fine management.

DMS enterprise edition also makes special processing to ensure access performance security, such as database level threshold forbids full table scan control, when the tablespace is larger than a certain value, the execution plan does not go to the index, forbids query; User level Upper limit on the number and number of query rows in a day. The maximum number of rows returned by a single query in the product is controlled to ensure access security in an all-round way.

Change security management and control includes instance-level change process control, task scheduling load control, and data change. Update and DELETE By default, pre-backup mirrors can be quickly recovered if exceptions occur. In addition, metadata lock contention can be avoided to block the database and scheduling load is increased when thread_RUNNING is too high.

In addition, DMS Enterprise edition also provides a three-layer login security guarantee for cloud account access, enterprise personnel access and enterprise Intranet access. After the Intranet access control (IP address whitelist) is enabled, the account is not recovered in a timely manner, but the user can no longer log in to the Intranet.

It is worth noting that every operation of the staff in the product can be traced back to the source after the staff accounts are refined and used on demand. Periodic operational audits within the company, especially in listed companies, will be an important source of data support.

Data security is a long way to go. As the core assets and lifeblood of an enterprise, data security is the top priority; Is also the most worthy of continuous investment improvement, continuous strengthening of a direction. DMS Enterprise edition will make continuous efforts to help enterprises improve data security management.

In the end, [Data Security Management tips] 1) Prohibit the existence of weak passwords, even if the database account passwords used in production services are recommended to be changed regularly if possible. 2) Prohibit access to a large number of sensitive information. 3) Prohibit the disclosure of sensitive information such as database access mode and server IP address. 4) Set a whitelist of accessible IP addresses for database servers and control sources. 5) Set a whitelist of accessible IP addresses for database accounts and control sources

More details can be found at: Enterprise database DevOps solution

Author: Cloud attack strategy small attack