Docs
udas
Operation Guide
Security Management Platform
8、Object Management

8. Object Management

1) Operation Type

The system incorporates multitude of common DML (Data Manipulation Language), DDL (Data Definition Language), DCL (Data Control Language) and other operation types built within. In accordance to the requirements, these operation languages can be added customarily. The operations added by oneself can be selected and referred to in the rules.

2) Collection Configuration

In relation to tool access, IP addresses, MAC of clients’, hostnames of the operating system, usernames of the operating system and usernames of the application accounts, the configuration of the collection terms as well as the basic elements can conveniently filter audit results in the search conditions, and can also be applied in the advanced configuration items of rules in 6.7.3. The collection configuration can perform operations such as add, delete, modify, and search, and basic elements can be added to the collection.

3) Translation Configuration

Protected Object Alias

The alias of the protected object will annotate the corresponding table name, field name, and keyword in the search results making it convenient for identification and viewing. Rules for protected object alias can perform operations such as addition, deletion, modification and search.

Visitor Alias

The visitor alias allows for an intuitive view in the search results of who operated the database. Visitor alias rules can perform additions, deletions, modifications, and search operations.

4) System Statement

The system statement can annotate the confirmed normal operation SQL statement, which will not be audited in future audits and will not be displayed in the search results. System statement rules can perform operations such as addition, deletion, modification, and search.

Once added, the above operation statements are performed on the existing MySQL type protected objects. In the search for the audit results, this statement is not included.

5) Secret Data

Secret data can perform clandestine operations on the key data (table name and field) in the protected object in the returned audit results to prevent secondary disclosure. Secret data rules can perform operations such as addition, deletion, modification, and search.

Upon completion of addition, examining the student data of the protected objects and reviewing the returned results in the search, the records of the name field have been hidden.

6) Job Number Extraction

Job number extraction extracts the required job number, corresponding to the application account in the search results, allowing users to configure according to the site environment without the need for custom requirements. Job number extraction rules can perform additions, deletions, and modifications.

Log into the protected object, check the audit search results, and you can extract the job number (application account).