All Products
Search
Document Center

Security administrator manual

Last Updated: Jun 02, 2020

Operations

  1. Create a data identification rule, select a security level, which can be internal, sensitive, or confidential, and configure field scanning on the Data Protection page. For more information, see Data Protection.
  2. Configure the masking algorithms and de-identification methods for sensitive and confidential fields on the Sensitive Data page. For more information, see Manage sensitive data.
  3. Manage operations logs on the Operation Logs page. For more information, see Operations logs.

Supported features for security administrators

Category Feature Description
System management Intelligent operation You can view the statistics on tickets, queries, users, and metadata on the Intelligent Operation page.
Security management Operations logs DMS records data changes in operations logs so that you can trace data operations, execution time, and operation accounts at any time. You can view operations logs on the Operation Logs page.
Data Protection You can use this feature to guarantee the data security of your enterprise.
Sensitive data management You can configure a masking algorithm and adjust the security levels for sensitive fields in a table on the Sensitive Data page.
Permissions Permission management You can submit a ticket to apply for the relevant permissions on an instance, a database, a table, or a sensitive field. You can also view the permissions that you have on the Permissions page.
SQLConsol Single-database queries You can write SQL statements to initiate single-database queries on the Single Database query page. Single-database queries can be used to verify business code, analyze product effect, and locate issues in an online environment.
Cross-database queries DMS offers online relational queries across heterogeneous databases deployed in different environments. You can write SQL statements to initiate cross-database queries on the Cross-database Query page.
Schemas Schema design When you develop or optimize a project or process a new business requirement, you often need to change schemas. For example, when you create a table or modify an existing table, you can use the schema design feature on the Schema Design page.
Table synchronization You can use this feature to configure and manage the schemas of databases to guarantee the consistency of schemas in different environments, such as the online and offline environments.
Optimization SQL review You can use this feature on the SQL Review page to avoid publishing SQL statements that do not use indexes and may deteriorate the database performance and SQL statements that do not conform to database development standards. This feature helps protect against SQL injection attacks.
Data plans Data changes You can submit data change tickets to initialize data for a newly published project, clean up historical data, fix bugs, or conduct a test.
Data import You can use this feature to import a large amount of data to your databases at a time.
Data export You can use this feature to analyze a large amount of data at a time or extract the required data.
Data tracking If any data fails to meet your requirement due to reasons such as misoperations, you can use this feature to quickly trace historical data changes. Then, you can execute rollback statements to quickly restore data to the normal state.
Database clone You can use this feature to clone databases from one to another. Currently, only MySQL databases are supported.