All Products
Search
Document Center

Cloud Firewall:Best practices for database security defense

Last Updated:Mar 31, 2026

Self-managed databases on Elastic Compute Service (ECS) instances are frequent targets for brute-force attacks, vulnerability exploits, malicious command execution, and data theft. Cloud Firewall's intrusion prevention system (IPS) defends against all four threat categories from a single configuration page, without requiring changes to your database or application code.

Supported databases

Cloud Firewall IPS protects self-managed databases deployed on ECS instances. The following database types are supported:

  • MySQL

  • Microsoft SQL Server

  • Redis

  • PostgreSQL

  • Memcache

  • MongoDB

  • Oracle

How Cloud Firewall protects databases

Each threat category maps to a specific IPS protection mechanism:

ThreatProtection mechanismBehavior
Brute-force attacksThreat IntelligenceAutomatically blocks IPs associated with network-wide attacks and malicious scanning
Database application vulnerabilities (Common Vulnerabilities and Exposures (CVE), denial-of-service (DoS), data breaches)Virtual PatchingAutomatically blocks traffic identified as vulnerability exploits
Malicious command execution and file reading/writing (stored procedures, user-defined functions (UDFs), webshell writing)Basic Protection (Basic Rules)Blocks malicious operations in real time
Data theft and breachesBasic Protection (high-risk SQL blocking)Automatically blocks high-risk SQL operations in real time

Enable database protection

Enable IPS for database defense

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose Prevention Configuration > IPS Configuration.

  3. On the Internet Border tab, go to the Threat Engine Mode section and set Block Mode to Blocking Mode - Loose.

    Blocking mode setting

  4. In the Threat Intelligence section, turn on Threat Intelligence.

  5. In the Basic Protection section, turn on Basic Rules.

  6. In the Virtual Patching section, turn on Virtual Patching.

All three protections are now active. Cloud Firewall begins inspecting database traffic immediately — no restart or database reconfiguration required.

For detailed configuration options, see IPS configuration.

What's next

  • Review security events regularly to identify recurring attack sources and tighten access control rules.

  • For databases exposed to the internet, restrict access to known IP ranges using security group rules to reduce the attack surface before threats reach the IPS layer.