All Products
Search
Document Center

Database Autonomy Service:DAS security baseline check

Last Updated:Mar 28, 2026

Database Autonomy Service (DAS) scans your MySQL, PolarDB for MySQL, and PolarDB-X 2.0 instances for five categories of security risk—weak passwords, open whitelists, disabled SSL, missing backups, and absent audit logs—and assigns each finding a color-coded severity level so you can prioritize remediation without manually auditing every instance.

Background information

  • The Verizon 2023 report indicates that approximately 50% of database breaches are related to weak passwords and dictionary attacks.

  • A report from the Cyberspace Administration of China reveals that thousands of domestic databases were exposed to unauthorized access and weak password risks in 2023, with 11.3% of 8,000 database instances identified as problematic.

These issues include weak password vulnerabilities and unchanged default administrator passwords. Database instances that are exposed to the Internet face higher risks from weak passwords.

Limitations

Supported regions

DeploymentRegions
Alibaba Cloud public cloudChina (Hangzhou), China (Shanghai), China (Qingdao), China (Beijing), China (Shenzhen), China (Heyuan), China (Zhangjiakou), China (Hohhot), China (Chengdu), China (Guangzhou), China (Ulanqab), Indonesia (Jakarta), US (Virginia), US (Silicon Valley), Japan (Tokyo), Germany (Frankfurt), UK (London), Philippines (Manila), Malaysia (Kuala Lumpur), Singapore, and China (Hong Kong)
Alibaba Finance CloudChina East 1 Finance, China East 2 Finance, China North 2 Finance (invitational preview), and China South 1 Finance

Supported database engines

MySQL, PolarDB for MySQL, and PolarDB-X 2.0.

Backup detection is not supported for PolarDB-X 2.0 instances.

How it works

Each inspection scans the selected instances across five security areas:

Check areaWhat is checked
Database configurationPassword policy complexity, such as strong password enforcement for ApsaraDB RDS for MySQL
Network configurationIP whitelist rules and SSL certificate status
Access controlWeak password detection
Storage poolBackup recency
Post-event securityWhether the audit log feature is enabled

Check mechanism: Immediate check allows you to manually initiate a specific compliance check.

Weak password detection uses a dictionary library of tens of millions of common weak passwords found on the Internet, and works with the cloud security team to identify new weak passwords. It supports batch detection across multiple accounts and triggers alerts when weak passwords are found.

Inspection results are color-coded: red (danger), yellow (warning), and green (safe).

Scans use a lightweight data collection agent and do not affect database performance. Scans are automatically delayed during peak business hours.

Run a security baseline check

Prerequisites

Before you begin, make sure you have:

  • Access to the DAS console

  • At least one MySQL, PolarDB for MySQL, or PolarDB-X 2.0 instance in a supported region

Initiate an inspection

  1. Log on to the DAS console.

  2. In the left-side navigation pane, choose Security Center > Security Baseline Check.

  3. Click Initiate Inspection. In the dialog box, select the instances to inspect, click the image icon to move them to the Selected Instances section, and then click OK.

    Inspection duration varies from a few minutes to tens of minutes, depending on the number and complexity of the selected instances.

    image

Review inspection results

After the inspection completes, return to the Security Baseline Check page. Each instance appears as a single row with color-coded results.

image

The table below describes each check item, its risk levels, and remediation steps.

Check itemDangerWarningSafeRemediation
Weak passwordWeak passwords detectedN/ANo weak passwords detectedSet a password that is 8–32 characters long and contains at least three of the following character types: uppercase letters, lowercase letters, digits, and special characters (! @ # $ % ^ & * ( ) _ + - =). For ApsaraDB RDS for MySQL, install validate_password to enforce the policy, then run SHOW VARIABLES LIKE 'validate_password%' to confirm it is active. Reset passwords: RDS MySQL, PolarDB-X 2.0, PolarDB MySQL.
Whitelist0.0.0.0/0 in the whitelist, allowing all IP addressesA large public CIDR block /8 is configuredNo high-risk whitelist configuration detectedRemove unnecessary IP addresses from the whitelist. For internet-facing databases, allow only trusted IP addresses and CIDR blocks.
SSL certificateN/ASSL is disabledSSL is enabledEnable SSL encryption for all internet-facing databases to protect data in transit from interception and tampering.
BackupNo backup sets generated in the previous seven daysBackup sets generated within the previous two to seven daysBackup sets generated within the previous daySchedule regular backups—daily or weekly—based on your business requirements. If no automatic backup policy is configured and no backups are generated for seven consecutive days, the instance is marked as Danger. PolarDB-X 2.0 is not supported.
AuditN/AAudit log feature is disabledAudit log feature is enabledEnable the audit log feature to support compliance tracking and real-time security risk detection.

View inspection details

Find the inspection task in the list and click Details in the Actions column to see a per-check breakdown.

In the Details panel, click Inspect Again to rerun the inspection for that instance.
image

Download results

Click the image icon in the upper-right corner of the Security Baseline Check page to download the inspection results.

image

Subscribe to security notifications

Turn on the Subscribe switch in the upper-right corner to receive security notifications. After you enable this, Alibaba Cloud sends alerts via internal messages and SMS when:

  • A security threat is received or discovered.

  • Regulatory authorities issue new compliance requirements.

image

FAQ

Does the security baseline check affect database performance?

No. The detection process uses a lightweight data collection agent. Scans are automatically delayed during peak business hours to minimize disruption.

Get support

Join the DingTalk group 58255008752 for technical support.