Database permissions governance
The permission control policy does not require installing any agent agent on the database server, and obtains the database table structure through the database privileged account, so as to realize the "add, delete, modify, and query" permission management from the database account to the database table level.
Rich built-in masking algorithms
Built-in a variety of mainstream masking algorithms, can mask sensitive fields and generate real and fully functional data, including but not limited to: character masking, forensic masking, keyword substitution, deletion masking, AES masking, SHA masking, etc., and can use randomly generated values according to various constraints to replace sensitive fields to achieve random masking.
Custom masking algorithm
DDM provides users with high flexibility in customizing algorithms, either by copying existing masking algorithms for modification or by writing entirely new masking algorithms. Users can customize the masking algorithm according to their own data characteristics, policy compliance, application system and other needs.
Application business data masking
For service access masking, DDM can directly shield, encrypt, hide, and audit sensitive data in the production database accessed by business systems through a transparent serial deployment mode, without changing the middleware and client configuration, and ensuring business continuity.
Data masking behavior audit
DDM supports masking behavior auditing, which can audit SQL statements (before masking), access source information, SQL statement information, and affected objects, and provide detailed statement details pages.
Real-time high-risk operation protection
DDM's built-in behavioral firewall function module can control the SQL statement operation behavior of DBAs and other O&M personnel, implement permission policies based on natural persons, databases, database tables, fields, high-risk SQL statements, and where condition queries, and reduce database operation security risks.
Accurate data access identification
Relying on comprehensive and accurate SQL protocol parsing, DDM can accurately identify sensitive data access behaviors of users through O&M tools or application systems, and will not miss the accurate identification and security control of sensitive objects in complex scenarios.