1. When we talk about security prevention, there are several key concepts. Pre-event refers to prevention, in-event refers to the control during the process, and post-event refers to the tracing and evidence collection after the event;
2. Therefore, auditing is not just post-event, but a kind of monitoring during the event; people often have a misunderstanding that if it cannot be prevented, it is not in the event, let alone pre-event;
3. Database auditing can actually achieve the trinity of pre-event prevention, in-event monitoring, and post-event tracing. For example, by monitoring abnormal IP, process, and repeated logins to the system, we can help us prevent illegal access, brute force cracking and other problems; during the event, we monitor all kinds of access behaviors to the database, and through preset rules, we can intelligently and real-timely discover problems, and intervene in time through the alarm platform, SMS, email, etc. The control before and during the event is not blocked, just because it is not suitable to adopt this mode; after the event, we can analyze and locate the problem through the alarm slip, time platform, and log platform.