Data Activity Monitoring
Information about key security concepts used in Guardium data activity monitoring.
- Policies and Rules
A security policy contains an ordered set of rules to be applied to the observed traffic between database clients and servers. Each rule can apply to a request from a client, or to a response from a server. Multiple policies can be defined and multiple policies can be installed on a Guardium system at the same time. - Workflows
Workflows consolidate several database activity monitoring tasks, including asset discovery, vulnerability assessment and hardening, database activity monitoring and audit reporting, report distribution, sign-off by key stakeholders, and escalations. - Auditing
Guardium provides value change auditing features for tracking changes to values in database tables. - Classification
Guardium supports the discovery and classification of sensitive data to allow the creation and enforcement of effective access policies.
Parent topic: Getting Started