OceanBase is committed to making the management and use of massive data easier through technology. Data security has always been OceanBase's top priority. OceanBase has complete security procedures and security technologies, and has established professional security team and SRE reliability team. OceanBase invites authoritative third-party organizations to audit every year, and has obtained comprehensive attestations and certifications.
OceanBase supports a comprehensive identity authentication mechanism, with comprehensive password complexity strategies and login failure processing strategies.
OceanBase supports complete role management and permission management strategies, and supports network whitelist functions, etc.
The communication between OceanBase components and between customer applications and OceanBase databases supports encrypted transmission.
OceanBase supports transparent data encryption (TDE), which automatically encrypts data when it is stored on disk and automatically decrypts it when it is read.
OceanBase supports comprehensive SQL diagnostic functions, which can view topsql, slowsql, suspicious sql, and high-risk sql. It also supports SQL auditing functions, which can save SQL execution records for a long time.
OceanBase has a professional security team responsible for the operation and management of network security, including network boundary management, host protection, vulnerability scanning, penetration testing, and emergency response after security incidents.
OceanBase has established a complete process system covering the entire life cycle of data protection, and uses technical mechanism to safeguard the company's physical security, computer security and data security.
OceanBase collects and uses users' personal data based on the principle of minimization, and safely stores the collected user data. Users can also contact us at any time to delete their personal data.
OceanBase conducts background investigation/chekcs for its employee and requires employees who serve customers to take continuous security training.
Before purchasing OceanBase Cloud Services, customers need to sign Data Processing Addendum, which divides the responsibilities for processing personal data uploaded by customers to the database. As the controller of data, customers need to ensure that their data processing, data storage and data distribution comply with applicable laws and regulations.
Through the construction of various high-availability capabilities, OceanBase cloud service promises SLA of no less than 99.99%, for more detail information, please refer to Service Level Agreement.
To avoid the failure of a single cloud vendor affecting service availability, OceanBase cloud services support multi-cloud deployment. Currently, it supports mainstream cloud vendors in the industry, such as Alibaba Cloud, Tencent Cloud, Huawei Cloud, AWS Cloud, and GCP Cloud.
OceanBase cloud service adopts multi-copy deployment, and the Paxos protocol is used to synchronize log data between multiple copies. When the primary copy is unavailable, the secondary copy supports autonomous election of the primary copy. Multiple copies can be deployed across data centers (availability zones), thus avoiding the impact of failure in a single data center (availability zone).
OceanBase cloud service supports cross-city (Region) master-slave cluster deployment. When the availability zone of the primary city is unavailable, the cluster in the backup city can be enabled to provide services, thereby achieving remote disaster recovery.