Personnel Identity Authentication

——

Strong identity authentication is completed through multi-factor authentication and the linkage with a bastion machine, realizing the traceability of operational actions to individuals.

Operations Permission Control

——

All operational actions are controlled with fine-grained authorization, rejecting misoperations and risky operations by personnel to prevent data leaks.

Product Value

 

Sensitive Operations Approval

——

Operations involving sensitive tables and fields must be approved through a ticketing process by the operations supervisor.