The permissions of the members of a MaxCompute project are continuously changed during project development. To improve project data security, you must check the permissions of project members in a timely manner. This topic describes the key points that you must take note of when you check permissions and provides suggestions on permission adjustment.
Background information
During the early stage of a project, to improve the service processing efficiency, you can manage users and permissions in a relatively loose manner. However, after the project enters the stable development stage, data security becomes an extremely important part of project management. Therefore, you must check and adjust permissions to improve project data security.
Permission self-check
The following table describes the check items about permissions.
Category | Check item | Description |
---|
Category | Check item | Description |
---|---|---|
Account and permission | Number of accounts | Check the number of accounts and make sure that each member of your MaxCompute project owns only one account. This way, you can manage users in an efficient manner. |
Statistics about abandoned accounts and the permissions of these accounts |
|
|
Personal account survey and analysis | Query the data that is submitted by personal accounts in the development phase within
the last three months, collect statistics about top N users, and select typical accounts
to analyze the daily tasks of these accounts. The submitted data includes data that
is involved in SQL tasks, such as retrieval and computing tasks. You can use the TASKS_HISTORY
view that is provided by the MaxCompute metadata service Information Schema to analyze the data. Example:
|
|
Data flow | Data download statistics | Collect the statistics about data download request tasks for each project and analyze and plan projects that can download data. You can use the TUNNELS_HISTORY view that is provided by the MaxCompute metadata service Information Schema to analyze and collect statistics about these tasks. |
Suggestions on permission adjustment
The following table describes the suggestions on permission adjustment.
Item | Description |
---|
Item | Description |
---|---|
Allocation of accounts and permissions | Each member of a project must have its own account.
Grant different data access permissions to different members based on their business development teams and roles. Account sharing is not allowed. Prevent data security risks that are caused by excessive user permissions. For example, you can allocate accounts by business group in the data development process. Business groups include the management group, data integration group, data model group, algorithm group, analysis group, O&M group, and security group. |
Data throttling |
|