当前位置:网站首页>How to organize an actual attack and defense drill
How to organize an actual attack and defense drill
2022-07-05 21:43:00 【InfoQ】
One 、 Organizational elements of actual attack and defense drill
- Organizational unitBe responsible for overall control 、 Resource coordination 、 Prepare for the drill 、 Drill organization 、 Drill summary 、 Implement rectification and other work .
- Technical support unitBy a professional safety company , Be responsible for providing corresponding technical support and guarantee , Conduct the establishment of attack and defense confrontation exercise environment and visual display of attack and defense exercise .
- Attack teamGenerally, it is independently established by multiple security manufacturers , Each attack team is generally equipped with 3~5 people . With authorization , Explore with assets 、 Tool scanning and manual infiltration are the main penetration attacks , To obtain the permissions and data of the drill target system .
- Defending TeamFrom the participating units 、 Personnel composition of safety manufacturers, etc , Mainly responsible for protecting the assets under the jurisdiction of the defense team , Try to prevent the blue team from getting permission and data .
Two 、 The organizational form of the actual attack and defense drill
- By state 、 Industry authorities 、 Drills organized by regulators. Such drills are generally conducted by public security organs at all levels 、 E-mail departments at all levels 、 The government 、 Finance 、 traffic 、 health 、 education 、 Electric power 、 Countries such as operators 、 Industry competent departments or regulatory agencies organize . For key industry information infrastructure and important systems , Organize attack teams and enterprises and institutions in the industry to conduct network actual attack and defense drills .
- Drills organized by large enterprises and institutions. Financial enterprises 、 Operator, 、 administrative organ 、 Public institutions and other government and enterprise units , Verification requirements for the effectiveness of business security defense system construction , Organize attack teams and enterprises and institutions to conduct actual attack and defense drills .
3、 ... and 、 The key to the organization of the actual attack and defense drill
- Scope of drill: Prioritize priorities ( Unclassified ) Key business systems and Networks .
- Drill cycle: Combine with actual business , General advice 1~2 Zhou .
- Drill site: Select the corresponding site according to the drill scale , Be able to accommodate organizational units 、 Attack team 、 Defending Team , And the three sites should be separated .
- Drill equipment: Build an attack and defense drill platform 、 Video monitoring system , Distribute special computers to the attackers ( Or provide virtual attack terminals ) etc. .
- The attack team was formed: Choose the self owned personnel of the participating units or hire professionals from a third-party security service provider to form .
- The defense team is formed: Mainly the self owned safety technicians of each participating unit , Assisted by professionals from third-party security service providers .
- Exercise rule making: Formulate attack rules clearly before the drill 、 Defense rules and scoring rules , It is reasonable to ensure the offensive and defensive process , Avoid unnecessary impact of attack process on business operation .
Four 、 Risk avoidance measures for actual attack and defense drills
- The drill limits the attack target system , Unlimited attack path
- Unless authorized , Denial of service attacks are not allowed in the drill
- Description of the attack method of web page tampering
- Practice forbidden attack methods
- Requirements for the attacker's Trojan horse
- Illegal attack blocking and notification
边栏推荐
- Huawei game multimedia service calls the method of shielding the voice of the specified player, and the error code 3010 is returned
- Robot framework setting variables
- Haas506 2.0 development tutorial - Alibaba cloud OTA - PAC firmware upgrade (only supports versions above 2.2)
- Learning notes of statistical learning methods -- Chapter 1 Introduction to statistical learning methods
- EasyExcel的讀寫操作
- NET中小型企业项目开发框架系列(一个)
- 面试官:并发编程实战会吗?(线程控制操作详解)
- Selenium's method of getting attribute values in DOM
- Selenium finds the contents of B or P Tags
- Deployment of Jenkins under win7
猜你喜欢

Clickhouse copy paste multi line SQL statement error

KingbaseES V8R3集群维护案例之---在线添加备库管理节点

Why can't Chinese software companies produce products? Abandon the Internet after 00; Open source high-performance API gateway component of station B | weekly email exclusive to VIP members of Menon w

MATLAB | App Designer·我用MATLAB制作了一款LATEX公式实时编辑器

Golang (1) | from environmental preparation to quick start

Matlab | app designer · I used Matlab to make a real-time editor of latex formula

Huawei game multimedia service calls the method of shielding the voice of the specified player, and the error code 3010 is returned

华为云ModelArts文本分类–外卖评论

Scenario interview: ten questions and ten answers about distributed locks

EasyExcel的读写操作
随机推荐
kingbaseES V8R3数据安全案例之---审计记录清除案例
Explain various hot issues of Technology (SLB, redis, mysql, Kafka, Clickhouse) in detail from the architecture
阿里云有奖体验:用PolarDB-X搭建一个高可用系统
Teach yourself to train pytorch model to Caffe (III)
Li Kou ----- the maximum profit of operating Ferris wheel
Experienced inductance manufacturers tell you what makes the inductance noisy. Inductance noise is a common inductance fault. If the used inductance makes noise, you don't have to worry. You just need
Some common processing problems of structural equation model Amos software
Oracle checkpoint queue - Analysis of the principle of instance crash recovery
datagrid直接编辑保存“设计缺陷”
Yolov5 training custom data set (pycharm ultra detailed version)
Gcc9.5 offline installation
Four components of logger
Detailed explanation of memset() function usage
leetcode:1755. Sum of subsequences closest to the target value
crm创建基于fetch自己的自定义报告
Oracle检查点队列–实例崩溃恢复原理剖析
Summarize the reasons for 2XX, 3xx, 4xx, 5xx status codes
华为联机对战如何提升玩家匹配成功几率
int GetMonth( ) const throw( );后面的throw( )什么意思?
Sitge joined the opengauss open source community to jointly promote the ecological development of the database industry