当前位置:网站首页>How to organize an actual attack and defense drill
How to organize an actual attack and defense drill
2022-07-05 21:43:00 【InfoQ】
One 、 Organizational elements of actual attack and defense drill
- Organizational unitBe responsible for overall control 、 Resource coordination 、 Prepare for the drill 、 Drill organization 、 Drill summary 、 Implement rectification and other work .
- Technical support unitBy a professional safety company , Be responsible for providing corresponding technical support and guarantee , Conduct the establishment of attack and defense confrontation exercise environment and visual display of attack and defense exercise .
- Attack teamGenerally, it is independently established by multiple security manufacturers , Each attack team is generally equipped with 3~5 people . With authorization , Explore with assets 、 Tool scanning and manual infiltration are the main penetration attacks , To obtain the permissions and data of the drill target system .
- Defending TeamFrom the participating units 、 Personnel composition of safety manufacturers, etc , Mainly responsible for protecting the assets under the jurisdiction of the defense team , Try to prevent the blue team from getting permission and data .
Two 、 The organizational form of the actual attack and defense drill
- By state 、 Industry authorities 、 Drills organized by regulators. Such drills are generally conducted by public security organs at all levels 、 E-mail departments at all levels 、 The government 、 Finance 、 traffic 、 health 、 education 、 Electric power 、 Countries such as operators 、 Industry competent departments or regulatory agencies organize . For key industry information infrastructure and important systems , Organize attack teams and enterprises and institutions in the industry to conduct network actual attack and defense drills .
- Drills organized by large enterprises and institutions. Financial enterprises 、 Operator, 、 administrative organ 、 Public institutions and other government and enterprise units , Verification requirements for the effectiveness of business security defense system construction , Organize attack teams and enterprises and institutions to conduct actual attack and defense drills .
3、 ... and 、 The key to the organization of the actual attack and defense drill
- Scope of drill: Prioritize priorities ( Unclassified ) Key business systems and Networks .
- Drill cycle: Combine with actual business , General advice 1~2 Zhou .
- Drill site: Select the corresponding site according to the drill scale , Be able to accommodate organizational units 、 Attack team 、 Defending Team , And the three sites should be separated .
- Drill equipment: Build an attack and defense drill platform 、 Video monitoring system , Distribute special computers to the attackers ( Or provide virtual attack terminals ) etc. .
- The attack team was formed: Choose the self owned personnel of the participating units or hire professionals from a third-party security service provider to form .
- The defense team is formed: Mainly the self owned safety technicians of each participating unit , Assisted by professionals from third-party security service providers .
- Exercise rule making: Formulate attack rules clearly before the drill 、 Defense rules and scoring rules , It is reasonable to ensure the offensive and defensive process , Avoid unnecessary impact of attack process on business operation .
Four 、 Risk avoidance measures for actual attack and defense drills
- The drill limits the attack target system , Unlimited attack path
- Unless authorized , Denial of service attacks are not allowed in the drill
- Description of the attack method of web page tampering
- Practice forbidden attack methods
- Requirements for the attacker's Trojan horse
- Illegal attack blocking and notification
边栏推荐
- Evolution of zhenai microservice underlying framework from open source component encapsulation to self-development
- Some things make feelings nowhere to put
- Sorting out the problems encountered in MySQL built by pycharm connecting virtual machines
- EL与JSTL注意事项汇总
- GCC9.5离线安装
- Analysis and test of ModbusRTU communication protocol
- Teach yourself to train pytorch model to Caffe (I)
- Incentive mechanism of Ethereum eth
- SQL knowledge leak detection
- 第05章_存储引擎
猜你喜欢
Feng Tang's "spring breeze is not as good as you" digital collection, logged into xirang on July 8!
Exercise 1 simple training of R language drawing
張麗俊:穿透不確定性要靠四個“不變”
MMAP
R language learning notes
Longest swing sequence [greedy practice]
Huawei fast game failed to call the login interface, and returned error code -1
MySQL deep paging optimization with tens of millions of data, and online failure is rejected!
基于 Ingress Controller 在集群外访问 Zadig 自测环境(最佳实践)
Zhang Lijun: la pénétration de l’incertitude dépend de quatre « invariants»
随机推荐
Experienced inductance manufacturers tell you what makes the inductance noisy. Inductance noise is a common inductance fault. If the used inductance makes noise, you don't have to worry. You just need
面试官:并发编程实战会吗?(线程控制操作详解)
What should I do to prepare for the interview algorithm position during school recruitment?
Defect detection - Halcon surface scratch detection
Sorting out the problems encountered in MySQL built by pycharm connecting virtual machines
Matlab | app designer · I used Matlab to make a real-time editor of latex formula
Oracle checkpoint queue - Analysis of the principle of instance crash recovery
递归查询多级菜单数据
selenium 获取dom内验证码图片
Li Kou ----- the maximum profit of operating Ferris wheel
Cold violence -- another perspective of objective function setting
NET中小型企业项目开发框架系列(一个)
从零开始实现lmax-Disruptor队列(四)多线程生产者MultiProducerSequencer原理解析
Exercise 1 simple training of R language drawing
Two ways to realize video recording based on avfoundation
oracle 控制文件的多路复用
Clickhouse copy paste multi line SQL statement error
Analysis and test of ModbusRTU communication protocol
Zhang Lijun: la pénétration de l’incertitude dépend de quatre « invariants»
kingbaseES V8R3数据安全案例之---审计记录清除案例