当前位置:网站首页>Zhongke Panyun - module a infrastructure setting and safety reinforcement scoring standard
Zhongke Panyun - module a infrastructure setting and safety reinforcement scoring standard
2022-07-04 04:59:00 【Beluga】
modular A Infrastructure setting and security reinforcement
need A Module environment private
One 、 Project and task description :
Suppose you are a network security engineer in an enterprise , For enterprise server system , Ensure the normal operation of all services according to the task requirements , And through the comprehensive use of login and password policies 、 Traffic integrity protection strategy 、 Event monitoring strategy 、 Firewall strategy and other security strategies to improve the network security defense ability of the server system . This module requires screenshots of specific tasks and corresponding text descriptions , With word Document writing , With PDF Format preservation , Take the match number as the file name .
Two 、 Server environment description
Log: Log server (Splunk), The operating system is Linux
Web:IIS The server , The operating system is Windows
A-1 Task a Login security
Please check the server Web Make corresponding settings as required , Improve the security of the server .
1. Password policy (Web)
a. The minimum password length shall not be less than 8 Characters , Screenshot of the attribute configuration interface of the minimum password length ;

b. The password policy must satisfy both upper and lower case letters 、 Numbers 、 Special characters , Screenshot of the attribute configuration interface where the password must meet the complexity requirements .

2. Login strategy (Web)
a. When the user logs in to the system , Should have “For authorized users only” Prompt information , A screenshot of the warning message window will pop up when logging in to the system ;

b. Only... Are allowed for one minute 5 Failed login attempts , exceed 5 Time , Login account locked 1 minute , Screenshot of the account locking policy configuration interface ;( Be careful , More than five locks , So the lock threshold here should be 6 Time , In the screenshot, if 5 No score for times )

c. The remote user inactive session connection timeout should be less than or equal to 5 minute , take RDP-Tcp Screenshot of the configuration interface corresponding to the property .

3. User security management (Web)
a. Remote management security of server SSL strengthening , Prevent sensitive information disclosure from being monitored , take RDP-Tcp Screenshot of the configuration interface corresponding to the property ;

b. Only the super administrator account is allowed to shut down the system , Screenshot of the configuration interface of system properties will be closed .

A-2 Task 2 Web Safety reinforcement (Web)
1. In order to prevent web in .mdb Illegal download of database file , Yes, please. Web Secure the configuration file , take C:\Windows\System32\inetsrv\config\applicationHost Screenshot of the corresponding part in the configuration file ;

2. Restrict directory execution permissions , Yes picture and upload Set the execution permission of the directory to none , Screenshot of the configuration interface for editing function permissions ;
picture Directory permission settings

or

upload Directory permission settings

or

Give all points
3. Turn on IIS Log audit records for ( The log file is saved in W3C, Only record the date 、 Time 、 client IP Address 、 user name 、 Method ), take W3C Screenshot of the configuration interface of logging field ;

4. In order to reduce the load on the website , Set the maximum number of concurrent connections for the website to 1000, Screenshot of the configuration interface that will edit website restrictions ;

5. Prevent file enumeration vulnerability to enumerate network server root files , prohibit IIS Short file name leaked , Screenshot of the configuration command ;
![]()
6. close IIS Of WebDAV Function to enhance the security of the website , Take a screenshot of the alert message .

A-3 Task three Flow integrity protection and event monitoring (Web,Log)
1. In order to prevent the password from being stolen when logging in or transmitting information , Log in with a certificate only SSH(Log), take /etc/ssh/sshd_config Screenshot of the corresponding part in the configuration file ;


2. take Web The server turns on the audit policy
Login Events success / Failure ;
Privilege use success ;
Policy changes success / Failure ;
Process tracking success / Failure ;
Take a screenshot of the configuration interface of the audit policy ;

3. To configure Splunk receive Web The server , Security log , system log ,CPU load , Memory , disk space , Network state . Transfer transponder : Screenshot of the successfully deployed page .

A-4 Task 4 Firewall policy
All servers turn on the firewall , In order to prevent blackmail virus attack, the firewall is reinforced :
1.Windows System Disabled 445 port , Screenshot of inbound rule of firewall ;
![]()
2.Linux System Disabled 23 port , take iptables Screenshot of configuration command ;

3.Linux The system forbids others ping through , take iptables Screenshot of configuration command ;
![]()
4.Linux In order to ensure safety, the system prohibits everyone from connecting SSH except 172.16.1.1 This ip, take iptables Screenshot of configuration command .
![]()
![]()
Points will be given only if the two pictures are all right
边栏推荐
- 中科磐云—数据分析与取证数据包flag
- 令人头痛的延时双删
- 简单g++和gdb调试
- Self sharing of a graduate
- Operate the server remotely more gracefully: the practice of paramiko Library
- 【MATLAB】通信信号调制通用函数 — 带通滤波器
- 【MATLAB】MATLAB 仿真数字带通传输系统 — ASK、 PSK、 FSK 系统
- Annex I: power of attorney for 202x XXX attack and defense drill
- cmake
- 在代碼中使用度量單比特,從而生活更美好
猜你喜欢

Detailed comparison of Hynix emmc5.0 and 5.1 series

Developing mqtt access program under QT

在代码中使用度量单位,从而生活更美好

Technology Management - learning / practice

MAUI 入门教程系列(5.XAML及页面介绍)

Unity 接入天气系统

Secondary vocational group network security - memory Forensics

Use units of measure in your code for a better life

全国职业院校技能大赛(中职组)网络安全竞赛试题—解析

Public inputs in appliedzkp zkevm (13)
随机推荐
【Go】数据库框架gorm
1. Mx6u-alpha development board (LED drive experiment in C language version)
The first introduction, stages and methods of defense system breakthrough from the perspective of the red team
How to build your own knowledge engine? Community open application
DCDC电源电流定义
Self sharing of a graduate
【MATLAB】MATLAB 仿真数字基带传输系统 — 数字基带传输系统
LeetCode136+128+152+148
Public inputs in appliedzkp zkevm (13)
Annexe VI: exposé sur les travaux de défense. Docx
MySQL JDBC programming
Annex II: confidentiality agreement for offensive and defensive drills docx
Annex V: briefing on the attack process docx
(pointer) write function void fun (int x, int *pp, int *n)
Acwing game 58
Create ASM disk through DD
每日刷题记录 (十二)
1. Mx6u-alpha development board (simulating STM32 drive development experiment)
Can closed data be deleted by DBCA? can
Test cs4344 stereo DA converter