当前位置:网站首页>Zhongke Panyun - module a infrastructure setting and safety reinforcement scoring standard
Zhongke Panyun - module a infrastructure setting and safety reinforcement scoring standard
2022-07-04 04:59:00 【Beluga】
modular A Infrastructure setting and security reinforcement
need A Module environment private
One 、 Project and task description :
Suppose you are a network security engineer in an enterprise , For enterprise server system , Ensure the normal operation of all services according to the task requirements , And through the comprehensive use of login and password policies 、 Traffic integrity protection strategy 、 Event monitoring strategy 、 Firewall strategy and other security strategies to improve the network security defense ability of the server system . This module requires screenshots of specific tasks and corresponding text descriptions , With word Document writing , With PDF Format preservation , Take the match number as the file name .
Two 、 Server environment description
Log: Log server (Splunk), The operating system is Linux
Web:IIS The server , The operating system is Windows
A-1 Task a Login security
Please check the server Web Make corresponding settings as required , Improve the security of the server .
1. Password policy (Web)
a. The minimum password length shall not be less than 8 Characters , Screenshot of the attribute configuration interface of the minimum password length ;

b. The password policy must satisfy both upper and lower case letters 、 Numbers 、 Special characters , Screenshot of the attribute configuration interface where the password must meet the complexity requirements .

2. Login strategy (Web)
a. When the user logs in to the system , Should have “For authorized users only” Prompt information , A screenshot of the warning message window will pop up when logging in to the system ;

b. Only... Are allowed for one minute 5 Failed login attempts , exceed 5 Time , Login account locked 1 minute , Screenshot of the account locking policy configuration interface ;( Be careful , More than five locks , So the lock threshold here should be 6 Time , In the screenshot, if 5 No score for times )

c. The remote user inactive session connection timeout should be less than or equal to 5 minute , take RDP-Tcp Screenshot of the configuration interface corresponding to the property .

3. User security management (Web)
a. Remote management security of server SSL strengthening , Prevent sensitive information disclosure from being monitored , take RDP-Tcp Screenshot of the configuration interface corresponding to the property ;

b. Only the super administrator account is allowed to shut down the system , Screenshot of the configuration interface of system properties will be closed .

A-2 Task 2 Web Safety reinforcement (Web)
1. In order to prevent web in .mdb Illegal download of database file , Yes, please. Web Secure the configuration file , take C:\Windows\System32\inetsrv\config\applicationHost Screenshot of the corresponding part in the configuration file ;

2. Restrict directory execution permissions , Yes picture and upload Set the execution permission of the directory to none , Screenshot of the configuration interface for editing function permissions ;
picture Directory permission settings

or

upload Directory permission settings

or

Give all points
3. Turn on IIS Log audit records for ( The log file is saved in W3C, Only record the date 、 Time 、 client IP Address 、 user name 、 Method ), take W3C Screenshot of the configuration interface of logging field ;

4. In order to reduce the load on the website , Set the maximum number of concurrent connections for the website to 1000, Screenshot of the configuration interface that will edit website restrictions ;

5. Prevent file enumeration vulnerability to enumerate network server root files , prohibit IIS Short file name leaked , Screenshot of the configuration command ;
![]()
6. close IIS Of WebDAV Function to enhance the security of the website , Take a screenshot of the alert message .

A-3 Task three Flow integrity protection and event monitoring (Web,Log)
1. In order to prevent the password from being stolen when logging in or transmitting information , Log in with a certificate only SSH(Log), take /etc/ssh/sshd_config Screenshot of the corresponding part in the configuration file ;


2. take Web The server turns on the audit policy
Login Events success / Failure ;
Privilege use success ;
Policy changes success / Failure ;
Process tracking success / Failure ;
Take a screenshot of the configuration interface of the audit policy ;

3. To configure Splunk receive Web The server , Security log , system log ,CPU load , Memory , disk space , Network state . Transfer transponder : Screenshot of the successfully deployed page .

A-4 Task 4 Firewall policy
All servers turn on the firewall , In order to prevent blackmail virus attack, the firewall is reinforced :
1.Windows System Disabled 445 port , Screenshot of inbound rule of firewall ;
![]()
2.Linux System Disabled 23 port , take iptables Screenshot of configuration command ;

3.Linux The system forbids others ping through , take iptables Screenshot of configuration command ;
![]()
4.Linux In order to ensure safety, the system prohibits everyone from connecting SSH except 172.16.1.1 This ip, take iptables Screenshot of configuration command .
![]()
![]()
Points will be given only if the two pictures are all right
边栏推荐
- Kivy tutorial 07 component and attribute binding implementation button button click to modify the label component (tutorial includes source code)
- 【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(余弦滚降成形脉冲)的眼图
- 6-5 vulnerability exploitation SSH weak password cracking and utilization
- Yolov6 practice: teach you to use yolov6 for object detection (with data set)
- 【MATLAB】通信信号调制通用函数 — 傅里叶变换
- Correct the classpath of your application so that it contains a single, compatible version of com. go
- 附件五:攻击过程简报.docx
- Operate the server remotely more gracefully: the practice of paramiko Library
- Introduction and application of rampax in unity: optimization of dissolution effect
- 中科磐云—2022广西逆向解析思路
猜你喜欢

Secondary vocational group network security - memory Forensics

ADB tools

简单g++和gdb调试

MySQL JDBC programming

2022广东省赛——编码信息获取 解析flag

Flutter 调用高德地图APP实现位置搜索、路线规划、逆地理编码

20000 words will take you to master multithreading

Notes on the paper "cross view transformers for real time map view semantic segmentation"

Dp83848+ network cable hot plug

2022年6月总结
随机推荐
cmake
C basic (VII) document operation
Annex V: briefing on the attack process docx
Customize a pager needed in your project
COMP1721 Creating Classes
VSCode的有用插件
PaddleHub人脸识别方案部署,将训练好的模型在pytchrom中进行部署应用
When using flash to store parameters, the code area of flash is erased, which leads to the interrupt of entering hardware error
附件五:攻击过程简报.docx
Zhongke panyun-d module analysis and scoring standard
Yolov6 practice: teach you to use yolov6 for object detection (with data set)
Niuke Xiaobai monthly race 49
电子元器件商城与数据手册下载网站汇总
【MATLAB】通信信号调制通用函数 — 窄带高斯白噪声的生成
Create ASM disk through DD
【MATLAB】MATLAB 仿真数字基带传输系统 — 数字基带传输系统
Utiliser des unités de mesure dans votre code pour une vie meilleure
我们认为消费互联网发展到最后,依然会局限于互联网行业本身
Network - vxlan
appliedzkp zkevm(11)中的EVM Proof