当前位置:网站首页>Case ① | host security construction: best practice of 3 levels and 11 capabilities
Case ① | host security construction: best practice of 3 levels and 11 capabilities
2022-07-06 20:05:00 【InfoQ】
Security challenges facing the government industry
Government industry host security maturity
- The host found : It can automatically discover hosts , For different network conditions , Provide a variety of exploration methods .
- Application inventory : Automate the inventory process 、 port 、 account number 、 middleware 、 database 、 Big data components 、Web application 、 Web frame 、Web More than ten categories of security assets such as sites .
- Asset search : Provide key assets ( host 、 account number 、 Process, etc ) System wide Correlation , Joint search across multiple assets .
- It can update and respond to new vulnerabilities in real time .
- Ability to set scanning preferences .
- Reduce host resource consumption , Be able to adapt to a specific host 、 Specific circumstances .
- Vulnerability scanning can be integrated with existing patch management systems .
- Support for all operating systems .
- Support to judge the impact of vulnerability repair .
- It's easy to operate , Convenient operation and maintenance in the later stage .
- Minimum system occupancy , Can adapt to a variety of systems .
- Be able to record events correctly , And send intrusion warning messages to the security administrator
- Be able to conduct effective intrusion analysis 、 Incident handling and evidence collection .
- Easy to access and view logs , Provide log filtering function , Easy to operate and search .
- It can realize one key automatic detection , And provide repair suggestions according to the test results , Meet the compliance requirements .
- Support custom baseline , Make self-examination and rectification in advance by formulating strategies , Flexible response to various strength Standards .
- Based on domestic and foreign baseline Standards , Such as waiting for insurance 2.0、CIS The benchmark , Build rich Checklist The knowledge base .
- It can adapt to different operating system environments , Support scanning operating system 、 database 、 Middleware etc. .
- Integrate multiple influential virus detection engines , And regularly update the detection Library .
- Fit common usage scenarios and ISO requirements .
- Actively block and isolate the confirmed virus .
- Quickly verify the virus found , And analyze its intrusion path .
- It can restore the content of the host that has been maliciously modified .
- The ability to establish file integrity monitoring for files or directories that are commonly used or have compliance requirements .
- Be able to detect unexpected file changes .
- Provide customization of monitoring rules , Reduce reporting noise , And alert and notify the file change events that need special attention .
- Can detect memory Webshell、 Process memory injection 、 Malicious DLL loading and other common memory horses .
- Memory backdoor detection should not affect the operation of the main business program .
- Can find malicious code running in the process memory , And send an alarm to the user in time .
- Provide analysis and description of the characteristics of malicious code .
- Use the ability of accurate detection to verify the repair results of the memory backdoor .
- Set honeypots to confuse attackers , Collect real data on actual attacks and other unauthorized activities .
- By deploying honeypot files , Monitor the operation behavior of files in real time , Lure hackers to attack , Avoid disclosure of real business documents .
- Monitor suspicious port scanning behavior in real time and record , Analyze the purpose and motivation of hackers , Timely fix system security vulnerabilities , Avoid real attacks .
- Zero trust : Realize the access between networks based on the concept of zero trust , Only after the administrator grants credit can you access , Block the access of non credit machines in time , Stifle potential threats .
- visualization : The access between networks is visual to users , When illegal or malicious access occurs , Can distinguish legal and illegal access through different colors .
- The adaptive : Network access policy adaptation . Policies should automatically adapt to changes in the network environment , Timely distribute and implement the latest strategies .
- Continuous monitoring : Abnormal or illegal access behaviors that may occur in the network should be monitored in real time and continuously .
- The person in charge of supply chain network security should cooperate with the relevant teams in the product development cycle , Fully consider the employees of suppliers and developers 、 technological process 、 Safety problems in tools, etc .
- Maintain and manage your own SBOM, Be able to accurately identify key information . At the same time, it needs to support asset information in the cloud native environment .
- Government agencies using cloud native technology , Should be based on DevSecOps idea , Adopt an integrated approach that extends from the development phase to runtime protection , Realize the safety of the whole software life cycle .
- Judge whether the behavior is normal or abnormal : Summarize laws from the behavior of government agencies , Generate relevant models , And regularly check whether there is any behavior that breaks the original law , Effectively identify normal and abnormal behaviors .
- Understand the organization's high-value goals : You need to know the target of the attacker , Sort out all high-value goals of government agencies .
- Data association analysis : Connect several kinds of raw data , Global analysis , Relational query , Find abnormal behavior , Realize the timely discovery of unknown threats and the path traceability of known threats .
- Predict how to be attacked : Attackers exploit weaknesses in organizational structures and data flows , Try to get valuable data without being noticed .
Host security construction cases in the government industry
- Rapid deployment with automated operation and maintenance tools , Quickly realize the security guarantee ability of servers in the decentralized industry LAN .
- Ivy vine has been deployed on the two core business systems of the Seismological Bureau business network and the station network center network Agent, Through model analysis and calculation , Discover risks and threats in real time .
- Through expert remote online consultation 、 On site support services to achieve in-depth analysis of security strategy risks 、 track 、 Handle 、 close , Form a closed loop of safety management .
summary
边栏推荐
- 算法面试经典100题,Android程序员最新职业规划
- Cf960g - bandit Blues (type I Stirling number +ogf)
- 爬虫(14) - Scrapy-Redis分布式爬虫(1) | 详解
- String长度限制?
- OceanBase社区版之OBD方式部署方式单机安装
- Cesium 两点之间的直线距离
- PowerPivot——DAX(初识)
- leetcode先刷_Maximum Subarray
- Chic Lang: attributeerror: partially initialized module 'CV2' has no attribute 'GAPI_ wip_ gst_ GStreamerPipe
- js实现力扣71题简化路径
猜你喜欢
Speech recognition (ASR) paper selection: talcs: an open source Mandarin English code switching corps and a speech
Phoenix Architecture 3 - transaction processing
beegfs高可用模式探讨
Blue Bridge Cup microbial proliferation C language
【GET-4】
Classic 100 questions of algorithm interview, the latest career planning of Android programmers
An East SMS login resurrection installation and deployment tutorial
腾讯T4架构师,android面试基础
Microservice architecture debate between radical technologists vs Project conservatives
22-07-05 七牛云存储图片、用户头像上传
随机推荐
golang的超时处理使用技巧
[network planning] Chapter 3 data link layer (3) channel division medium access control
Monthly report of speech synthesis (TTS) and speech recognition (ASR) papers in June 2022
Social recruitment interview experience, 2022 latest Android high-frequency selected interview questions sharing
小微企业难做账?智能代账小工具快用起来
腾讯T4架构师,android面试基础
手把手教你学会js的原型与原型链,猴子都能看懂的教程
POJ1149 PIGS 【最大流量】
新一代垃圾回收器—ZGC
企业精益管理体系介绍
Learning and Exploration - Seamless rotation map
HDU 1026 Ignatius and the Princess I 迷宫范围内的搜索剪枝问题
Enumeration gets values based on parameters
Database specific interpretation of paradigm
5. Nano - Net in wireless body: Top 10 "is it possible?" Questions
Leetcode 30. Concatenate substrings of all words
An East SMS login resurrection installation and deployment tutorial
微信小程序常用集合
22-07-05 七牛云存储图片、用户头像上传
AsyncHandler