当前位置:网站首页>Case ① | host security construction: best practice of 3 levels and 11 capabilities
Case ① | host security construction: best practice of 3 levels and 11 capabilities
2022-07-06 20:05:00 【InfoQ】

Security challenges facing the government industry
Government industry host security maturity
- The host found : It can automatically discover hosts , For different network conditions , Provide a variety of exploration methods .
- Application inventory : Automate the inventory process 、 port 、 account number 、 middleware 、 database 、 Big data components 、Web application 、 Web frame 、Web More than ten categories of security assets such as sites .
- Asset search : Provide key assets ( host 、 account number 、 Process, etc ) System wide Correlation , Joint search across multiple assets .
- It can update and respond to new vulnerabilities in real time .
- Ability to set scanning preferences .
- Reduce host resource consumption , Be able to adapt to a specific host 、 Specific circumstances .
- Vulnerability scanning can be integrated with existing patch management systems .
- Support for all operating systems .
- Support to judge the impact of vulnerability repair .
- It's easy to operate , Convenient operation and maintenance in the later stage .
- Minimum system occupancy , Can adapt to a variety of systems .
- Be able to record events correctly , And send intrusion warning messages to the security administrator
- Be able to conduct effective intrusion analysis 、 Incident handling and evidence collection .
- Easy to access and view logs , Provide log filtering function , Easy to operate and search .
- It can realize one key automatic detection , And provide repair suggestions according to the test results , Meet the compliance requirements .
- Support custom baseline , Make self-examination and rectification in advance by formulating strategies , Flexible response to various strength Standards .
- Based on domestic and foreign baseline Standards , Such as waiting for insurance 2.0、CIS The benchmark , Build rich Checklist The knowledge base .
- It can adapt to different operating system environments , Support scanning operating system 、 database 、 Middleware etc. .
- Integrate multiple influential virus detection engines , And regularly update the detection Library .
- Fit common usage scenarios and ISO requirements .
- Actively block and isolate the confirmed virus .
- Quickly verify the virus found , And analyze its intrusion path .
- It can restore the content of the host that has been maliciously modified .
- The ability to establish file integrity monitoring for files or directories that are commonly used or have compliance requirements .
- Be able to detect unexpected file changes .
- Provide customization of monitoring rules , Reduce reporting noise , And alert and notify the file change events that need special attention .
- Can detect memory Webshell、 Process memory injection 、 Malicious DLL loading and other common memory horses .
- Memory backdoor detection should not affect the operation of the main business program .
- Can find malicious code running in the process memory , And send an alarm to the user in time .
- Provide analysis and description of the characteristics of malicious code .
- Use the ability of accurate detection to verify the repair results of the memory backdoor .
- Set honeypots to confuse attackers , Collect real data on actual attacks and other unauthorized activities .
- By deploying honeypot files , Monitor the operation behavior of files in real time , Lure hackers to attack , Avoid disclosure of real business documents .
- Monitor suspicious port scanning behavior in real time and record , Analyze the purpose and motivation of hackers , Timely fix system security vulnerabilities , Avoid real attacks .
- Zero trust : Realize the access between networks based on the concept of zero trust , Only after the administrator grants credit can you access , Block the access of non credit machines in time , Stifle potential threats .
- visualization : The access between networks is visual to users , When illegal or malicious access occurs , Can distinguish legal and illegal access through different colors .
- The adaptive : Network access policy adaptation . Policies should automatically adapt to changes in the network environment , Timely distribute and implement the latest strategies .
- Continuous monitoring : Abnormal or illegal access behaviors that may occur in the network should be monitored in real time and continuously .
- The person in charge of supply chain network security should cooperate with the relevant teams in the product development cycle , Fully consider the employees of suppliers and developers 、 technological process 、 Safety problems in tools, etc .
- Maintain and manage your own SBOM, Be able to accurately identify key information . At the same time, it needs to support asset information in the cloud native environment .
- Government agencies using cloud native technology , Should be based on DevSecOps idea , Adopt an integrated approach that extends from the development phase to runtime protection , Realize the safety of the whole software life cycle .
- Judge whether the behavior is normal or abnormal : Summarize laws from the behavior of government agencies , Generate relevant models , And regularly check whether there is any behavior that breaks the original law , Effectively identify normal and abnormal behaviors .
- Understand the organization's high-value goals : You need to know the target of the attacker , Sort out all high-value goals of government agencies .
- Data association analysis : Connect several kinds of raw data , Global analysis , Relational query , Find abnormal behavior , Realize the timely discovery of unknown threats and the path traceability of known threats .
- Predict how to be attacked : Attackers exploit weaknesses in organizational structures and data flows , Try to get valuable data without being noticed .
Host security construction cases in the government industry
- Rapid deployment with automated operation and maintenance tools , Quickly realize the security guarantee ability of servers in the decentralized industry LAN .
- Ivy vine has been deployed on the two core business systems of the Seismological Bureau business network and the station network center network Agent, Through model analysis and calculation , Discover risks and threats in real time .
- Through expert remote online consultation 、 On site support services to achieve in-depth analysis of security strategy risks 、 track 、 Handle 、 close , Form a closed loop of safety management .

summary

边栏推荐
- [Yann Lecun likes the red stone neural network made by minecraft]
- Oceanbase Community Edition OBD mode deployment mode stand-alone installation
- OceanBase社区版之OBD方式部署方式单机安装
- Configuration and simple usage of the EXE backdoor generation tool quasar
- How to handle the timeout of golang
- [calculating emotion and thought] floor sweeper, typist, information panic and Oppenheimer
- 案例 ①|主机安全建设:3个层级,11大能力的最佳实践
- 22-07-05 七牛云存储图片、用户头像上传
- Social recruitment interview experience, 2022 latest Android high-frequency selected interview questions sharing
- Crawler (14) - scrape redis distributed crawler (1) | detailed explanation
猜你喜欢

Node.js: express + MySQL实现注册登录,身份认证

Tencent T3 teaches you hand in hand. It's really delicious
Classic 100 questions of algorithm interview, the latest career planning of Android programmers
腾讯安卓开发面试,android开发的基础知识

手把手教你学会js的原型与原型链,猴子都能看懂的教程

2022年6月语音合成(TTS)和语音识别(ASR)论文月报
Tencent architects first, 2022 Android interview written examination summary

redisson bug分析

BUUCTF---Reverse---easyre
![[Yann Lecun likes the red stone neural network made by minecraft]](/img/95/c3af40c7ecbd371dd674aea19b272a.png)
[Yann Lecun likes the red stone neural network made by minecraft]
随机推荐
An East SMS login resurrection installation and deployment tutorial
Tencent T2 Daniel explained in person and doubled his job hopping salary
Alibaba数据源Druid可视化监控配置
New generation garbage collector ZGC
腾讯T4架构师,android面试基础
AsyncHandler
VMware virtual machine cannot open the kernel device "\.\global\vmx86"
Guangzhou's first data security summit will open in Baiyun District
Introduction to enterprise lean management system
Social recruitment interview experience, 2022 latest Android high-frequency selected interview questions sharing
某东短信登录复活 安装部署教程
腾讯安卓开发面试,android开发的基础知识
Synchronization of data create trigger synchronization table for each site
激进技术派 vs 项目保守派的微服务架构之争
Pay attention to the partners on the recruitment website of fishing! The monitoring system may have set you as "high risk of leaving"
爬虫(14) - Scrapy-Redis分布式爬虫(1) | 详解
【GET-4】
[play with Linux] [docker] MySQL installation and configuration
HMS Core 机器学习服务打造同传翻译新“声”态,AI让国际交流更顺畅
mod_wsgi + pymssql通路SQL Server座