当前位置:网站首页>Case ① | host security construction: best practice of 3 levels and 11 capabilities
Case ① | host security construction: best practice of 3 levels and 11 capabilities
2022-07-06 20:05:00 【InfoQ】

Security challenges facing the government industry
Government industry host security maturity
- The host found : It can automatically discover hosts , For different network conditions , Provide a variety of exploration methods .
- Application inventory : Automate the inventory process 、 port 、 account number 、 middleware 、 database 、 Big data components 、Web application 、 Web frame 、Web More than ten categories of security assets such as sites .
- Asset search : Provide key assets ( host 、 account number 、 Process, etc ) System wide Correlation , Joint search across multiple assets .
- It can update and respond to new vulnerabilities in real time .
- Ability to set scanning preferences .
- Reduce host resource consumption , Be able to adapt to a specific host 、 Specific circumstances .
- Vulnerability scanning can be integrated with existing patch management systems .
- Support for all operating systems .
- Support to judge the impact of vulnerability repair .
- It's easy to operate , Convenient operation and maintenance in the later stage .
- Minimum system occupancy , Can adapt to a variety of systems .
- Be able to record events correctly , And send intrusion warning messages to the security administrator
- Be able to conduct effective intrusion analysis 、 Incident handling and evidence collection .
- Easy to access and view logs , Provide log filtering function , Easy to operate and search .
- It can realize one key automatic detection , And provide repair suggestions according to the test results , Meet the compliance requirements .
- Support custom baseline , Make self-examination and rectification in advance by formulating strategies , Flexible response to various strength Standards .
- Based on domestic and foreign baseline Standards , Such as waiting for insurance 2.0、CIS The benchmark , Build rich Checklist The knowledge base .
- It can adapt to different operating system environments , Support scanning operating system 、 database 、 Middleware etc. .
- Integrate multiple influential virus detection engines , And regularly update the detection Library .
- Fit common usage scenarios and ISO requirements .
- Actively block and isolate the confirmed virus .
- Quickly verify the virus found , And analyze its intrusion path .
- It can restore the content of the host that has been maliciously modified .
- The ability to establish file integrity monitoring for files or directories that are commonly used or have compliance requirements .
- Be able to detect unexpected file changes .
- Provide customization of monitoring rules , Reduce reporting noise , And alert and notify the file change events that need special attention .
- Can detect memory Webshell、 Process memory injection 、 Malicious DLL loading and other common memory horses .
- Memory backdoor detection should not affect the operation of the main business program .
- Can find malicious code running in the process memory , And send an alarm to the user in time .
- Provide analysis and description of the characteristics of malicious code .
- Use the ability of accurate detection to verify the repair results of the memory backdoor .
- Set honeypots to confuse attackers , Collect real data on actual attacks and other unauthorized activities .
- By deploying honeypot files , Monitor the operation behavior of files in real time , Lure hackers to attack , Avoid disclosure of real business documents .
- Monitor suspicious port scanning behavior in real time and record , Analyze the purpose and motivation of hackers , Timely fix system security vulnerabilities , Avoid real attacks .
- Zero trust : Realize the access between networks based on the concept of zero trust , Only after the administrator grants credit can you access , Block the access of non credit machines in time , Stifle potential threats .
- visualization : The access between networks is visual to users , When illegal or malicious access occurs , Can distinguish legal and illegal access through different colors .
- The adaptive : Network access policy adaptation . Policies should automatically adapt to changes in the network environment , Timely distribute and implement the latest strategies .
- Continuous monitoring : Abnormal or illegal access behaviors that may occur in the network should be monitored in real time and continuously .
- The person in charge of supply chain network security should cooperate with the relevant teams in the product development cycle , Fully consider the employees of suppliers and developers 、 technological process 、 Safety problems in tools, etc .
- Maintain and manage your own SBOM, Be able to accurately identify key information . At the same time, it needs to support asset information in the cloud native environment .
- Government agencies using cloud native technology , Should be based on DevSecOps idea , Adopt an integrated approach that extends from the development phase to runtime protection , Realize the safety of the whole software life cycle .
- Judge whether the behavior is normal or abnormal : Summarize laws from the behavior of government agencies , Generate relevant models , And regularly check whether there is any behavior that breaks the original law , Effectively identify normal and abnormal behaviors .
- Understand the organization's high-value goals : You need to know the target of the attacker , Sort out all high-value goals of government agencies .
- Data association analysis : Connect several kinds of raw data , Global analysis , Relational query , Find abnormal behavior , Realize the timely discovery of unknown threats and the path traceability of known threats .
- Predict how to be attacked : Attackers exploit weaknesses in organizational structures and data flows , Try to get valuable data without being noticed .
Host security construction cases in the government industry
- Rapid deployment with automated operation and maintenance tools , Quickly realize the security guarantee ability of servers in the decentralized industry LAN .
- Ivy vine has been deployed on the two core business systems of the Seismological Bureau business network and the station network center network Agent, Through model analysis and calculation , Discover risks and threats in real time .
- Through expert remote online consultation 、 On site support services to achieve in-depth analysis of security strategy risks 、 track 、 Handle 、 close , Form a closed loop of safety management .

summary

边栏推荐
- Speech recognition (ASR) paper selection: talcs: an open source Mandarin English code switching corps and a speech
- 系统与应用监控的思路和方法
- Appx代码签名指南
- Phoenix Architecture 3 - transaction processing
- Understand yolov1 Part II non maximum suppression (NMS) in prediction stage
- 使用ssh连接被拒
- Pay attention to the partners on the recruitment website of fishing! The monitoring system may have set you as "high risk of leaving"
- 手把手教你学会js的原型与原型链,猴子都能看懂的教程
- The "white paper on the panorama of the digital economy" has been released with great emphasis on the digitalization of insurance
- 信息系统项目管理师---第八章 项目质量管理
猜你喜欢

VMware virtual machine cannot open the kernel device "\.\global\vmx86"

OceanBase社区版之OBD方式部署方式单机安装

Tencent Android interview must ask, 10 years of Android development experience

Blue Bridge Cup microbial proliferation C language
Tencent architects first, 2022 Android interview written examination summary

Tencent T3 teaches you hand in hand. It's really delicious

Node.js: express + MySQL实现注册登录,身份认证

企业精益管理体系介绍

BUUCTF---Reverse---easyre

Chic Lang: attributeerror: partially initialized module 'CV2' has no attribute 'GAPI_ wip_ gst_ GStreamerPipe
随机推荐
Leetcode 30. Concatenate substrings of all words
Cesium Click to draw a circle (dynamically draw a circle)
部门树递归实现
Phoenix Architecture 2 - accessing remote services
PowerPivot - DAX (first time)
Monthly report of speech synthesis (TTS) and speech recognition (ASR) papers in June 2022
Selenium advanced operations
HDU 1026 search pruning problem within the labyrinth of Ignatius and the prince I
Hudi vs Delta vs Iceberg
《数字经济全景白皮书》保险数字化篇 重磅发布
An East SMS login resurrection installation and deployment tutorial
mod_ WSGI + pymssql path SQL server seat
Microservice architecture debate between radical technologists vs Project conservatives
技术分享 | 抓包分析 TCP 协议
颜色(color)转换为三刺激值(r/g/b)(干股)
RT-Thread 组件 FinSH 使用时遇到的问题
爬虫(14) - Scrapy-Redis分布式爬虫(1) | 详解
精彩编码 【进制转换】
Learning and Exploration - function anti shake
Introduction to enterprise lean management system