当前位置:网站首页>Security baseline of network security
Security baseline of network security
2022-07-29 08:08:00 【A green and a lemon】
Safety baseline
The safety baseline expresses the most basic safety requirements that need to be met .
Baseline verification
Is the security baseline configuration verification ( Or check ) For short , It generally refers to according to the configuration baseline ( Different industries and organizations have different baseline requirements for security configuration ) Requirements for IT Check the safety configuration of the equipment , To find weak or unsatisfactory configurations .
1. Baseline check object
Note that in any baseline related management process , We need to give priority to the number of assets 、 type

2. Baseline check dimension
Whether for hardware or software , Baseline verification has common dimensions , It mainly includes the following aspects :
- Access control
- Authorization management
- Invasion prevention
- Log audit
- Resource management
(1) Access control
for example :
- User authority management
- User password management , Rename default user , Change the default password
- Delete or deactivate unnecessary accounts , Avoid sharing accounts
- Minimum user permissions , Separation of authority
- Access control granularity , process 、 file 、 Database table
- Sensitive information security mark
(2) Authorization management
for example :
- Each application system 、 User management of equipment ( User and authority review 、 Password management )
- Login failure handling ( Account lock 、 Timeout exit )
- The remote management link should be encrypted (https ssh rdp)
- Two factor validation
(3) Invasion prevention
for example :
- Minimum installation principle of equipment and system
- The port service is turned off by default
- During equipment management, you need to set the allowable management range
- Vulnerability management of systems and devices
- Intrusion detection of important nodes and equipment itself
(4) Log audit
- Whether all equipment and systems are subject to safety audit
- The audit includes users 、 Time 、 Event type 、 Event success, etc
- Audit records are backed up regularly
- Protection of the audit process
- The clock of audit equipment is unified
- User behavior audit on application
(5) Resource management
- Limit the use of resources and processes by a single user
- Redundancy of important node equipment
- Monitoring of important nodes ,CPU Memory hard disk
- Service performance detection of important nodes
- When the application is idle , Automatically end the session
- The maximum number of sessions of the business system or middleware
- Single user session restrictions
- The limit of resources occupied by the process
3. Baseline check method
Manual inspection
Automatic system check
advantage : Little work , Fast
shortcoming : May cause unknown effects
principle :
& Install the agent on the target system agent , To the operating system 、 Application software is applicable , But it is not applicable to the hardware equipment of packaging molding
& Script and run , Manual or automatic operation , Collect running results
& Provide the target system account , Scan and detect by special platform
边栏推荐
- Data warehouse modeling, what is wide table? How to design? Advantages and disadvantages
- BiSeNet v2
- (视频+图文)机器学习入门系列-第5章 机器学习实践
- 华为无线设备配置利用WDS技术部署WLAN业务
- SQL 面试碰到的一个问题
- Use the cloud code to crack the problem of authentication code encountered during login
- Unity beginner 3 - enemy movement control and setting of blood loss area (2D)
- Limitations of push down analysis
- Vmstat memory consumption query
- [paper reading | cryoet] gum net: fast and accurate 3D subtomo image alignment and average unsupervised geometric matching
猜你喜欢

Detailed explanation of two modes of FTP
![[cryoelectron microscope] relation4.0 - subtomogram tutorial](/img/5b/5364fbe68c495b67d9db5ed9bec2ac.png)
[cryoelectron microscope] relation4.0 - subtomogram tutorial

STM32 detection signal frequency

简易计算器微信小程序项目源码

华为无线设备配置利用WDS技术部署WLAN业务

SQL 面试碰到的一个问题

Research on autojs wechat: the final product of wechat automatic information sending robot (effective demonstration)

Tcp/ip five layer reference model and corresponding typical devices and IPv6

Tle5012b+stm32f103c8t6 (bluepill) reading angle data
![[beauty of software engineering - column notes] 29 | automated testing: how to kill bugs in the cradle?](/img/e1/8a61f85bf93801d842e78ab4f7edc7.png)
[beauty of software engineering - column notes] 29 | automated testing: how to kill bugs in the cradle?
随机推荐
Excellent urban design ~ good! Design # visualization radio station will be broadcast soon
STM32 printf problem summary semihosting microlib understanding
File system I
Ws2812b color lamp driver based on f407zgt6
An Optimal Buffer Management Scheme with Dynamic Thresholds论文总结
在一个sql文件中,上面定义一个测试表及数据,下面可以select* from 测试表
[cryoelectron microscope | paper reading] emclarity: software for high-resolution cryoelectron tomography and sub fault averaging
[skill accumulation] common expressions when writing emails
[introduction to cryoelectron microscopy] Caltech open class course notes part 3:image formation
阿里巴巴政委体系-第一章、政委建在连队上
"Swiss Army Knife" -nc in network tools
LVM logical volume group management
阿里巴巴政委体系-第三章、阿里政委与文化对接
10 common software architecture modes
Unity beginner 4 - frame animation and protagonist attack (2D)
Beautiful girls
[skill accumulation] presentation practical skill accumulation, common sentence patterns
[cryptography experiment] 0x00 install NTL Library
Tle5012b+stm32f103c8t6 (bluepill) reading angle data
Arduinoide + stm32link burning debugging