当前位置:网站首页>Security baseline of network security
Security baseline of network security
2022-07-29 08:08:00 【A green and a lemon】
Safety baseline
The safety baseline expresses the most basic safety requirements that need to be met .
Baseline verification
Is the security baseline configuration verification ( Or check ) For short , It generally refers to according to the configuration baseline ( Different industries and organizations have different baseline requirements for security configuration ) Requirements for IT Check the safety configuration of the equipment , To find weak or unsatisfactory configurations .
1. Baseline check object
Note that in any baseline related management process , We need to give priority to the number of assets 、 type
2. Baseline check dimension
Whether for hardware or software , Baseline verification has common dimensions , It mainly includes the following aspects :
- Access control
- Authorization management
- Invasion prevention
- Log audit
- Resource management
(1) Access control
for example :
- User authority management
- User password management , Rename default user , Change the default password
- Delete or deactivate unnecessary accounts , Avoid sharing accounts
- Minimum user permissions , Separation of authority
- Access control granularity , process 、 file 、 Database table
- Sensitive information security mark
(2) Authorization management
for example :
- Each application system 、 User management of equipment ( User and authority review 、 Password management )
- Login failure handling ( Account lock 、 Timeout exit )
- The remote management link should be encrypted (https ssh rdp)
- Two factor validation
(3) Invasion prevention
for example :
- Minimum installation principle of equipment and system
- The port service is turned off by default
- During equipment management, you need to set the allowable management range
- Vulnerability management of systems and devices
- Intrusion detection of important nodes and equipment itself
(4) Log audit
- Whether all equipment and systems are subject to safety audit
- The audit includes users 、 Time 、 Event type 、 Event success, etc
- Audit records are backed up regularly
- Protection of the audit process
- The clock of audit equipment is unified
- User behavior audit on application
(5) Resource management
- Limit the use of resources and processes by a single user
- Redundancy of important node equipment
- Monitoring of important nodes ,CPU Memory hard disk
- Service performance detection of important nodes
- When the application is idle , Automatically end the session
- The maximum number of sessions of the business system or middleware
- Single user session restrictions
- The limit of resources occupied by the process
3. Baseline check method
Manual inspection
Automatic system check
advantage : Little work , Fast
shortcoming : May cause unknown effects
principle :
& Install the agent on the target system agent , To the operating system 、 Application software is applicable , But it is not applicable to the hardware equipment of packaging molding
& Script and run , Manual or automatic operation , Collect running results
& Provide the target system account , Scan and detect by special platform
边栏推荐
- 关于pip升级损坏导致的问题记录
- [paper reading | cryoelectron microscope] interpretation of the new subtomogram averaging method in relion 4.0
- 阿里巴巴政委体系-第四章、政委建在连队上
- Dynamic Thresholds Buffer Management in a Shared Buffer Packet Switch论文总结
- [beauty of software engineering - column notes] 24 | technical debt: continue to make do with it, or overthrow it and start over?
- [paper reading] tomoalign: a novel approach to correcting sample motion and 3D CTF in cryoet
- STM32 printf problem summary semihosting microlib understanding
- CentOS deploy PostgreSQL 13
- [beauty of software engineering - column notes] 25 | what methods can improve development efficiency?
- Official tutorial redshift 01 basic theoretical knowledge and basic characteristics learning
猜你喜欢
Character shader exercise
【学术相关】为什么很多国内学者的AI的论文复现不了?
Useful websites
Unity Shader学习(六)实现雷达扫描效果
How to draw an excellent architecture diagram
Unity multiplayer online framework mirror learning record (I)
阿里巴巴政委体系-第一章、政委建在连队上
Measured waveform of boot capacitor short circuit and open circuit of buck circuit
CDM - code division multiplexing (easy to understand)
[freeze electron microscope] analysis of the source code of the subtomogram alignment function of relion4.0 (for self use)
随机推荐
Some simple uses of crawler requests Library
Processes and threads
How to draw an excellent architecture diagram
Matrix decomposition and gradient descent
[dry goods memo] 50 kinds of Matplotlib scientific research paper drawing collection, including code implementation
关于pip升级损坏导致的问题记录
在一个sql文件中,上面定义一个测试表及数据,下面可以select* from 测试表
[paper reading | cryoelectron microscope] interpretation of the new subtomogram averaging method in relion 4.0
Mysql rownum 实现
Redshift 2.6.41 for maya2018 watermark removal
(视频+图文)机器学习入门系列-第5章 机器学习实践
Exercise: store department information
The computer system has no standard tcp/ip port processing operations
UE4 principle and difference between skylight and reflecting sphere
[noi simulation] computational geometry (convex hull, violence, and search set)
Unity beginner 2 - tile making and world interaction (2D)
Crawl expression bag
UE4 highlight official reference value
[skill accumulation] presentation practical skill accumulation, common sentence patterns
Simplefoc parameter adjustment 2- speed and position control