当前位置:网站首页>Security baseline of network security
Security baseline of network security
2022-07-29 08:08:00 【A green and a lemon】
Safety baseline
The safety baseline expresses the most basic safety requirements that need to be met .
Baseline verification
Is the security baseline configuration verification ( Or check ) For short , It generally refers to according to the configuration baseline ( Different industries and organizations have different baseline requirements for security configuration ) Requirements for IT Check the safety configuration of the equipment , To find weak or unsatisfactory configurations .
1. Baseline check object
Note that in any baseline related management process , We need to give priority to the number of assets 、 type

2. Baseline check dimension
Whether for hardware or software , Baseline verification has common dimensions , It mainly includes the following aspects :
- Access control
- Authorization management
- Invasion prevention
- Log audit
- Resource management
(1) Access control
for example :
- User authority management
- User password management , Rename default user , Change the default password
- Delete or deactivate unnecessary accounts , Avoid sharing accounts
- Minimum user permissions , Separation of authority
- Access control granularity , process 、 file 、 Database table
- Sensitive information security mark
(2) Authorization management
for example :
- Each application system 、 User management of equipment ( User and authority review 、 Password management )
- Login failure handling ( Account lock 、 Timeout exit )
- The remote management link should be encrypted (https ssh rdp)
- Two factor validation
(3) Invasion prevention
for example :
- Minimum installation principle of equipment and system
- The port service is turned off by default
- During equipment management, you need to set the allowable management range
- Vulnerability management of systems and devices
- Intrusion detection of important nodes and equipment itself
(4) Log audit
- Whether all equipment and systems are subject to safety audit
- The audit includes users 、 Time 、 Event type 、 Event success, etc
- Audit records are backed up regularly
- Protection of the audit process
- The clock of audit equipment is unified
- User behavior audit on application
(5) Resource management
- Limit the use of resources and processes by a single user
- Redundancy of important node equipment
- Monitoring of important nodes ,CPU Memory hard disk
- Service performance detection of important nodes
- When the application is idle , Automatically end the session
- The maximum number of sessions of the business system or middleware
- Single user session restrictions
- The limit of resources occupied by the process
3. Baseline check method
Manual inspection
Automatic system check
advantage : Little work , Fast
shortcoming : May cause unknown effects
principle :
& Install the agent on the target system agent , To the operating system 、 Application software is applicable , But it is not applicable to the hardware equipment of packaging molding
& Script and run , Manual or automatic operation , Collect running results
& Provide the target system account , Scan and detect by special platform
边栏推荐
- Excellent urban design ~ good! Design # visualization radio station will be broadcast soon
- Unity - default rendering pipeline - sculpt shader
- STM32 MDK (keil5) contents mismatch error summary
- [beauty of software engineering - column notes] 21 | architecture design: can ordinary programmers also implement complex systems?
- UE4 highlight official reference value
- Why don't you like it? It's easy to send email in cicd
- In the MySQL connector of flynk CDC, the MySQL field is varbinary, which is officially
- Unity beginner 1 - character movement control (2D)
- An optimal buffer management scheme with dynamic thresholds paper summary
- [flask introduction series] installation and configuration of flask Sqlalchemy
猜你喜欢

Some thoughts on growing into an architect

UE4 highlight official reference value

Simplefoc parameter adjustment 1-torque control

Unity - default rendering pipeline - sculpt shader

Dynamic Thresholds Buffer Management in a Shared Buffer Packet Switch论文总结
![[paper reading | cryoelectron microscope] interpretation of the new subtomogram averaging method in relion 4.0](/img/8d/03e63d651b713f547b090e6e740b06.png)
[paper reading | cryoelectron microscope] interpretation of the new subtomogram averaging method in relion 4.0
![[beauty of software engineering - column notes] 25 | what methods can improve development efficiency?](/img/c8/c2d45abbf36b898040f9f1cf6274ff.png)
[beauty of software engineering - column notes] 25 | what methods can improve development efficiency?

Why don't you like it? It's easy to send email in cicd
![[robomaster] a board receives jy-me01 angle sensor data -- Modbus Protocol & CRC software verification](/img/0e/e5be0fffb154d081c20b09832530d4.png)
[robomaster] a board receives jy-me01 angle sensor data -- Modbus Protocol & CRC software verification
![[beauty of software engineering - column notes]](/img/b9/43db3fdfe1d9f08035668a66da37e2.png)
[beauty of software engineering - column notes] "one question and one answer" issue 3 | 18 common software development problem-solving strategies
随机推荐
[freeze electron microscope] analysis of the source code of the subtomogram alignment function of relion4.0 (for self use)
C language problems
An Optimal Buffer Management Scheme with Dynamic Thresholds论文总结
Do you want to meet all the needs of customers
[beauty of software engineering - column notes] 21 | architecture design: can ordinary programmers also implement complex systems?
Eps32+platform+arduino running lantern
In the MySQL connector of flynk CDC, the MySQL field is varbinary, which is officially
Simplefoc parameter adjustment 2- speed and position control
[beauty of software engineering - column notes] 24 | technical debt: continue to make do with it, or overthrow it and start over?
Database persistence +jdbc database connection
CDM - code division multiplexing (easy to understand)
[academic related] why can't many domestic scholars' AI papers be reproduced?
简易计算器微信小程序项目源码
The database uses PSQL and JDBC to connect remotely and disconnect automatically from time to time
[skill accumulation] common expressions when writing emails
Vmstat memory consumption query
torch.nn.functional.one_hot()
Resize2fs: bad magic number in super block
Unity beginner 4 - frame animation and protagonist attack (2D)
Dynamic Thresholds Buffer Management in a Shared Buffer Packet Switch论文总结