+

WO2017167015A1 - Procédé et dispositif destinés à la gestion de sécurité de dispositif serveur et support de mémoire informatique - Google Patents

Procédé et dispositif destinés à la gestion de sécurité de dispositif serveur et support de mémoire informatique Download PDF

Info

Publication number
WO2017167015A1
WO2017167015A1 PCT/CN2017/076797 CN2017076797W WO2017167015A1 WO 2017167015 A1 WO2017167015 A1 WO 2017167015A1 CN 2017076797 W CN2017076797 W CN 2017076797W WO 2017167015 A1 WO2017167015 A1 WO 2017167015A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
hardening
server device
report
scan report
Prior art date
Application number
PCT/CN2017/076797
Other languages
English (en)
Chinese (zh)
Inventor
周祥生
陈俊
余谦益
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017167015A1 publication Critical patent/WO2017167015A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Definitions

  • the present invention relates to the field of server device security management technologies, and in particular, to a server device security management method, apparatus, and computer storage medium.
  • the patch management and configuration of server equipment to form a scale many commercial companies developing security products can provide professional-grade scanning products, these products can provide security for mainstream LINUX, WINDOWS server equipment and ORACLE, SYBASE database system
  • the detection function prompts the security risks such as the old patch version and the vulnerable security configuration of the system.
  • the embodiments of the present invention provide a server device security management method, apparatus, and computer storage medium.
  • the server device is security hardened according to the keyword that does not pass the security check entry.
  • the step of performing security hardening on the server device according to the keyword that does not pass the security check entry includes:
  • the step of retrieving the hardening program library according to the search key that does not pass the security check entry, and generating an executable security hardening package for the server device includes:
  • An executable security hardening package is generated for the server device based on an executable script generated by the automated hardening program.
  • the step of obtaining a security scan report for the server device includes:
  • the method further includes:
  • the embodiment of the invention further provides a server device security management device, including:
  • Obtaining a module configured to obtain a security scan report for the server device
  • An analysis module configured to analyze the security scan report, and separate a search keyword that fails the security check entry from the security scan report;
  • the security module is configured to perform security hardening on the server device according to the keyword that does not pass the security check entry.
  • the reinforcement module includes:
  • a generating unit configured to retrieve a hardening library according to the retrieval key that does not pass the security check entry, and generate an executable security hardening package for the server device;
  • the scheduling unit is configured to upload the executable security hardening package to the corresponding server device to perform a security hardening operation on the corresponding server device.
  • the generating unit is further configured to: retrieve an automated hardening library according to the search key that does not pass the security check entry, obtain an automated hardening program corresponding to the failed security check entry; and obtain an automated hardening program Generate executable scripts; generate executable security hardening packages for server devices based on executable scripts generated by the automated hardening program.
  • the acquiring module is configured to select a third-party security scanning reporting platform, obtain the identifier and template information of the third-party security scanning reporting platform, and obtain security for the server device from the selected third-party security scanning reporting platform. Scanning report; obtaining a corresponding report resolution policy from the data storage module according to the identifier and template information of the third-party security scan report platform; and obtaining a corresponding search keyword.
  • the scheduling unit is further configured to receive a reinforcement report fed back by the server device after performing a security hardening operation.
  • the embodiment of the invention further provides a computer storage medium, the computer storage medium comprising a set of instructions, when executed, causing at least one processor to execute the server device security management method described above.
  • a server device security management method, device and computer storage medium obtains a security scan report by analyzing a security scan report of a server device, The search keyword that fails the security check entry is separated in the full scan report; the corresponding server device is security-hardened according to the search keyword that does not pass the security check entry, thereby realizing the server device security assessment, analysis, and security hardening ( Automated processing of server equipment security management, improve the efficiency of evaluation results analysis, reduce manual analysis errors, and improve the automation level of security reinforcement.
  • FIG. 1 is a schematic structural diagram of a system involved in an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a first embodiment of a server device security management method according to the present invention
  • FIG. 3 is a schematic diagram of a service flow for initiating a third-party security scan report and automatically analyzing a report by using a scan report analysis module according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a second embodiment of a server device security management method according to the present invention.
  • FIG. 5 is a schematic diagram of a service process for automatically hardening a device according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of a business process of one-click completion report analysis and security hardening in the embodiment of the present invention.
  • FIG. 7 is a schematic diagram of functional modules of a first embodiment of a server device security management apparatus according to the present invention.
  • a third-party compliance security scan report import function is provided, and the scan report is analyzed by comparing the configured parsing rules, the solution is automatically generated, and an executable security hardening program is automatically generated, and Provide online, batch, and automated server device reinforcement functions, from device security assessment to evaluation result analysis, to device security hardening process, “one button” and automated security hardening, so as to improve the efficiency of evaluation results. Provide solutions to reduce manual analysis errors and improve the automation level of security hardening.
  • the solution of the embodiment of the present invention can implement a security scan report on one or more server devices.
  • the intelligent architecture, security hardening and other automated operations, the system architecture can be seen in Figure 1.
  • the architecture may involve: a server security management device, and a plurality of server devices (ie, the host device shown in FIG. 1 , wherein a corresponding proxy module may be set to communicate with the server security management device) .
  • the server security management device may include: a basic data management module, a data storage module, a scan report analysis module, an automated reinforcement program library, and an automated hardening scheduling module.
  • the basic data management module is a human-computer interaction interface. Through this interface, the system administrator can set a third-party security scan report platform (manufacturer) that supports the security scan report, define the format of the scan report of each manufacturer, and analyze the scan report.
  • the logic and strategy (such as compliance entry keywords, scanning device IP information location, etc.), manufacturers and strategies can be dynamically increased or decreased or updated.
  • the data storage module provides data storage for the basic data. It can use commercial databases such as ORACLE and SYBASE, and can also use open source databases such as MYSQL and POSTGRESQL.
  • the automated hardening library consists of a series of executable program scripts.
  • One compliance knowledge point corresponds to an executable program.
  • the so-called compliance knowledge point is a specific requirement of security compliance, such as operating system password strength requirements, shutdown non-essential Port or service requirements, critical system file access requirements, use of secure communication protocol requirements, and more.
  • the scan report analysis module compares the imported third-party manufacturer's compliance scan report with the manufacturer's report format definition and parsing policy preset in the data storage module, and analyzes that the security scan fails the security check entry through the keyword Technical means to retrieve the automated hardening library and generate an executable script for each server device that requires security hardening (with security check entries).
  • the script concatenates the automated hardening program that does not pass the security check entry to ensure these automated hardening procedures. Can be executed sequentially.
  • the automatic hardening scheduling module is a scheduling execution engine that automates security hardening.
  • the executable scripts generated by the scanning report analysis module and the programs included in the script are uploaded to the corresponding server device, and the security hardening result is returned, and the hardening result is generated and a reinforcement report is generated.
  • Security hardening is performed on the host device, supporting proxy mode and non-proxy mode; the communication protocol between the automated scheduling module and the host device can use Secure Shell Protocol (SSH).
  • SSH Secure Shell Protocol
  • the automated scheduling module can be batch-hardened on multiple devices at once and can support virtual machine environments.
  • the automatic analysis of the scan report and the automatic execution of the security hardening are performed in the embodiment of the present invention, which Two actions can be performed with one click or separately.
  • a first embodiment of the present invention provides a server device security management method, including:
  • Step S101 Obtain a security scan report for the server device.
  • the server device in this embodiment may also be referred to as a server, a host device, and the like, and is not limited herein.
  • the obtaining of the security scan report may be locally scanned by the server security management device, or may be obtained by the server security management device from the third-party security scan report platform.
  • the third-party security scan report platform provides a security scan report of each server device.
  • the system administrator can set a third-party security scan report platform (manufacturer) that supports the security scan report through the human-computer interaction interface, define the format of each platform scan report, and scan the report analysis logic and policies (such as compliance items).
  • the keyword, the location of the scanning device IP, etc.), the platform and strategy can be dynamically increased or decreased or updated.
  • the basic data management module selects a third-party security scan report platform according to the operation instruction of the system administrator, and obtains the identifier (name, IP location, etc.) and template information of the third-party security scan report platform.
  • the third-party security scan reporting platform Specifies that the third-party security scan reporting platform performs a secure scan of the server device and imports the report.
  • the scan report analysis module obtains a security scan report for the server device from the selected third-party security scan report platform; and obtains a corresponding report resolution policy from the data storage module according to the identifier and template information of the third-party security scan report platform. And get the corresponding search keyword.
  • the data storage module returns a corresponding report resolution policy and corresponding search keywords.
  • the search keyword may be a number corresponding to various security vulnerabilities, and the number may be different in a report generated by a different third-party security scan report platform. For example, if the report is generated by a form, for the A manufacturer, The number of a certain risk vulnerability is located in the first column of the table. For the B manufacturer, the number of the same type of risk vulnerability may be in the second column of the table.
  • the selected search keyword can be used to retrieve the corresponding security check entry based on the obtained report resolution policy in the security scan report.
  • Step S102 analyzing the security scan report, and separating a search keyword that fails the security check entry from the security scan report;
  • the scan report analysis module separates the search keywords of the failed entry from the report according to the report resolution policy.
  • Step S103 Perform security hardening on the server device according to the keyword that does not pass the security check entry.
  • the hardening library is retrieved according to the retrieval key that does not pass the security check entry, and an executable security hardening package is generated for the server device.
  • the method may further include:
  • the automated reinforcement program library is retrieved according to the retrieval keyword that does not pass the security check entry, and an automated reinforcement program corresponding to each failed security check entry is obtained;
  • an executable security hardening package is generated for each server device in units of server devices, and an analysis report is formed.
  • the embodiment realizes the automatic processing of the server device security assessment analysis, improves the analysis result analysis efficiency, reduces the manual analysis error, and further improves the automation level of the server device security reinforcement.
  • Step 301 The system administrator specifies a manufacturer, a report template, and a report of the third-party security scan report through the human-computer interaction interface.
  • Step 302 The scan report analysis module acquires a corresponding search keyword and a report parsing strategy from the data storage module according to the manufacturer information and the template information.
  • Step 303 the data storage module returns a corresponding report resolution policy and a search keyword
  • Step 304 The scan report analysis module separates the search keyword of the failed entry from the report according to the report parsing policy
  • Step 305 The scan report analysis module retrieves the solution corresponding to each item and the reinforcement program script from the automated reinforcement program library according to the search keyword;
  • Step 306 returning a search result
  • Step 307 The scan report analysis module further processes the search result, generates an analysis report (reporting a recommended solution for failing the item by device), and generates an executable security hardening package;
  • Step 308 presenting an analysis report to the system administrator through the human-computer interaction interface, and the security hardening package can be downloaded through the human-computer interaction interface.
  • the executable security hardening package may be uploaded to a corresponding server device to perform a security hardening operation on the corresponding server device.
  • the system administrator can select to download an executable security hardening package through the human interface. After the executable security hardening package is obtained, the system administrator can import the executable security hardening package of each server device to the corresponding server device to perform security hardening on each server device.
  • the above process can be done automatically by the system or by the system administrator.
  • the solution of the embodiment uses the technologies such as WEB and database to realize the automatic analysis of the security compliance report, and provides the function of automatically generating the security reinforcement program, establishing a security scan, automatic analysis of the scan report, and a series of hardening operations for the security reinforcement. It realizes the automatic evaluation of server equipment security assessment and reinforcement, improves the efficiency of equipment safety assessment results analysis, reduces manual analysis errors, and improves the automation level of server equipment security reinforcement.
  • a second embodiment of the present invention provides a server device security management method. Based on the embodiment shown in FIG. 2 above, the method further includes:
  • Step S104 Receive a reinforcement report fed back by the server device after performing a security hardening operation.
  • the feedback hardening report is sent to the system administrator.
  • FIG. 5 is a service flow of the device that is automatically reinforced according to the analysis result of the process shown in FIG. 3, and the process is as follows:
  • step 401 the system administrator imports the security hardening package generated by the process of FIG. 3 through the human-computer interaction interface. After the import, the system displays the specific content of the package to the administrator, including the hardening content of each device to be executed. Based on the package, you can select which devices perform the reinforcement of which entries;
  • Step 402 the automated hardening scheduling module uploads the corresponding reinforcement package to the device A;
  • Step 403 Perform security hardening on device A.
  • Step 404 returning the reinforcement report of the device A
  • Step 405 the automated hardening scheduling module uploads the corresponding reinforcement package to the device B;
  • Step 406 Perform security hardening on device B.
  • Step 407 returning the reinforcement report of device B
  • Step 408 After all the devices are hardened, the automated hardening scheduling module sorts the hardening reports of the devices and integrates them into a unified report and presents them to the system administrator.
  • the solution of the embodiment uses the technologies such as WEB and database to realize the automatic analysis of the security compliance report, and provides the function of automatically generating the security reinforcement program, and establishes the automatic execution of the security scan, the automatic analysis of the scan report, and the security reinforcement of a series of reinforcement operations.
  • the server equipment security assessment analysis and automatic processing of reinforcement improve the efficiency of equipment safety assessment results analysis, reduce manual analysis errors, and improve the automation level of server equipment security reinforcement.
  • the scan report analysis and the automatic reinforcement can be regarded as a continuous action, that is, the "one button" completes the report analysis and the security reinforcement.
  • FIG. 6 is a combination of the process shown in FIG. 3 and the process shown in FIG. 5, that is, the scanning report analysis and the automatic reinforcement are regarded as continuous actions, that is, the “one button” completes the report analysis and the security reinforcement, and the process has For example, two devices that need to be hardened are as follows:
  • Step 501 The system administrator specifies a manufacturer, a report template, and a report of the third-party security scan report through the human-computer interaction interface.
  • Step 502 The scan report analysis module obtains a corresponding search keyword and a report parsing strategy from the data storage module according to the manufacturer information and the template information.
  • Step 503 The data storage module returns a corresponding report resolution policy.
  • Step 504 The scan report analysis module separates the search keyword of the failed entry from the report according to the report parsing policy
  • Step 505 The scan report analysis module retrieves the solution corresponding to each item and the reinforcement program script according to the search keyword to the automated reinforcement program library;
  • Step 506 returning a search result
  • Step 507 The scan report analysis module further processes the search result, generates an analysis report (reporting the recommended solution for failing the entry by the device), and generates an executable security hardening package;
  • Step 508 The scan report analysis module automatically imports the generated security hardening package into the automatic hardening scheduling module.
  • Step 509 the automated hardening scheduling module uploads the corresponding hardening package to the device A;
  • Step 510 Perform security hardening on device A.
  • Step 511 returning the reinforcement report of the device A
  • Step 512 the automated hardening scheduling module uploads the corresponding hardening package to the device B;
  • Step 513 performing security hardening on device B.
  • Step 514 returning the reinforcement report of the device B
  • Step 515 After all the devices are hardened, the automated hardening scheduling module organizes the hardening reports of the devices and integrates them into a unified report, which is presented to the system administrator.
  • the solution of the embodiment uses the technologies such as WEB and database to realize the automatic analysis of the security compliance report, and provides the function of automatically generating the security reinforcement program, establishing a security scan, automatic analysis of the scan report, and a series of hardening operations for the security reinforcement.
  • the safety assessment analysis and the automated processing of reinforcement improve the efficiency of equipment safety assessment results analysis, reduce manual analysis errors, and improve the automation level of server equipment security reinforcement.
  • the first embodiment of the present invention provides a server device security management apparatus, including: an obtaining module 201, an analyzing module 202, and a reinforcing module 203, where:
  • the obtaining module 201 is configured to obtain a security scan report for the server device, and obtain a search keyword and a report parsing policy; the obtaining module 201 corresponds to the basic data management module in the system architecture shown in FIG. 2;
  • the analyzing module 202 is configured to analyze the security scan report according to the search keyword and the report parsing policy, and separate the search keyword that fails the security check entry from the security scan report;
  • the hardening module 203 is configured to perform security hardening on the server device according to the keyword that does not pass the security check entry.
  • the reinforcement module 203 may include: a generating unit and a scheduling unit;
  • a generating unit configured to retrieve a hardening library according to the retrieval key that does not pass the security check entry, and generate an executable security hardening package for the server device;
  • the scheduling unit is configured to upload the executable security hardening package to the corresponding server device to perform a security hardening operation on the corresponding server device.
  • the analysis module 202 and the generation unit correspond to the scan report analysis module in the system architecture shown in FIG. 2.
  • the server device in this embodiment may also be referred to as a server, a host device, and the like, and is not limited herein.
  • the obtaining of the security scan report may be locally scanned by the server security management device, or may be obtained by the server security management device from the third-party security scan report platform.
  • the third-party security scan report platform provides a security scan report of each server device.
  • the system administrator can set a third-party security scan report platform (manufacturer) that supports the security scan report through the human-computer interaction interface, define the format of each platform scan report, and scan
  • the logic and strategy of the report analysis (such as the compliant entry keyword, the location of the scanning device IP, etc.), the platform and strategy can be dynamically increased or decreased or updated.
  • the third module security scan report platform is selected by the obtaining module 201 according to the operation instruction of the system administrator, and the identifier (name, IP location, etc.) and template information of the third-party security scan report platform are obtained.
  • the third-party security scan reporting platform Specifies that the third-party security scan reporting platform performs a secure scan of the server device and imports the report.
  • the obtaining module 201 (also corresponding to the scan report analysis module shown in FIG. 2) obtains a security scan report for the server device from the selected third-party security scan report platform; and according to the identifier and template of the third-party security scan report platform
  • the information is obtained from the data storage module, and the corresponding search keyword is obtained.
  • the data storage module returns a corresponding report resolution policy and corresponding search keywords.
  • the search keyword may be a number corresponding to various security vulnerabilities, and the number may be different in a report generated by a different third-party security scan report platform. For example, if the report is generated by a form, for the A manufacturer, The number of a certain risk vulnerability is located in the first column of the table. For the B manufacturer, the number of the same type of risk vulnerability may be in the second column of the table.
  • the selected search keyword can be used to retrieve the corresponding security check entry based on the obtained report resolution policy in the security scan report.
  • the analysis module 202 separates the search keywords that have not passed the entry from the report according to the report resolution policy.
  • the generating unit in the hardening module 203 retrieves the hardening program library according to the search key that does not pass the security check entry, and generates an executable security hardening package for the server device.
  • the automated reinforcement program library is retrieved according to the search keyword that does not pass the security check entry, and an automated reinforcement program corresponding to each failed security check entry is obtained;
  • an executable security hardening package is generated for the server device in units of server devices, and an analysis report is formed.
  • the embodiment implements automatic processing of server equipment security assessment analysis, improves analysis result analysis efficiency, reduces manual analysis error, and further improves server equipment.
  • the level of automation for security hardening is the level of automation for security hardening.
  • the scheduling unit in the reinforcement module 203 is configured to upload the executable security hardening package to the corresponding server device to perform a security hardening operation on the corresponding server device.
  • the scheduling unit corresponds to an automated hardening scheduling module in the system architecture shown in FIG. 2.
  • the embodiment further includes a solution for uploading the executable security hardening package to the corresponding server device to perform a security hardening operation on the corresponding server device.
  • the system administrator can select to download an executable security hardening package through the human interface. After the executable security hardening package is obtained, the system administrator can import the executable security hardening package of each server device to the corresponding server device to perform security hardening on each server device.
  • the above process can be done automatically by the system or by the system administrator.
  • the solution of the embodiment uses the technologies such as WEB and database to realize the automatic analysis of the security compliance report, and provides the function of automatically generating the security reinforcement program, establishing a security scan, automatic analysis of the scan report, and a series of hardening operations for the security reinforcement. It realizes the automatic evaluation of server equipment security assessment and reinforcement, improves the efficiency of equipment safety assessment results analysis, reduces manual analysis errors, and improves the automation level of server equipment security reinforcement.
  • the scheduling unit is further configured to receive a reinforcement report that is feedback after the server device performs a security hardening operation.
  • the solution of the embodiment of the present invention provides a third-party compliance security scan report import function, analyzes the scan report by comparing the configured parsing rules, automatically generates a solution, and automatically generates an executable security hardening program, and provides Online, batch, and automated reinforcement of server equipment, from equipment safety assessment, to evaluation results analysis, to the entire process of equipment security hardening, "one-click", automated security hardening, in order to improve the efficiency of evaluation results, Reduce the manual analysis error, improve the automation level of security reinforcement, and provide means and methods.
  • the obtaining module 201, the analyzing module 202, and the generating unit may be implemented by a processor in the server device security management device; the hardening module 203 may be implemented by a processor in the server device security management device in combination with the communication interface;
  • the scheduling unit can be implemented by a communication interface in the server device security management device.
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • Implementation Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes a set of instructions, when executed, causing at least one processor to perform security management of the server device described in the embodiment of the present invention. method.
  • the solution provided by the embodiment of the present invention obtains a security scan report for the server device.
  • Analysis of the security scan report separating the search key that fails the security check entry from the security scan report; performing security hardening on the corresponding server device according to the search key that has not passed the security check entry, thereby implementing security assessment of the server device , analysis and security reinforcement (automatic processing, improve the efficiency of evaluation results analysis, reduce manual analysis errors, improve the automation level of security reinforcement.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • General Factory Administration (AREA)

Abstract

La présente invention concerne un procédé et un dispositif destinés à la gestion de sécurité de dispositif serveur et un support de mémoire informatique. Le procédé consiste : à acquérir un rapport de balayage de sécurité par rapport à un dispositif serveur (S101) ; à analyser le rapport de balayage de sécurité et à isoler à partir du rapport de balayage de sécurité un mot-clé de recherche d'une entrée qui a échoué à une vérification de sécurité (S102) ; et à renforcer la sécurité du dispositif serveur sur la base du mot-clé de l'entrée qui a échoué à la vérification de sécurité (S103).
PCT/CN2017/076797 2016-04-01 2017-03-15 Procédé et dispositif destinés à la gestion de sécurité de dispositif serveur et support de mémoire informatique WO2017167015A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610203332.9 2016-04-01
CN201610203332.9A CN107292175A (zh) 2016-04-01 2016-04-01 服务器设备安全管理方法及装置

Publications (1)

Publication Number Publication Date
WO2017167015A1 true WO2017167015A1 (fr) 2017-10-05

Family

ID=59962560

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076797 WO2017167015A1 (fr) 2016-04-01 2017-03-15 Procédé et dispositif destinés à la gestion de sécurité de dispositif serveur et support de mémoire informatique

Country Status (2)

Country Link
CN (1) CN107292175A (fr)
WO (1) WO2017167015A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111596968A (zh) * 2020-04-28 2020-08-28 上海帆一尚行科技有限公司 安全加固系统及其方法、服务端、客户端、电子设备和存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881159B (zh) * 2018-05-04 2022-06-21 中国信息安全研究院有限公司 一种安全控制方法
CN110233758A (zh) * 2019-06-10 2019-09-13 广东电网有限责任公司 一种服务系统的安全加固方法、装置及相关设备

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873231A (zh) * 2010-07-06 2010-10-27 联想网御科技(北京)有限公司 一种网络入侵特征配置方法及系统
CN102075347A (zh) * 2010-11-18 2011-05-25 北京神州绿盟信息安全科技股份有限公司 一种安全配置核查设备和方法以及采用该设备的网络系统
CN102684911A (zh) * 2012-03-14 2012-09-19 北京神州绿盟信息安全科技股份有限公司 一种安全配置核查设备和方法以及安全配置核查网络系统
CN103049702A (zh) * 2013-01-05 2013-04-17 浪潮电子信息产业股份有限公司 一种基于服务器层的安全加固策略
US8850587B2 (en) * 2007-05-04 2014-09-30 Wipro Limited Network security scanner for enterprise protection
CN104778414A (zh) * 2015-05-06 2015-07-15 广州万方计算机科技有限公司 一种漏洞管理系统及方法
CN106033512A (zh) * 2015-03-20 2016-10-19 中兴通讯股份有限公司 一种安全漏洞加固方法及系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850587B2 (en) * 2007-05-04 2014-09-30 Wipro Limited Network security scanner for enterprise protection
CN101873231A (zh) * 2010-07-06 2010-10-27 联想网御科技(北京)有限公司 一种网络入侵特征配置方法及系统
CN102075347A (zh) * 2010-11-18 2011-05-25 北京神州绿盟信息安全科技股份有限公司 一种安全配置核查设备和方法以及采用该设备的网络系统
CN102684911A (zh) * 2012-03-14 2012-09-19 北京神州绿盟信息安全科技股份有限公司 一种安全配置核查设备和方法以及安全配置核查网络系统
CN103049702A (zh) * 2013-01-05 2013-04-17 浪潮电子信息产业股份有限公司 一种基于服务器层的安全加固策略
CN106033512A (zh) * 2015-03-20 2016-10-19 中兴通讯股份有限公司 一种安全漏洞加固方法及系统
CN104778414A (zh) * 2015-05-06 2015-07-15 广州万方计算机科技有限公司 一种漏洞管理系统及方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111596968A (zh) * 2020-04-28 2020-08-28 上海帆一尚行科技有限公司 安全加固系统及其方法、服务端、客户端、电子设备和存储介质
CN111596968B (zh) * 2020-04-28 2023-10-17 上海帆一尚行科技有限公司 安全加固系统及其方法、服务端、客户端、电子设备和存储介质

Also Published As

Publication number Publication date
CN107292175A (zh) 2017-10-24

Similar Documents

Publication Publication Date Title
US20210352099A1 (en) System for automatically discovering, enriching and remediating entities interacting in a computer network
US11038784B2 (en) Techniques for evaluating server system reliability, vulnerability and component compatibility using crowdsourced server and vulnerability data
US11163731B1 (en) Autobuild log anomaly detection methods and systems
US11062022B1 (en) Container packaging device
US9350747B2 (en) Methods and systems for malware analysis
US11327827B1 (en) Optimizing display of suggested actions in a workbook
US9996562B2 (en) Automated database migration architecture
US20070174693A1 (en) System and method for automated and assisted resolution of it incidents
WO2019100576A1 (fr) Procédé et appareil de gestion de test automatisé, dispositif de terminal et support de stockage
US20170228220A1 (en) Self-healing automated script-testing tool
US20190332376A1 (en) Multi-tenant collaborative learning
US20210334269A1 (en) Automated identification of hardware and software components relevant to incident reports
CN110059007B (zh) 系统漏洞扫描方法、装置、计算机设备及存储介质
JP7601520B2 (ja) 構造化ログイベントを用いたワークフローの支援および自動化
US12229250B2 (en) System and method for automated security tool integration
US20220292054A1 (en) Seamless data movement and metadata management in a hybrid cloud setting using a configurable micro services based architecture
US10599454B2 (en) Database systems and related methods for validation workflows
WO2017167015A1 (fr) Procédé et dispositif destinés à la gestion de sécurité de dispositif serveur et support de mémoire informatique
US9900211B1 (en) Systems and methods for network management
CN110309062A (zh) 用例生成方法、装置、电子设备及存储介质
US9069863B2 (en) Identifying unknown parameter and name value pairs
US20210344701A1 (en) System and method for detection promotion
US10606577B1 (en) System and method for assuring customers during software deployment
US20240037243A1 (en) Artificial intelligence based security requirements identification and testing
CN114329486A (zh) 一种资产漏洞管理方法、装置、电子设备及存储介质

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17773045

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17773045

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载