CN108900527A - A kind of security configuration check system - Google Patents

A kind of security configuration check system Download PDF

Info

Publication number
CN108900527A
CN108900527A CN201810801100.2A CN201810801100A CN108900527A CN 108900527 A CN108900527 A CN 108900527A CN 201810801100 A CN201810801100 A CN 201810801100A CN 108900527 A CN108900527 A CN 108900527A
Authority
CN
China
Prior art keywords
security configuration
assets
function
equipment
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810801100.2A
Other languages
Chinese (zh)
Inventor
孙帅
李明柱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Fangheng Information Technology Co Ltd
Original Assignee
Nanjing Fangheng Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Fangheng Information Technology Co Ltd filed Critical Nanjing Fangheng Information Technology Co Ltd
Priority to CN201810801100.2A priority Critical patent/CN108900527A/en
Publication of CN108900527A publication Critical patent/CN108900527A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of security configuration check systems,Need to export the access mode of target device in long-range checking process,The user name and password of login,As long as checking target and tool being IP reachable,And check the open related service of target and port,It can be carried out remotely checking,For remotely check can by specify concurrent access number come and meanwhile check multiple equipment,It is through for being unable to IP,But certain intermediate equipments can be passed through,For example Bastion Host jumps,It can be by jumping listing function,The assets information and log-on message of the intermediate equipment jumped are set,By jumping rear access target equipment,For needing dynamic password,It then can be by sharing interactive function,Manual entry forms active session to corresponding intermediate equipment or Bastion Host,Access target equipment acquires security configuration progress security configuration baseline verification after system passes through the session connection to intermediate equipment or Bastion Host,Result is verified in finally output configuration.

Description

A kind of security configuration check system
Technical field
The present invention relates to checking system technical field more particularly to a kind of security configuration check systems.
Background technique
On the basis of the baseline security standards system that research and service security combine, with reference to standard both domestic and external, specification, And mature experience forms the Baseline security model for being directed to operation system.In these reference contents, most worth reference It is based on SCAP(Security Content Automation Protocol)FDCC project(Federal Desktop Core Configuration, federal desktop core configuration plan).
The target of FDCC is that deployment incorporates the standard desk of security configuration in 450,000 multiple stage computers of U.S. federal government Face operating system, to reduce the security breaches and illegal configuration in millions of federal computers, while reduce buying and operation at This.This project is carried out inside United States Air Force earliest, and air force creates with the help of NSA, NIST and DISA Then the standard configuration of two kinds of prevalence Windows operating system ensures that all relevant computer providers are being matched in buying It send and security configuration is installed in the time.This behave is successful, configured by using standard security, it was demonstrated that it is adopted Purchaser's formula can improve overall safety state, while significantly reduce buying and safe operation cost.
In May, 2007, NIST proposes information security automation plan(ISAP).The plan is by including country's peace Multiple departments such as the overall situation, Defense Information Systems Agency, national technical standard research institute, Department of Homeland Security initiate.Its target is exactly Loophole, the management of configuration and safety test and accordance can be automated, while matched counterpart peace of dishing out Full content automation protocol(SCAP), it be one by specific, standardized mode make Vulnerability Management, safety detection and The policy compliance system consistent with the requirement of FISMA.It also proposed the code requirement to FDCC simultaneously.These meters It draws, system and requirement embody U.S. government and implement Federal Information safety management method with automation tools(FISMA)Want It asks and steps important paces.
Implement FISMA and require the foothold for having different height, not only to meet the general of FISMA formulation top , will also be after information system classification, in management layer all over the information security requirement of property, technological layer and operation level selection are suitable Safety control measures.Suitable safety control measures have been selected, finally to have been implemented in the configuration of information system.
The FDCC based on SCAP embodies the characteristic of two aspects in brief:
Standardization:On the basis of NVD, NCP, the safety inspection item of a set of goal systems is constructed, these check items are by pacifying The related scopes of examination such as full loophole, security configuration are constituted, and provide frame for the operation of standardized technical security.
Automation:FDCC then on this basis, for the characteristic of desktop host system, constructs safety inspection requirement, and lead to The tool of automation is crossed to execute, provides support for the technical security operation of automation.
It is a time-consuming and laborious thing in terms of really completing complete and effective check item in terms of standardization.Needle To FDCC project, 6 technical standard branch such as CVE, CCE, CPE, SCCDF, OVAL, CVSS have been used by U.S. federal government Column(With reference to:http://nvd.nist.gov/scap.cfm), for U.S. federal desktop core system(With Windows platform Based on)Safety inspection item;And in terms of automation, then be by tool automatically or semi-automatically to goal systems carry out safety The inspection of check item.Also have much projects relevant to SCAP in open source field, wherein it is important have OpenSCAP, OVALDi and eSCAPe etc., these projects form the development and utilization system to the complete set of SCAP, and eSCAPe is used for The generation of SCAPContent, and OpenSCAP, OVALDi are used to execute the scanning based on SCAP, but are the absence of checking system.
Summary of the invention
The object of the invention is that providing a kind of security configuration check system to solve the above-mentioned problems.
The present invention is achieved through the following technical solutions above-mentioned purpose:
A kind of security configuration check system, including
Basic platform includes basic software platform and hardware foundation platform;
System process layer includes data processing and system service;
Kernel service layer includes security configuration verification engine, report form statistics analysis engine, assets scanning engine and network topology point Analyse engine;
External access layer, for showing the system function and third party's calling interface, function shows to include security configuration inspection, money It produces scanning, configuration template library, report management and subscriber management function to show, third party's interface tune based on webservice is provided With.
It is currently preferred, the basic software platform contain for the system provide calculating, storage, correspondence with foreign country it is hard Part equipment;The basic software platform contains the system-specific operating system, file system, hard disk encryption and decryption, program and adds solution Close, network service, database, Web service, etc. program execution environments.
Currently preferred, the data processing is internal system interface, provides system access database, access system text Part, data are synchronous, the bottom datas processing business such as input and output processing, while data processing can realize efficient access database, It is data cached, high concurrent, multiple threads function;System services layer is mainly used for data acquisition interface management, acquisition content is taken out It takes, the scheduling and monitoring of acquisition tasks, the acquisition for providing external system data for upper layer is supported, can be accessed by acquisition interface Target device obtains system information, finger print information and the security configuration information of target device.
Currently preferred, the security configuration verification engine is analyzed by acquiring the security configuration of target device, It was found that the configuration of safety requirements is not met in terms of security configuration, so that the security configuration suggestion of equipment or system is provided, thus The general safety of lifting means is horizontal, the mode of access target mainly include telnet, SSH, NETBIOS, HTTP and HTTPS into Row remote access.
Currently preferred, the statistical analysis processing engine implementation verifies configuration the processing of result, including to configuration Task result various dimensions statistical analysis is verified, task timing variations, multitask is compared, and multitask various dimensions merge, according to inspection Item statistics, while statisticalling analyze processing engine implementation security configuration and verifying statistical forms output.
Currently preferred, the assets scanning engine, asset identification is obtained for assets detection with assets information, including Assets detection, assets fingerprint recognition, assets service identification and asset management functions, the support of assets detecting function pass through automatically scanning Technology finds information technoloy equipment and networked devices in the reachable network of IP, and automatically provides the fingerprint of equipment, and judge equipment is Unite type, by input destination device address segment information, the information such as scanning strategy, obtain assets whether survive, assets fingerprint and The information such as service.
It is currently preferred, the Network topology engine include addressing and Route Selection, establishment of connection, holding and It terminates, network layer device includes router and three-tier switch, and router is used to realize the addressing and routing to network packet The operation such as forwarding, three-tier switch is exactly the interchanger with some routers function, and the most important purpose of three-tier switch is Accelerate the data exchange inside large-scale local area network, its routing function is also that can accomplish a road for this purpose service By repeatedly forwarding.
Currently preferred, the external access layer is for showing the system function and third party's calling interface, function exhibition Show and shown including security configuration inspection, assets scanning, configuration template library, report management, subscriber management function, provides and be based on Third party's interface of webservice calls, and function displayed page is based on B/S framework and is embodied as user's offer Graphic User circle Face may be mounted at Chinese operating system, and all operations are all based on menu mode, while providing detailed help function.
The beneficial effects of the present invention are:
The present invention needs to export the user name and password of the access mode of target device, login in long-range checking process, as long as It checks target and tool is IP reachable, and check the open related service of target and port, so that it may remotely checked, for Long-range check can go directly for being unable to IP by specifying concurrent access number while checking multiple equipment, but can lead to Cross certain intermediate equipments, for example Bastion Host jumps, and the money of the intermediate equipment jumped can be arranged by jumping listing function Information and log-on message are produced, it, then can be by sharing session for needing dynamic password by jumping rear access target equipment Function, manual entry to corresponding intermediate equipment or Bastion Host form active session, and system passes through the session connection to centre Access target equipment acquisition security configuration carries out the verification of security configuration baseline after equipment or Bastion Host, and finally output configuration is verified As a result.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of security configuration check system of the present invention;
Fig. 2 is the flowage structure schematic diagram of security configuration inspection of the present invention;
Fig. 3 is the flowage structure schematic diagram of security configuration verification engine of the present invention;
Fig. 4 is the structural schematic diagram of Network Topology Discovering System of the present invention;
Fig. 5 is the structural schematic diagram of the Topology Discovery of network layer of the present invention;
Fig. 6 is the structural schematic diagram of external access layer of the present invention.
Specific embodiment
The present invention will be further explained below with reference to the attached drawings:
As depicted in figs. 1 and 2:A kind of security configuration check system, including
Basic platform includes basic software platform and hardware foundation platform;
System process layer includes data processing and system service;
Kernel service layer includes security configuration verification engine, report form statistics analysis engine, assets scanning engine and network topology point Analyse engine;
External access layer, for showing the system function and third party's calling interface, function shows to include security configuration inspection, money It produces scanning, configuration template library, report management and subscriber management function to show, third party's interface tune based on webservice is provided With.
As shown in Figure 1, system process layer includes data processing and system service.
Data processing is internal system interface, provides system access database, accesses system file, data are synchronous, input The bottom datas processing business such as output processing.Data processing simultaneously can realize efficient access database, data cached, high concurrent, The functions such as multiple threads.
The scheduling and monitoring that system services layer is mainly used for data acquisition interface management, acquires content extraction, acquisition tasks, The acquisition for providing external system data for upper layer is supported, can obtain target device by acquisition interface access target equipment System information, finger print information and security configuration information.
As shown in Figure 1, kernel service layer mainly includes that security configuration verification engine, report form statistics analysis engine, assets are swept Retouch engine, Network topology engine.
As shown in figure 3, security configuration verification engine is analyzed by acquiring the security configuration of target device, discovery is being pacified Full configuration aspect does not meet the configuration of safety requirements, so that the security configuration suggestion of equipment or system is provided, thus lifting means General safety it is horizontal, the mode of access target mainly includes as follows:
1) it is remotely accessed by telnet, SSH, NETBIOS, HTTP and HTTPS etc.
2) local inspection can directly be carried out for the operating system of Windows system
Need to export the access mode of target device, the user name and password of login in long-range checking process, as long as checking mesh Mark is IP reachable with tool, and checks the open related service of target and port, so that it may remotely be checked.For remotely examining Look into can by specify concurrent access number come and meanwhile check multiple equipment.
It is through for being unable to IP, but can be by certain intermediate equipments, for example Bastion Host jumps, and can pass through jump Turn listing function, the assets information and log-on message of the intermediate equipment jumped are set, by jumping rear access target equipment.For Need dynamic password, then it can be by sharing interactive function, manual entry is formed to corresponding intermediate equipment or Bastion Host Active session, access target equipment acquires security configuration progress after system passes through the session connection to intermediate equipment or Bastion Host Security configuration baseline is verified, and result is verified in finally output configuration.
Finally according to security configuration inspection as a result, risk score can be carried out, the result of security configuration can be according to pre- The security configuration requirement first defined, whether judging that the inspection item of relevant configuration in target device or system is up to standard, check item Purpose determines that result includes six states:Meet, do not meet, is to be confirmed, is not applicable, acquisition failure, being not carried out.
Grade distinction is carried out to all inspection items, and is assigned to different weighted values.Grade distinction be segmented into it is optional, Generally, important three grades.Based on the weight of each configuration item, beaten according to up to standard situation of the hundred-mark system to destination host Point, export the risk score result of quantitative target device.
The security configuration for supporting intranet network and industrial control equipment configuration to verify mainstream networked devices verifies function.
The security configuration of industrial control equipment, which is verified, to be supported, the factories such as Siemens, Schneider, Rockwell, Yokogawa and SUPCON The equipment, including engineer station, operator station, HMI, PLC, DCS, PCS, SCADA, opc server, industrial switch etc. of family, Such as:
· SIMATIC S7 200
· SIMATIC S7 300
· SIMATIC S7 400
· SIMATIC S7 1200
1500 series of SIMATIC S7 etc.;
· Scalance W series
· Scalance X series
· PCS
· Step7
· TIA Portal
WinCC etc.;
Support security configuration acquisition and the core of the operating system, application software and the network equipment of the information system more than 20 kinds of mainstreams Function is looked into, such as:
· Windows2000/2003Server/2008Server/2012Server/XP/Vista/Win7/Win8/Win10
· Solaris 8/9/10
· AIX 5.x
· HP-UNIX 11i
Red Hat/Fedora/Centos/Kali/Ubuntu/SUSE etc.
· Oracle 8i/9i/10g/11g
· Microsoft SQL SERVER2000/2005/2008
· DB2
· Informix
· Sybase
· Cisco IOS
· Juniper JunOS。
As shown in Figure 1, statistical analysis processing engine implementation verifies configuration the processing of result, including to configuration verification task As a result various dimensions statistically analyze, and task timing variations, multitask is compared, and multitask various dimensions merge(According to place province, city, portion Door, operation system etc.), counted according to check item(The more check items of single device, more tables of equipment check items, the more check items of more equipment).
Processing engine implementation security configuration is statisticallyd analyze simultaneously verifies statistical forms output.
The evaluation of system compliance classification grade:Inspection result is advised according to closing, advises check item type based on closing(Such as:Log is examined Meter, system file, account management, purview certification etc.), determine that closing rule integrated level evaluates compliance, and classification scoring.
Whole scoring:Grade distinction is carried out to all inspection items, and is assigned to different weighted values.Grade distinction can be with It is divided into optional, general, important three grades.Based on the weight of each configuration item, according to hundred-mark system to the feelings up to standard of destination host Condition is given a mark, and the risk score result of quantitative target device is exported.
As shown in Figure 1, assets scanning engine, asset identification is obtained for assets detection with assets information, including assets are visited Survey, assets fingerprint recognition, assets service identification and asset management functions.
Assets detecting function supports to find that information technoloy equipment and networking in the reachable network of IP are set by automatically scanning technology It is standby, and the fingerprint of equipment is automatically provided, judge the system type of equipment.By inputting destination device address segment information (IP Deng), the information such as scanning strategy, obtain assets whether survive, the information such as assets fingerprint and service.The target of assets detection includes letter Operating system, database and the network equipment in breath system, the system for amounting to identification are more than 20 kinds.
Engineer station, operator station, HMI, PLC, DCS, PCS, SCADA, opc server, industry in networked devices hand over It changes planes, the factories such as equipment, including Siemens, Schneider, Rockwell, Yokogawa and SUPCON of industry control producer including mainstream The equipment of family.
The scanning strategy that assets detection can be configured carries out finger print information acquisition to desired asset, including:
Concurrent scan interval;
Concurrent scan number;
Scan time-out time;
Assets fingerprint identification function mainly identifies corresponding assets, main identification pair according to the finger print information of the assets of extraction Behaviour as including the IT of mainstream producer and the fingerprint characteristic of networked devices or system, in including but not limited to above-mentioned information system Make system, database, the network equipment;Engineer station, operator station, HMI, PLC, DCS, PCS, SCADA in networked devices, Opc server, industrial switch etc.;
The output of assets fingerprint recognition includes the information such as company-information, product type and the corresponding system version number of assets.
Assets service identification function and mainly detect and service identification by the port for target device come to target device The network service of unlatching and port are identified.
It supports low speed and non-attacking safety detection, the end of target device is scanned in the case where not influencing target device Mouthful, the data packet of transmission is normal TCP/UDP connection packet, and any exception will not be caused to target device;
Asset management functions mainly automatically identify the information of the target device scanned, normalized and are saved, together When also manual asset management, including assets is supported to add, modify, delete, inquire manually.
As shown in Figure 4 and Figure 5, Network topology engine aims at the topological analysis to target network, shows network Routing node and network path.Topology Discovery includes the Topology Discovery of link layer and the Topology Discovery of network layer, and link layer is opened up It flutters and finds to concentrate on the Topology Discovery to link layer device such as interchanger and host etc..The Topology Discovery of network layer can be found that net The integrated connection situation of network, the equipment such as main router found in network
Network layer is ISO(International Standard Organization)The third of defined OSI master pattern Layer, between transport layer and data link layer.The purpose of network layer is the data transparent transmission realized between two end systems, Concrete function includes addressing and Route Selection, establishment of connection, holding and termination etc..Network layer device includes router and three layers Interchanger, router are used to realize the operations such as addressing and the routing forwarding to network packet, and three-tier switch is exactly with portion Divide the interchanger of router feature.The most important purpose of three-tier switch is to speed up the data exchange inside large-scale local area network, it Routing function be also that can accomplish once to route for this purpose service, repeatedly forward.
Network layer topology discovery refers to the discovery to the connection relationship between network layer network element.The topology of network layer It was found that including the connection between discovery router and the connection between router and subnet.The topology discovery method of network layer has Many kinds, there are four types of common network layer topology discovery algorithms:Network layer topology based on ICMP agreement finds algorithm, is based on The network layer topology of DNS agreement finds algorithm, based on OSPF agreement, wherein with the Topology Discovery based on ICMP agreement Application range is most wide, to find efficiency of algorithm highest based on the network layer topology of SNMP agreement.
ICMP is Internet Control Message Protocol, it is a sub-protocol of TCP/IP protocol suite, for IP host, Control message is transmitted between router.The most common function used in ICMP agreement is using ICMP agreement report in network design The echo request of text(Echo Request)And return response(Echo Reply)Message.It can be used to test purpose station It is no reachable and whether respond.User sends icmp packet with Ping order to determine whether destination address is reachable.
ICMP realizes that Topology Discovery is realized based on Ping and Traceroute tool, and Ping program is used to detect mesh Host it is whether reachable, inaccessible detection host can be excluded in this way, improve detection efficient save detection time. Traceroute program, which is used to detect, reaches the router that destination host is passed through.
This method has relatively good versatility, can find network topology in certain degree.The disadvantage is that due to It needs to inject a large amount of ICMP data packet into network, increases network load.On the other hand the time of search is long.Simultaneously Based on the considerations of current network security, some network administrators can close router to ICMP forwarding capability, cause topology probe Failure.
As shown in fig. 6, externally access layer is for showing the system function and third party's calling interface.Function shows to include peace Full configuration inspection, assets scanning, configuration template library, report management, subscriber management function displaying etc..It provides and is based on webservice Third party's interface call.
Function displayed page is based on B/S framework and is embodied as user's offer graphic user interface, may be mounted at Chinese behaviour Make system, all operations are all based on menu mode, while providing detailed help function.
In conclusion the present invention needs to export the user of the access mode of target device, login in long-range checking process Name and password as long as inspection target and tool are IP reachable, and check the open related service of target and port, so that it may carry out It is long-range to check, for remotely check can by specify concurrent access number come and meanwhile check multiple equipment, it is straight for being unable to IP It reaches, but can be by certain intermediate equipments, for example Bastion Host jumps, and it can be by jumping listing function, setting jumps Intermediate equipment assets information and log-on message, then may be used by jumping rear access target equipment for needing dynamic password With by sharing interactive function, manual entry to corresponding intermediate equipment or Bastion Host form active session, and system is by being somebody's turn to do Access target equipment acquisition security configuration carries out the verification of security configuration baseline after session connection to intermediate equipment or Bastion Host, most Result is verified in output configuration afterwards.
For industrial equipment module, industrial software, and the related different characteristics of IT infrastructure and the peace of industrial environment Full management requires, and creates detailed operable security baseline, can be used as product access, network access testing, the acceptance of work, system O&M configuration, self-assessment, security hardening, safety patrol inspection authoritative guide, so that whole promote industrial control system safety Property.
Those skilled in the art do not depart from essence and spirit of the invention, can there are many deformation scheme realize the present invention, The foregoing is merely preferably feasible embodiments of the invention, and not thereby limiting the scope of the invention, all with this The variation of equivalent structure made by description of the invention and accompanying drawing content, is intended to be included within the scope of the present invention.

Claims (8)

1. a kind of security configuration check system, which is characterized in that including
Basic platform includes basic software platform and hardware foundation platform;
System process layer includes data processing and system service;
Kernel service layer includes security configuration verification engine, report form statistics analysis engine, assets scanning engine and network topology point Analyse engine;
External access layer, for showing the system function and third party's calling interface, function shows to include security configuration inspection, money It produces scanning, configuration template library, report management and subscriber management function to show, third party's interface tune based on webservice is provided With.
2. security configuration check system according to claim 1, which is characterized in that the basic software platform contain for The system provides calculating, stores, the hardware device of correspondence with foreign country;The basic software platform contains system-specific operation System, file system, hard disk encryption and decryption, program encryption and decryption, network service, database, Web service program execution environments.
3. security configuration check system according to claim 1, which is characterized in that the data processing connects for internal system Mouthful, system access database is provided, accesses system file, data are synchronous, input and output Treated Base data processing business, simultaneously Data processing can realize efficient access database, data cached, high concurrent, multiple threads function;System services layer is mainly used In data acquisition interface management, the scheduling and monitoring of acquisition content extraction, acquisition tasks, external system data are provided for upper layer Acquisition is supported, system information, finger print information and the safety of target device can be obtained by acquisition interface access target equipment Configuration information.
4. security configuration check system according to claim 1, which is characterized in that the security configuration verification engine passes through The security configuration of acquisition target device is analyzed, and discovery does not meet the configuration of safety requirements in terms of security configuration, to give The security configuration suggestion of equipment or system out, so that the general safety of lifting means is horizontal, the mode of access target mainly includes Telnet, SSH, NETBIOS, HTTP and HTTPS are remotely accessed.
5. security configuration check system according to claim 1, which is characterized in that the statistical analysis handles engine implementation The processing of result is verified configuration, including task result various dimensions statistical analysis, task timing variations, multitask are verified to configuration Compare, multitask various dimensions merge, and count according to check item, while statisticalling analyze processing engine implementation security configuration and verifying statistics Analytical statement output.
6. security configuration check system according to claim 1, which is characterized in that the assets scanning engine, assets are known Not Yong Yu assets detection with assets information obtain, including assets detection, assets fingerprint recognition, assets service identify and asset management Function, the support of assets detecting function find information technoloy equipment and networked devices in the reachable network of IP by automatically scanning technology, and And the fingerprint of equipment is automatically provided, the system type of equipment is judged, by inputting destination device address segment information, scanning strategy letter Breath, obtain assets whether survive, assets fingerprint and information on services.
7. security configuration check system according to claim 1, which is characterized in that the Network topology engine includes Addressing and Route Selection, establishment of connection, holding and termination, network layer device includes router and three-tier switch, router For realizing the addressing and routing forwarding operation to network packet, three-tier switch is exactly the friendship with some routers function It changes planes, the most important purpose of three-tier switch is to speed up the data exchange inside large-scale local area network, its routing function is also to be This purpose service, it can accomplish once to route, repeatedly forward.
8. security configuration check system according to claim 1, which is characterized in that the external access layer is for showing this System function and third party's calling interface, function show to include security configuration inspection, assets scanning, configuration template library, report pipe Reason, subscriber management function are shown, are provided third party's interface based on webservice and are called, function displayed page is based on B/S frame Structure is embodied as user and provides graphic user interface, may be mounted at Chinese operating system, all operations are all based on menu Mode, while detailed help function being provided.
CN201810801100.2A 2018-07-20 2018-07-20 A kind of security configuration check system Pending CN108900527A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810801100.2A CN108900527A (en) 2018-07-20 2018-07-20 A kind of security configuration check system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810801100.2A CN108900527A (en) 2018-07-20 2018-07-20 A kind of security configuration check system

Publications (1)

Publication Number Publication Date
CN108900527A true CN108900527A (en) 2018-11-27

Family

ID=64351432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810801100.2A Pending CN108900527A (en) 2018-07-20 2018-07-20 A kind of security configuration check system

Country Status (1)

Country Link
CN (1) CN108900527A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493254A (en) * 2019-09-03 2019-11-22 国家计算机网络与信息安全管理中心 Industrial Yunan County's overall evaluating method and device
CN110633571A (en) * 2019-09-30 2019-12-31 广州竞远安全技术股份有限公司 Efficient online checking method and device for information system security configuration
CN111078481A (en) * 2019-12-19 2020-04-28 哈尔滨安天科技集团股份有限公司 Method and device for acquiring configuration check list, electronic equipment and storage medium
CN111562938A (en) * 2020-04-20 2020-08-21 杭州迪普科技股份有限公司 Method and device for checking configuration information of PLC and computer equipment
CN113010901A (en) * 2021-04-25 2021-06-22 深圳市位元领航科技有限公司 Automatic safety inspection method and terminal based on asset model
CN113518054A (en) * 2020-04-09 2021-10-19 中国铁道科学研究院集团有限公司电子计算技术研究所 Safety configuration acquisition method for railway industry information system
WO2022033699A1 (en) * 2020-08-14 2022-02-17 Telefonaktiebolaget Lm Ericsson (Publ) Generation of a security configuration profile for a network entity
CN114079647A (en) * 2020-08-11 2022-02-22 中国移动通信集团安徽有限公司 Method, device and system for IP address filing verification and computing equipment
CN115086063A (en) * 2022-07-05 2022-09-20 中国联合网络通信集团有限公司 Baseline verification and/or repair method, system, object, device and system
CN116233122A (en) * 2023-05-06 2023-06-06 上海观安信息技术股份有限公司 Heterogeneous server login method, device, equipment and medium
CN111562938B (en) * 2020-04-20 2024-05-24 杭州迪普科技股份有限公司 Method and device for checking configuration information of PLC and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130174263A1 (en) * 2010-07-01 2013-07-04 Mariano Nunez Di Croce Automated security assessment of business-critical systems and applications
CN103390133A (en) * 2012-05-07 2013-11-13 恒安嘉新(北京)科技有限公司 Automatic Windows system security configuration check method
CN105227383A (en) * 2015-11-06 2016-01-06 广东电网有限责任公司电力科学研究院 A kind of device of network topology investigation
CN108183895A (en) * 2017-12-26 2018-06-19 广东电网有限责任公司信息中心 A kind of networked asset information acquisition system
CN108600260A (en) * 2018-05-09 2018-09-28 国家计算机网络与信息安全管理中心 A kind of industry Internet of Things security configuration check method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130174263A1 (en) * 2010-07-01 2013-07-04 Mariano Nunez Di Croce Automated security assessment of business-critical systems and applications
CN103390133A (en) * 2012-05-07 2013-11-13 恒安嘉新(北京)科技有限公司 Automatic Windows system security configuration check method
CN105227383A (en) * 2015-11-06 2016-01-06 广东电网有限责任公司电力科学研究院 A kind of device of network topology investigation
CN108183895A (en) * 2017-12-26 2018-06-19 广东电网有限责任公司信息中心 A kind of networked asset information acquisition system
CN108600260A (en) * 2018-05-09 2018-09-28 国家计算机网络与信息安全管理中心 A kind of industry Internet of Things security configuration check method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王万宁: ""安全基线管理系统的研究与实现"" *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493254A (en) * 2019-09-03 2019-11-22 国家计算机网络与信息安全管理中心 Industrial Yunan County's overall evaluating method and device
CN110633571A (en) * 2019-09-30 2019-12-31 广州竞远安全技术股份有限公司 Efficient online checking method and device for information system security configuration
CN111078481A (en) * 2019-12-19 2020-04-28 哈尔滨安天科技集团股份有限公司 Method and device for acquiring configuration check list, electronic equipment and storage medium
CN111078481B (en) * 2019-12-19 2023-12-26 安天科技集团股份有限公司 Method, device, electronic equipment and storage medium for acquiring configuration checklist
CN113518054A (en) * 2020-04-09 2021-10-19 中国铁道科学研究院集团有限公司电子计算技术研究所 Safety configuration acquisition method for railway industry information system
CN111562938A (en) * 2020-04-20 2020-08-21 杭州迪普科技股份有限公司 Method and device for checking configuration information of PLC and computer equipment
CN111562938B (en) * 2020-04-20 2024-05-24 杭州迪普科技股份有限公司 Method and device for checking configuration information of PLC and computer equipment
CN114079647B (en) * 2020-08-11 2023-07-21 中国移动通信集团安徽有限公司 Method, device, system and computing equipment for checking IP address record
CN114079647A (en) * 2020-08-11 2022-02-22 中国移动通信集团安徽有限公司 Method, device and system for IP address filing verification and computing equipment
WO2022033699A1 (en) * 2020-08-14 2022-02-17 Telefonaktiebolaget Lm Ericsson (Publ) Generation of a security configuration profile for a network entity
CN113010901B (en) * 2021-04-25 2024-03-01 深圳市位元领航科技有限公司 Automatic security inspection method and terminal based on asset model
CN113010901A (en) * 2021-04-25 2021-06-22 深圳市位元领航科技有限公司 Automatic safety inspection method and terminal based on asset model
CN115086063A (en) * 2022-07-05 2022-09-20 中国联合网络通信集团有限公司 Baseline verification and/or repair method, system, object, device and system
CN116233122B (en) * 2023-05-06 2023-07-04 上海观安信息技术股份有限公司 Heterogeneous server login method, device, equipment and medium
CN116233122A (en) * 2023-05-06 2023-06-06 上海观安信息技术股份有限公司 Heterogeneous server login method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN108900527A (en) A kind of security configuration check system
US20210326451A1 (en) Automated security assessment of business-critical systems and applications
CN108183895B (en) Network asset information acquisition system
US10313382B2 (en) System and method for visualizing and analyzing cyber-attacks using a graph model
CN108737425A (en) Fragility based on multi engine vulnerability scanning association analysis manages system
CN106411578B (en) A kind of web publishing system and method being adapted to power industry
US9094434B2 (en) System and method for automated policy audit and remediation management
US7805510B2 (en) Hierarchy for characterizing interactions with an application
CN108600260A (en) A kind of industry Internet of Things security configuration check method
US7627891B2 (en) Network audit and policy assurance system
US8656006B2 (en) Integrating traffic monitoring data and application runtime data
JP2021528749A (en) Automatic packetless network reachability analysis
US20100305990A1 (en) Device classification system
CN109639705A (en) Cloud platform safety detection method
WO2022093007A1 (en) An improved computer implemented system and method for cybersecurity management platform of a monitored network
Adamović Penetration testing and vulnerability assessment: introduction, phases, tools and methods
Lupia et al. ICS Honeypot Interactions: A Latitudinal Study
Putra et al. Infrastructure as code for security automation and network infrastructure monitoring
Antunes et al. A monitoring and testing framework for critical off-the-shelf applications and services
KR102314557B1 (en) System for managing security control and method thereof
CN108768916A (en) A kind of method and device obtaining security configuration information
Betancourt et al. Linking intrusion detection system information and system model to redesign security architecture
Zhang et al. Toward comprehensive network verification: Practices, challenges and beyond
CN112347485B (en) Processing method for acquiring loopholes and automatically penetrating multiple engines
Ziro et al. Improved Method for Penetration Testing of Web Applications.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information
CB02 Change of applicant information

Address after: No. 1 road 210000 Jiangsu Dongji city of Nanjing province Jiangning economic and Technological Development Zone

Applicant after: XINLIAN TECHNOLOGY (NANJING) Co.,Ltd.

Address before: No. 1 road 210000 Jiangsu Dongji city of Nanjing province Jiangning economic and Technological Development Zone

Applicant before: NANJING FANGHENG INFORMATION TECHNOLOGY Co.,Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181127