CN107229977A - A kind of automatic reinforcement means of Host Security baseline and system - Google Patents

A kind of automatic reinforcement means of Host Security baseline and system Download PDF

Info

Publication number
CN107229977A
CN107229977A CN201610180521.9A CN201610180521A CN107229977A CN 107229977 A CN107229977 A CN 107229977A CN 201610180521 A CN201610180521 A CN 201610180521A CN 107229977 A CN107229977 A CN 107229977A
Authority
CN
China
Prior art keywords
reinforcement
item
baseline
security
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610180521.9A
Other languages
Chinese (zh)
Inventor
岑春祥
王升元
苏文平
郄威
孟利青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Inner Mongolia Co Ltd
Original Assignee
China Mobile Group Inner Mongolia Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Inner Mongolia Co Ltd filed Critical China Mobile Group Inner Mongolia Co Ltd
Priority to CN201610180521.9A priority Critical patent/CN107229977A/en
Publication of CN107229977A publication Critical patent/CN107229977A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of automatic reinforcement means of Host Security baseline, including:Host Security baseline is set;Item is reinforced in selection, and sets selected item of reinforcing to distinguish corresponding security hardening function;Call the corresponding security hardening function pair of the reinforcing item to reinforce item to be reinforced, and obtain the currency for reinforcing item;Result is reinforced in the relation generation of baseline criteria value according to the currency of the reinforcing item with being included in the security hardening function.Meanwhile, the invention also discloses a kind of automatic hardened system of Host Security baseline.

Description

Automatic reinforcing method and system for host security baseline
Technical Field
The invention relates to a computer security technology, in particular to a method and a system for automatically reinforcing a security baseline of a host.
Background
At present, the security of the host computer has gained more and more attention and attention of enterprises, and many enterprises, especially telecom operation enterprises, regularly make and issue new host computer security reinforcement specifications, and regularly scan and reinforce the host computer used by the service support system, so as to ensure that the service system operates in a safe and stable environment. The security baseline check and reinforcement are the main contents of the host security check and reinforcement. The security baseline is a basic security requirement in terms of equipment and configuration, and is the minimum security guarantee and the most basic security requirement that must be met for an information system. Therefore, in order to ensure the overall safety level and prevent the system equipment from bringing safety risks due to the fact that the safety configuration is not in place, it is necessary to check and reinforce the safety of the system equipment. If the system is checked and reinforced according to the safety baseline, the safety conformance of the system and the equipment can be ensured to meet the requirements, and most potential safety hazards are avoided.
In the prior art, a professional safety baseline inspection tool can be used for carrying out automatic baseline inspection on each requirement item of the baseline, but the automatic reinforcement of the safety baseline of the host cannot be realized. Due to the limitations in safety, capital, technology and the like, the safety baseline inspection and reinforcement of the host in the actual working environment are basically completed through manual operation. However, when the number of the hosts to be reinforced and the baseline inspection items related to each host are large, and the baselines of the hosts need to be periodically inspected, the manual operation is not only required to consume more human resources, but also the efficiency is low; manual misoperation is also easy to cause manual misoperation, so that the normal operation of the system is influenced; furthermore, the security baseline inspection and reinforcement of the host requires a great professional skill and problem solving ability of the maintenance personnel, however, different maintenance personnel generally understand the inspection and reinforcement method differently, namely: a unified baseline check and reinforcement flow is lacking.
Disclosure of Invention
In view of this, embodiments of the present invention are expected to provide a method and a system for automatically reinforcing a security baseline of a host, which can automatically check and reinforce the security baseline of the host.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides a method for automatically reinforcing a safety baseline of a host, which comprises the following steps:
setting a host safety baseline;
selecting reinforcement items, and setting safety reinforcement functions corresponding to the selected reinforcement items respectively;
calling a safety reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item and acquiring the current value of the reinforcement item;
and generating a reinforcement result according to the relation between the current value of the reinforcement item and the baseline standard value contained in the safety reinforcement function.
In the above scheme, the method further comprises:
the host operating system security baseline configuration file and/or the host operating system are backed up prior to setting the host security baseline.
In the above-mentioned scheme, the first step of the method,
the security hardening function further includes: keywords of the reinforcement item;
the step of calling the security reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item includes: and searching a security reinforcement function with the same keyword according to the keyword contained in the reinforcement item, and calling the security reinforcement function to reinforce the reinforcement item.
In the foregoing solution, the generating a reinforcement result according to a relationship between the current value of the reinforcement item and the baseline standard value included in the security reinforcement function includes:
when the current value of the reinforcement item is the same as the baseline standard value contained in the safety reinforcement function, the current value of the reinforcement item is reserved;
and when the current value of the reinforcement item is different from the baseline standard value contained in the safety reinforcement function, restoring the current value of the reinforcement item to the baseline standard value.
In the above scheme, the method further comprises:
when the time for reinforcing one reinforcing item is greater than a preset threshold value, stopping reinforcing the reinforcing item and sending an alarm;
verifying whether the reinforcement result is effective or not, and finishing reinforcement if the reinforcement result is effective; and if the reinforcement result is not effective, sending an alarm prompt.
The invention also provides an automatic reinforcing system for the host safety baseline, which comprises: the device comprises a baseline management module, a baseline inspection module and a baseline reinforcement module; wherein,
the base line management module is used for setting a host security base line; selecting reinforcement items, and setting safety reinforcement functions corresponding to the selected reinforcement items respectively;
the baseline checking module is used for calling a safety reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item and acquiring the current value of the reinforcement item;
and the baseline reinforcement module is used for generating a reinforcement result according to the relation between the current value of the reinforcement item and the baseline standard value contained in the safety reinforcement function.
In the above solution, the system further includes: and the backup module is used for backing up the configuration file of the security baseline of the host operating system and/or the host operating system before the security baseline of the host is set.
In the above solution, the security reinforcing function set by the baseline management module further includes: keywords of the reinforcement item;
the baseline inspection module calls a security reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item, and the method comprises the following steps: and searching a security reinforcement function with the same keyword according to the keyword contained in the reinforcement item, and calling the security reinforcement function to reinforce the reinforcement item.
In the foregoing solution, the baseline reinforcement module is specifically configured to:
when the current value of the reinforcement item is the same as the baseline standard value contained in the safety reinforcement function, the current value of the reinforcement item is reserved;
and when the current value of the reinforcement item is different from the baseline standard value contained in the safety reinforcement function, restoring the current value of the reinforcement item to the baseline standard value.
In the above solution, the system further includes: the device comprises an alarm module and a verification module; wherein,
the alarm module is used for stopping reinforcing one reinforcing item and sending an alarm when the reinforcing time of the reinforcing item is greater than a preset threshold; receiving an alarm prompt sent by a verification module and sending an alarm;
the verification module is used for verifying whether the reinforcement result is effective or not, and if the reinforcement result is effective, the reinforcement is finished; and if the reinforcement result is not valid, sending an alarm prompt to an alarm module.
The method and the system for automatically reinforcing the host safety baseline provided by the embodiment of the invention have the advantages that the host safety baseline is set; selecting reinforcement items, and setting safety reinforcement functions corresponding to the selected reinforcement items respectively; calling a safety reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item and acquiring the current value of the reinforcement item; and generating a reinforcement result according to the relation between the current value of the reinforcement item and the baseline standard value contained in the safety reinforcement function, and verifying the reinforcement result. Therefore, the embodiment of the invention can realize the automatic reinforcement of the reinforcement item by calling the safety reinforcement function of the selected reinforcement item through presetting the safety baseline of the host, selecting the reinforcement item and setting the safety reinforcement function; therefore, when the number of the hosts to be reinforced and the baseline inspection items related to each host are large, and the baselines of the hosts need to be periodically subjected to security inspection, not only is more human resources not required to be consumed, but also the working efficiency can be greatly improved; meanwhile, the manual misoperation caused by manual operation can be effectively avoided, so that the influence on the normal operation of a service system is reduced; in addition, a unified safety inspection and reinforcement flow is formulated according to the inspection requirements, so that the resource waste phenomenon caused by the lack of the unified baseline inspection and reinforcement flow of maintenance personnel can be effectively avoided, and the updating and the expansion are easy.
Drawings
FIG. 1 is a schematic diagram illustrating an implementation process of a method for automatically reinforcing a security baseline of a host according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a component of an automatic reinforcing system for a security baseline of a host according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Example one
As shown in fig. 1, the method for automatically reinforcing the security baseline of the host according to the embodiment of the present invention includes:
step 101: setting a host safety baseline;
here, the host security baseline may be set according to a host security check standard preset by a user, or may be set according to actual operating conditions of the host under different environments.
Further, before step 101, the method further comprises: backing up a security baseline configuration file of a host operating system and/or the host operating system;
the purpose of backing up the security baseline configuration file of the host operating system and/or the host operating system is to prevent the host from being restored to the state before the reinforcement by using the backed-up configuration file and/or the system when the system cannot normally run and the like possibly occur due to unexpected events, such as configuration information misoperation, in the process of reinforcing the host.
In the embodiment of the present invention, the backup of the security baseline configuration file of the operating system of the host may be implemented in the following manner: judging whether the configuration file exists through an if (-f/etc/inetd.conf) statement, copying the current configuration file to a/bak directory for backup by using a cp command after the configuration file is searched, and printing and outputting 'file | backup success' after the backup is successful.
Step 102: selecting reinforcement items, and setting safety reinforcement functions corresponding to the selected reinforcement items respectively;
here, the user can establish a basic reinforcement item library in advance according to the host security check standard, and establish a user reinforcement item library according to the actual operation condition of the host under different environments; further, the base reinforcement item library and the user reinforcement item library may be updated according to actual needs, for example, deleting unnecessary reinforcement items, modifying existing reinforcement items, or adding new reinforcement items.
Here, the selecting a reinforcement item may be selecting one or more reinforcement items from the base reinforcement item library individually, selecting one or more reinforcement items from the user reinforcement item library individually, or selecting one or more reinforcement items from the two reinforcement item libraries individually. Of course, the selected reinforcement item may also be a reinforcement item set by the user directly according to the host security check standard and/or the actual operation condition of the host.
Here, the security reinforcement function includes a baseline standard value of a reinforcement item and a keyword of the reinforcement item; the baseline standard value is used for judging whether the reinforcement item is normal or not, namely, whether the current value of the reinforcement item is consistent with the baseline standard value or not is compared, if so, the reinforcement item is normal, otherwise, the reinforcement item is abnormal; the keywords are mainly used as search identifiers, namely when the security reinforcement functions corresponding to the reinforcement items need to be searched, the security reinforcement functions matched with the reinforcement items can be obtained through keyword search in the reinforcement items.
Further, before step 102, the method further comprises: respectively identifying the type of a host operating system, the version number of the operating system and the identity of an executing user;
specifically, different security hardening functions may need to be set for the same hardening item due to differences between different operating systems; different security hardening functions may also need to be set for the same hardening item due to differences between different operating system versions. Moreover, checking and reinforcing the host will involve the highest authority of host operations, such as account locking check, password modification policy check, etc., which present a high operational security risk. Therefore, in order to ensure the security of the host, the checking and the reinforcing of the host can be performed only by the root user which is the default of the host, so that whether the executing user is the root user needs to be identified, and if the executing user is not the root user, the checking and the reinforcing operation cannot be performed.
Step 103: calling a safety reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item and acquiring the current value of the reinforcement item;
specifically, according to keywords contained in the reinforcement item, a security reinforcement function with the same keywords is searched, the security reinforcement function is called to check and reinforce the reinforcement item, and a check result of the reinforcement item is obtained and recorded, wherein the check result of the reinforcement item contains a current value of the reinforcement item.
In practical applications, the obtained inspection result of the reinforcement item may further include redundant information, such as blank spaces, comments, and the like, and therefore, the obtained inspection result of the reinforcement item may be preprocessed, and then the current value of the reinforcement item is extracted from the preprocessed inspection result of the reinforcement item.
Step 104: generating a reinforcement result according to the relation between the current value of the reinforcement item and a baseline standard value contained in the safety reinforcement function;
specifically, according to a current value of a reinforcement item extracted from an inspection result of the reinforcement item and a baseline standard value of the reinforcement item extracted from a safety reinforcement function corresponding to the reinforcement item, comparing the current value of the reinforcement item with the baseline standard value; when the current value of the reinforcement item is the same as the baseline standard value contained in the safety reinforcement function, the reinforcement item is normal, the current value of the reinforcement item is reserved, and a reinforcement result is generated; and when the current value of the reinforcement item is different from the baseline standard value contained in the safety reinforcement function, the reinforcement item is abnormal, the current value of the reinforcement item needs to be repaired to be the baseline standard value, and a reinforcement result is generated.
Here, the reinforcement result includes a process of reinforcing the reinforcement item, a value of the reinforcement item before reinforcement, and a value of the reinforcement item after reinforcement.
Further, the method further comprises: when each reinforcement item is reinforced, recording the reinforcement time of each reinforcement item; and when the time for reinforcing one reinforcing item is greater than a preset threshold value, stopping reinforcing the reinforcing item and sending an alarm.
Further, the method further comprises: verifying whether the reinforcement result is effective or not, and finishing reinforcement if the reinforcement result is effective; and if the reinforcement result is not effective, sending an alarm prompt.
Specifically, whether the reinforcement of the reinforcement item is normally completed is verified according to the reinforcement result, if the value of the reinforcement item after reinforcement is completely consistent with the baseline standard value contained in the safety reinforcement function corresponding to the reinforcement item, it is indicated that the reinforcement is normally completed, otherwise, it is indicated that the reinforcement is abnormal.
For example, the value of a reinforcement item before reinforcement is 1, and the baseline standard value included in the security reinforcement function corresponding to the reinforcement item is 2, after reinforcement is performed, if the value of the reinforcement item after reinforcement included in the reinforcement result is still 1, it indicates that there is an abnormality in reinforcement of the reinforcement item; if the value of the reinforcement item included in the reinforcement result after reinforcement is 2, it indicates that the reinforcement of the reinforcement item has been completed normally.
In the embodiment of the invention, the reinforcement result can be recorded through a log and can be output to a host screen for displaying. For example, the FIFO pipeline function of the shell can be used to record and print out the log. The FIFO type file has the characteristic of a pipeline, and the FIFO file is used for transmitting data in the process, so that the interprocess communication is more durable and stable. When the data is read out, the data in the FIFO pipeline is cleared simultaneously. The key technologies and codes of recording and printing out the log by using the FIFO pipeline function are as follows:
log _ file ═/$ (date +% Y% M% d)/$ (date +% Y% M% d% H% M% S) — log — define the log file name;
fifofile ═/$ (date +% Y% M% d)/$ (date +% Y% M% d% H% M% S) · fifo — define the pipe file name;
touch $ log _ file- -create a log file;
mkfifo $ fifo file — create fifo pipe file;
cat $ FIFO file | tee $ log _ file & exec 1> $ FIFO file 2> &1 — so that executing the log outputs and prints the log on the screen through the FIFO pipe file while writing the output log content into the log file.
The method of the present application is described in detail below with reference to specific examples.
The method comprises the steps of assuming that the host security check comprises seven fields of password policy, security policy, log audit, system service, security patch, access control, account security and the like, and setting host security baseline check standards, namely setting host security baselines, for the check fields respectively. The selected reinforcement item is FTP anonymous login in the field of password policy, a baseline standard value contained in a security reinforcement function corresponding to the reinforcement item is FTP anonymous login forbidden, and an applicable object is a host with an operating system HP-UX and a version number of 11.11. According to the type and version number of the host operating system, a user interprets and defines the host security baseline standard by adopting commands such as Trap, Debug, pipe, Stream, Post and the like in Shell and Perl languages to form an execution script. The execution script comprises selected reinforcement items and security reinforcement functions corresponding to the reinforcement items, the applicable object of the execution script is a host with an operating system type of HP-UX 11.11, and the execution user identity is a root user.
And checking and reinforcing the host with the operating system type of HP-UX 11.11 by using the execution script. Here, the user identity of the current host executing script is root user, and FTP in the field of the host password policy does not prohibit anonymous login.
Before entering the process of checking and reinforcing the host, the executing script can automatically judge whether the type of the operating system, the version of the operating system and the identity of the executing user of the host are completely consistent with the applicable object set in the script, and the executing script enters a backup stage because the type of the operating system, the version of the operating system and the identity of the executing user of the host are completely consistent with the applicable object set in the script; in the backup stage, the execution script can automatically backup the configuration file of the security baseline of the host operating system and/or the host operating system, so that the normal operation of the system is prevented from being influenced by errors such as configuration information in the process of reinforcing the security baseline of the host, and the host can be restored to the state before reinforcement by using the backed-up file.
After entering the process of checking and reinforcing the host, firstly, executing a script to check whether a security baseline configuration file and/or a host operating system of the host operating system have been backed up in advance, and if not, sending an alarm prompt; checking whether a safety reinforcement function of a reinforcement item is defined in advance, and if not, sending an alarm prompt; when the alarm prompts appear, the user can choose to quit the execution of the checking and the strengthening on the host, but the alarm prompts do not influence the normal operation of the execution script. And then, the execution script searches a security reinforcing function with the same key word according to the key word contained in the FTP anonymous login in the field of reinforcing items, namely password strategies, and calls the security reinforcing function to check and reinforce the FTP anonymous login. And if the FTP in the field of the host password policy does not prohibit anonymous login, the check result shows that the anonymous login is not prohibited in the reinforced FTP anonymous login, and the execution script restores the reinforced FTP anonymous login to the FTP anonymous login prohibited anonymous login. And after the reinforcement is finished, the execution script confirms the reinforcement result of the reinforcement item again, judges whether the reinforcement result is effective or not, and if the reinforcement item displays that anonymous login is forbidden after reinforcement, the reinforcement result is effective.
In addition, the execution script can be deployed and hardened on a single host or multiple hosts. When the reinforcement is carried out on a single host, a user can deploy the execution script under any file directory of the server in an FTP mode, and can change the execution script or increase the number of the execution users through the execution-/security.
When reinforcement is needed to be carried out on a plurality of hosts at the same time, a user can deploy the execution script on the host computer in an FTP mode, ensure that the host computer and a target host computer needing reinforcement can normally communicate through a network port, and realize functions of automatic login, reinforcement command execution, log recording and the like through the expect script. The expect script is composed as follows:
wherein, the configuration list of batch processing command and hosts is stored in the config directory; storing running log information under a log directory; storing ssh key files under the ssh-key directory; sh is a main execution program used for circularly taking values from hosts files and calling expect scripts.
As shown in fig. 2, the system for automatically reinforcing the security baseline of the host according to the embodiment of the present invention includes: a baseline management module 22, a baseline checking module 23 and a baseline reinforcing module 24; wherein,
the baseline management module 22 is used for setting a host security baseline;
here, the host security baseline may be set according to a host security check standard preset by a user, or may be set according to actual operating conditions of the host under different environments.
The system further comprises: the backup module 21 is used for backing up the configuration file of the security baseline of the host operating system and/or the host operating system before the baseline management module 22 sets the security baseline of the host;
the purpose of backing up the security baseline configuration file of the host operating system and/or the host operating system is to prevent the host from being restored to a state before the host is consolidated by using the backed-up configuration file and/or the system when the system cannot normally run and the like possibly occur due to unexpected events, such as configuration information misoperation, in the host consolidation process.
The baseline management module 22 is further configured to select a reinforcement item, and set security reinforcement functions corresponding to the selected reinforcement item respectively;
here, the user can establish a basic reinforcement item library in advance according to the host security check standard, and establish a user reinforcement item library according to the actual operation condition of the host under different environments; further, the base reinforcement item library and the user reinforcement item library may be updated according to actual needs, for example, deleting unnecessary reinforcement items, modifying existing reinforcement items, or adding new reinforcement items.
Here, the selecting a reinforcement item may be selecting one or more reinforcement items from the base reinforcement item library individually, selecting one or more reinforcement items from the user reinforcement item library individually, or selecting one or more reinforcement items from the two reinforcement item libraries individually. Of course, the selected reinforcement item may also be a reinforcement item set by the user directly according to the host security check standard and/or the actual operation condition of the host.
Here, the security reinforcement function includes a baseline standard value of a reinforcement item and a keyword of the reinforcement item; the baseline standard value is used for judging whether the reinforcement item is normal or not, namely, whether the current value of the reinforcement item is consistent with the baseline standard value or not is compared, if so, the reinforcement item is normal, otherwise, the reinforcement item is abnormal; the keywords are mainly used as search identifiers, namely when the security reinforcement functions corresponding to the reinforcement items need to be searched, the security reinforcement functions matched with the reinforcement items can be obtained through keyword search in the reinforcement items.
The baseline management module 22 is further configured to identify a type of a host operating system, a version number of the operating system, and an identity of an executing user, respectively;
specifically, different security hardening functions may need to be set for the same hardening item due to differences between different operating systems; different security hardening functions may also need to be set for the same hardening item due to differences between different operating system versions. Moreover, checking and reinforcing the host will involve the highest authority of host operations, such as account locking check, password modification policy check, etc., which present a high operational security risk. Therefore, in order to ensure the security of the host, the checking and reinforcing of the host can be performed only by the root user which is the default of the host, so that whether the performing user is the root user needs to be identified, and if not, the checking and reinforcing operation cannot be performed.
The baseline checking module 23 is configured to call a security reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item, and obtain a current value of the reinforcement item;
specifically, according to keywords contained in the reinforcement item, a security reinforcement function with the same keywords is searched, the security reinforcement function is called to check and reinforce the reinforcement item, and a check result of the reinforcement item is obtained and recorded, wherein the check result of the reinforcement item contains a current value of the reinforcement item.
In practical applications, the obtained inspection result of the reinforcement item may further include redundant information, such as blank spaces, comments, and the like, and therefore, the obtained inspection result of the reinforcement item may be preprocessed, and then the current value of the reinforcement item is extracted from the preprocessed inspection result of the reinforcement item.
The baseline reinforcement module 24 is configured to generate a reinforcement result according to a relationship between the current value of the reinforcement item and a baseline standard value included in the security reinforcement function;
specifically, according to a current value of a reinforcement item extracted from an inspection result of the reinforcement item and a baseline standard value of the reinforcement item extracted from a safety reinforcement function corresponding to the reinforcement item, comparing the current value of the reinforcement item with the baseline standard value; when the current value of the reinforcement item is the same as the baseline standard value contained in the safety reinforcement function, the reinforcement item is normal, the current value of the reinforcement item is reserved, and a reinforcement result is generated; and when the current value of the reinforcement item is different from the baseline standard value contained in the safety reinforcement function, the reinforcement item is abnormal, the current value of the reinforcement item needs to be repaired to be the baseline standard value, and a reinforcement result is generated.
Here, the reinforcement result includes a process of reinforcing the reinforcement item, a value of the reinforcement item before reinforcement, and a value of the reinforcement item after reinforcement.
Further, the system further comprises: the warning module 25 is used for recording the reinforcement time of each reinforcement item when each reinforcement item is reinforced;
the alarm module 25 is further configured to, when the time for reinforcing a reinforcement item is greater than a preset threshold, suspend reinforcing the reinforcement item, and issue an alarm.
Further, the system further comprises: a verification module 26, configured to verify whether the reinforcement result is valid, and if the reinforcement result is valid, complete reinforcement; and if the reinforcement result is not effective, sending an alarm prompt to the alarm module 25.
Specifically, whether the reinforcement of the reinforcement item is normally completed is verified according to the reinforcement result, if the value of the reinforcement item after reinforcement is completely consistent with the baseline standard value contained in the safety reinforcement function corresponding to the reinforcement item, it is indicated that the reinforcement is normally completed, otherwise, it is indicated that the reinforcement is abnormal.
For example, the value of a reinforcement item before reinforcement is 1, and the baseline standard value included in the security reinforcement function corresponding to the reinforcement item is 2, after reinforcement is performed, if the value of the reinforcement item after reinforcement included in the reinforcement result is still 1, it indicates that there is an abnormality in reinforcement of the reinforcement item; if the value of the reinforcement item included in the reinforcement result after reinforcement is 2, it indicates that the reinforcement of the reinforcement item has been completed normally.
Further, the alarm module 25 is further configured to receive an alarm prompt sent by the verification module 26 and send an alarm.
In practical applications, the backup module 21, the baseline management module 22, the baseline check module 23, the baseline reinforcement module 24, the alarm module 25, and the verification module 26 may be implemented by a Central Processing Unit (CPU), a microprocessor unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like located at a terminal.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, and improvement made within the spirit and scope of the present invention are included in the protection scope of the present invention.

Claims (10)

1. A host security baseline automatic reinforcement method is characterized in that a host security baseline is set; the method further comprises the following steps:
selecting reinforcement items, and setting safety reinforcement functions corresponding to the selected reinforcement items respectively;
calling a safety reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item and acquiring the current value of the reinforcement item;
and generating a reinforcement result according to the relation between the current value of the reinforcement item and the baseline standard value contained in the safety reinforcement function.
2. The method of claim 1, further comprising: the host operating system security baseline configuration file and/or the host operating system are backed up prior to setting the host security baseline.
3. The method of claim 1,
the security hardening function further includes: keywords of the reinforcement item;
the step of calling the security reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item includes: and searching a security reinforcement function with the same keyword according to the keyword contained in the reinforcement item, and calling the security reinforcement function to reinforce the reinforcement item.
4. The method of claim 1, wherein generating a reinforcement result according to a relationship between current values of the reinforcement terms and baseline standard values included in the security reinforcement function comprises:
when the current value of the reinforcement item is the same as the baseline standard value contained in the safety reinforcement function, the current value of the reinforcement item is reserved;
and when the current value of the reinforcement item is different from the baseline standard value contained in the safety reinforcement function, restoring the current value of the reinforcement item to the baseline standard value.
5. The method according to any one of claims 1 to 4, further comprising:
when the time for reinforcing one reinforcing item is greater than a preset threshold value, stopping reinforcing the reinforcing item and sending an alarm;
verifying whether the reinforcement result is effective or not, and finishing reinforcement if the reinforcement result is effective; and if the reinforcement result is not effective, sending an alarm prompt.
6. An automatic reinforcement system for a host security baseline, the system comprising: the device comprises a baseline management module, a baseline inspection module and a baseline reinforcement module; wherein,
the base line management module is used for setting a host security base line; selecting reinforcement items, and setting safety reinforcement functions corresponding to the selected reinforcement items respectively;
the baseline checking module is used for calling a safety reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item and acquiring the current value of the reinforcement item;
and the baseline reinforcement module is used for generating a reinforcement result according to the relation between the current value of the reinforcement item and the baseline standard value contained in the safety reinforcement function.
7. The system of claim 6, further comprising: and the backup module is used for backing up the configuration file of the security baseline of the host operating system and/or the host operating system before the security baseline of the host is set.
8. The system of claim 6,
the security reinforcement function set by the baseline management module further comprises: keywords of the reinforcement item;
the baseline reinforcement module calls a security reinforcement function corresponding to the reinforcement item to reinforce the reinforcement item, and the method comprises the following steps: and searching a security reinforcement function with the same keyword according to the keyword contained in the reinforcement item, and calling the security reinforcement function to reinforce the reinforcement item.
9. The system of claim 6, wherein the baseline reinforcement module is specifically configured to:
when the current value of the reinforcement item is the same as the baseline standard value contained in the safety reinforcement function, the current value of the reinforcement item is reserved;
and when the current value of the reinforcement item is different from the baseline standard value contained in the safety reinforcement function, restoring the current value of the reinforcement item to the baseline standard value.
10. The system of any one of claims 6 to 9, further comprising: the device comprises an alarm module and a verification module; wherein,
the alarm module is used for stopping reinforcing one reinforcing item and sending an alarm when the reinforcing time of the reinforcing item is greater than a preset threshold; receiving an alarm prompt sent by a verification module and sending an alarm;
the verification module is used for verifying whether the reinforcement result is effective or not, and if the reinforcement result is effective, the reinforcement is finished; and if the reinforcement result is not valid, sending an alarm prompt to an alarm module.
CN201610180521.9A 2016-03-25 2016-03-25 A kind of automatic reinforcement means of Host Security baseline and system Pending CN107229977A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610180521.9A CN107229977A (en) 2016-03-25 2016-03-25 A kind of automatic reinforcement means of Host Security baseline and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610180521.9A CN107229977A (en) 2016-03-25 2016-03-25 A kind of automatic reinforcement means of Host Security baseline and system

Publications (1)

Publication Number Publication Date
CN107229977A true CN107229977A (en) 2017-10-03

Family

ID=59932519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610180521.9A Pending CN107229977A (en) 2016-03-25 2016-03-25 A kind of automatic reinforcement means of Host Security baseline and system

Country Status (1)

Country Link
CN (1) CN107229977A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062470A (en) * 2017-12-13 2018-05-22 广东电网有限责任公司电力科学研究院 A kind of computer information safe reinforcement means
CN110765463A (en) * 2019-11-02 2020-02-07 上海新炬网络技术有限公司 WebLogic-based security baseline reinforcement method
CN112685743A (en) * 2020-12-28 2021-04-20 北京珞安科技有限责任公司 Automatic reinforcing method and system for host security baseline
CN113783851A (en) * 2021-08-27 2021-12-10 西安胡门网络技术有限公司 Baseline checking and reinforcing method and system for NTLM protocol attack

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699831A (en) * 2013-12-31 2014-04-02 曙光云计算技术有限公司 System and method for reinforcing mainframe in real time
CN104346574A (en) * 2014-10-23 2015-02-11 武汉大学 Automatic host computer security configuration vulnerability restoration method and system based on configuration specification
US20150106652A1 (en) * 2012-06-25 2015-04-16 Tencent Technology (Shenzhen) Company Limited System repair method and device, and storage medium
CN105245392A (en) * 2014-06-27 2016-01-13 北京新媒传信科技有限公司 Method and device for base line checking and repairing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150106652A1 (en) * 2012-06-25 2015-04-16 Tencent Technology (Shenzhen) Company Limited System repair method and device, and storage medium
CN103699831A (en) * 2013-12-31 2014-04-02 曙光云计算技术有限公司 System and method for reinforcing mainframe in real time
CN105245392A (en) * 2014-06-27 2016-01-13 北京新媒传信科技有限公司 Method and device for base line checking and repairing
CN104346574A (en) * 2014-10-23 2015-02-11 武汉大学 Automatic host computer security configuration vulnerability restoration method and system based on configuration specification

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108062470A (en) * 2017-12-13 2018-05-22 广东电网有限责任公司电力科学研究院 A kind of computer information safe reinforcement means
CN110765463A (en) * 2019-11-02 2020-02-07 上海新炬网络技术有限公司 WebLogic-based security baseline reinforcement method
CN110765463B (en) * 2019-11-02 2023-05-26 上海新炬网络技术有限公司 WebLogic-based safety baseline reinforcement method
CN112685743A (en) * 2020-12-28 2021-04-20 北京珞安科技有限责任公司 Automatic reinforcing method and system for host security baseline
CN113783851A (en) * 2021-08-27 2021-12-10 西安胡门网络技术有限公司 Baseline checking and reinforcing method and system for NTLM protocol attack

Similar Documents

Publication Publication Date Title
US7437764B1 (en) Vulnerability assessment of disk images
US8621278B2 (en) System and method for automated solution of functionality problems in computer systems
CA2668204C (en) Program modification and load times in computing devices
CN111695156A (en) Service platform access method, device, equipment and storage medium
CN112463144B (en) Distributed storage command line service method, system, terminal and storage medium
CN101493869B (en) Password protection for backed-up file
JP6788178B2 (en) Setting support program, setting support method and setting support device
KR101579493B1 (en) Staging control method for source code, Computer program for the same, Recording medium storing computer program for the same
CN107229977A (en) A kind of automatic reinforcement means of Host Security baseline and system
KR101649909B1 (en) Method and apparatus for virtual machine vulnerability analysis and recovery
CN116361807A (en) Risk management and control method and device, storage medium and electronic equipment
CN103440460A (en) Application system change validation method and system
CN116226865A (en) Security detection method, device, server, medium and product of cloud native application
US20100064290A1 (en) Computer-readable recording medium storing a control program, information processing system, and information processing method
CN112579330B (en) Processing method, device and equipment for abnormal data of operating system
CN112256532A (en) Test interface generation method and device, computer equipment and readable storage medium
US8380729B2 (en) Systems and methods for first data capture through generic message monitoring
CN109582454A (en) Permission releasing control method, device and equipment in a kind of distributed storage cluster
US12086249B2 (en) Detection system, detection method, and an update verification method performed by using the detection method
CN112765602A (en) Information security supervision method and device
CN114327588A (en) Method and device for processing code submission log
CN106293897B (en) Automatic scheduling system of subassembly
US6802009B1 (en) Operating system security checking system, method, and program
CN115114670B (en) File unlocking method and device based on external link, network disk and storage medium
CN115639972B (en) Data migration method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003