TWM599062U - Privileged account management system - Google Patents
Privileged account management system Download PDFInfo
- Publication number
- TWM599062U TWM599062U TW109203649U TW109203649U TWM599062U TW M599062 U TWM599062 U TW M599062U TW 109203649 U TW109203649 U TW 109203649U TW 109203649 U TW109203649 U TW 109203649U TW M599062 U TWM599062 U TW M599062U
- Authority
- TW
- Taiwan
- Prior art keywords
- privileged
- server
- privileged account
- module
- list
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 claims abstract description 67
- 238000007726 management method Methods 0.000 claims abstract description 51
- 238000013523 data management Methods 0.000 claims abstract description 35
- 238000010586 diagram Methods 0.000 description 8
- 230000002159 abnormal effect Effects 0.000 description 6
- 230000002708 enhancing effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000007123 defense Effects 0.000 description 3
- 230000003203 everyday effect Effects 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
本創作關於一種帳號管理系統,並且特別地,關於一種可提升資料安全的特權帳號管理系統。 This creation is about an account management system, and in particular, about a privileged account management system that can improve data security.
在這個網路通訊快速、資料傳輸便利的時代,人們逐漸無法脫離網路,無論在商業交易、人際互動或生活形態,皆與網路息息相關,而企業內部電腦的資料溝通也可透過企業內部之網路進行傳輸。由於網路的便利性,許多資料都唾手可得,因此,企業必須建立取得資料或操作系統的權限,以限制與控管取得資料的人數,進而防止資料外洩。以銀行業為例,由於許多資料都包含客戶個人資料,因此如何保障客戶的個人資料外洩是重要的課題。另外,若系統未受到權限保護,則系統容易被提權受到攻擊。因此,通常企業都會建立特權帳號以控管資料並提升資料安全。 In this era of fast network communication and convenient data transmission, people are gradually unable to leave the network. No matter in business transactions, interpersonal interaction, or lifestyle, they are all closely related to the network, and the data communication of the internal computer of the enterprise can also be achieved through the internal communication of the enterprise. Network for transmission. Due to the convenience of the Internet, many data are readily available. Therefore, companies must establish permissions to obtain data or operating systems to limit and control the number of people who obtain data, thereby preventing data leakage. Take the banking industry as an example. Since many data contain customers' personal data, how to protect customers' personal data from leakage is an important issue. In addition, if the system is not protected by permissions, the system is vulnerable to escalation and attack. Therefore, companies usually create privileged accounts to control data and improve data security.
然而,近年來惡意程式威脅日益嚴重,許多駭客入侵企業的防禦系統取得特權帳號進行提權而發動攻擊(如SWIFT駭客盜領事件、銀行ATM遭駭客攻擊吐鈔事件等)。因此,如何有效地管理特權帳號將是主要的問題之一。現行一般企業在提升管理特權帳號的方法中,係在企業的伺服器以安裝應用程式或整合軟體的方式收集各伺服器的相關資訊後,再回傳到資安防禦系統進行比對分析以找出異常事件。但是,由於企業的伺服器 皆需安裝其他程式或軟體不僅提高成本也降低伺服器效能。 However, in recent years, the threat of malicious programs has become more and more serious. Many hackers have invaded the defense system of enterprises to obtain privileged accounts to escalate privileges and launch attacks (such as the SWIFT hacking incident, the bank ATM being attacked by hackers to spit money, etc.). Therefore, how to effectively manage privileged accounts will be one of the main problems. The current method for general enterprises to enhance the management privileged account is to install applications or integrate software on the enterprise’s server to collect the relevant information of each server, and then return it to the information security defense system for comparison and analysis to find An abnormal event occurred. However, because the corporate server All need to install other programs or software not only increase costs but also reduce server performance.
因此,有必要研發一種特權帳號管理系統,以解決先前技術之問題。 Therefore, it is necessary to develop a privileged account management system to solve the problems of the prior art.
有鑑於此,本創作之一範疇在於提供一種特權帳號管理系統,可降低成本並且可有效地提高資料安全。 In view of this, one of the scopes of this creation is to provide a privileged account management system, which can reduce costs and effectively improve data security.
根據本創作之一具體實施例,特權帳號管理系統包含至少一目標伺服器、儲存模組、資料管理模組以及監控分析模組。至少一目標伺服器儲存至少一特權帳號,其中每一目標伺服器包含伺服器資料以及對應伺服器資料的至少一特權帳號。儲存模組用以儲存伺服器列表,其中伺服器列表包含所有目標伺服器的每一目標伺服器資料以及對應每一目標伺服器資料的每一特權帳號。資料管理模組耦接至少一目標伺服器。資料管理模組用以監控目標伺服器並建立特權帳號清單,並且於至少一特定時間發送特權帳號清單。特權帳號清單包含目標伺服器的所有特權帳號。監控分析模組耦接儲存模組以及資料管理模組。監控分析模組用以接收特權帳號清單並且比對伺服器列表以及特權帳號清單。當伺服器列表與特權帳號清單不符時,監控分析模組產生並發送警示訊號。 According to a specific embodiment of this creation, the privileged account management system includes at least one target server, a storage module, a data management module, and a monitoring analysis module. At least one target server stores at least one privileged account, and each target server includes server data and at least one privileged account corresponding to the server data. The storage module is used to store a server list, where the server list includes each target server data of all target servers and each privileged account corresponding to each target server data. The data management module is coupled to at least one target server. The data management module is used for monitoring the target server and creating a list of privileged accounts, and sending the list of privileged accounts at least at a specific time. The list of privileged accounts contains all privileged accounts of the target server. The monitoring analysis module is coupled to the storage module and the data management module. The monitoring and analysis module is used to receive the list of privileged accounts and compare the list of servers and the list of privileged accounts. When the server list does not match the privileged account list, the monitoring and analysis module generates and sends a warning signal.
其中,至少一特權帳號包含第一特權帳號。當特權帳號清單包含對應目標伺服器的第一特權帳號並且伺服器列表不包含對應目標伺服器的第一特權帳號時,監控分析模組產生並發送警示訊號。 Among them, at least one privileged account includes the first privileged account. When the privileged account list contains the first privileged account corresponding to the target server and the server list does not contain the first privileged account corresponding to the target server, the monitoring and analysis module generates and sends a warning signal.
其中,至少一特權帳號包含第一特權帳號。當伺服器列表包含對應目標伺服器的第一特權帳號並且特權帳號清單不包含對應目標伺服 器的第一特權帳號時,監控分析模組產生並發送警示訊號。 Among them, at least one privileged account includes the first privileged account. When the server list contains the first privileged account corresponding to the target server and the privileged account list does not include the corresponding target server The first privileged account of the device, the monitoring analysis module generates and sends a warning signal.
其中,特權帳號管理系統進一步包含收發模組,耦接至少一目標伺服器以及監控分析模組。收發模組用以回收對應特權帳號的特權帳號密碼。當收發模組於該特定時間所回收的特權帳號密碼所對應的特權帳號與伺服器列表不符時,監控分析模組產生並發送警示訊號。 Wherein, the privileged account management system further includes a transceiver module, coupled to at least one target server and a monitoring analysis module. The transceiver module is used to recover the privileged account password of the corresponding privileged account. When the privilege account corresponding to the privilege account password recovered by the transceiver module at the specific time does not match the server list, the monitoring analysis module generates and sends a warning signal.
進一步地,至少一特定時間包含第一特定時間,至少一特權帳號包含第一特權帳號,並且第一特權帳號包含第一特定時間。當收發模組於第一特定時間未回收對應第一特權帳號的特權帳號密碼並且伺服器列表包含第一特權帳號時,監控分析模組產生並發送警示訊號。 Further, at least one specific time includes a first specific time, at least one privileged account includes a first privileged account, and the first privileged account includes a first specific time. When the transceiver module does not retrieve the privileged account password corresponding to the first privileged account at the first specific time and the server list contains the first privileged account, the monitoring and analysis module generates and sends a warning signal.
其中,特權帳號管理系統進一步包含申請模組,耦接收發模組以及監控分析模組。申請模組用以發送申請訊息至收發模組。申請訊息包含至少一目標伺服器資料以及對應至少一目標伺服器資料的至少一特權帳號。當申請訊息與伺服器列表不符時,監控分析模組產生並發送警示訊號。 Among them, the privileged account management system further includes an application module, a receiving and sending module, and a monitoring analysis module. The application module is used to send application messages to the transceiver module. The application message includes at least one target server data and at least one privileged account corresponding to the at least one target server data. When the application message does not match the server list, the monitoring analysis module generates and sends a warning signal.
進一步地,申請訊息包含第二目標伺服器資料以及第二特權帳號資料。當伺服器列表不包含第二目標伺服器資料時,收發模組建立第二目標伺服器資料以及對應第二目標伺服器資料的第二特權帳號資料於伺服器列表中。 Further, the application message includes the second target server data and the second privilege account data. When the server list does not include the second target server data, the transceiver module creates the second target server data and the second privilege account data corresponding to the second target server data in the server list.
其中,特權帳號管理系統進一步包含顯示模組耦接監控分析模組。顯示模組用以接收並顯示監控分析模組所發送的警示訊號。 Among them, the privileged account management system further includes a display module coupled to a monitoring analysis module. The display module is used to receive and display the warning signal sent by the monitoring analysis module.
其中,資料管理模組為系統中心配置管理器(System Center Configuration Manager,SCCM)。 Among them, the data management module is the System Center Configuration Manager (SCCM).
其中,收發模組、監控分析模組以及儲存模組整合於伺服器中。 Among them, the transceiver module, the monitoring analysis module, and the storage module are integrated in the server.
綜上所述,本創作之特權帳號管理系統可根據多種資料源交叉比對以準確地判斷未授權的特權帳號,進而提升資料安全。並且可藉由整合式的管理器取得各伺服器的特權帳號資料,而不需在各伺服器安裝其他相關整合及資料安全防禦軟體,進而降低成本並提高伺服器效能。 To sum up, the privileged account management system of this creation can accurately determine unauthorized privileged accounts based on cross-comparison of multiple data sources, thereby enhancing data security. Moreover, the privileged account data of each server can be obtained through the integrated manager, without installing other related integration and data security defense software on each server, thereby reducing costs and improving server performance.
1:特權帳號管理系統 1: Privileged account management system
11A、11B:目標伺服器 11A, 11B: target server
12、161、261:收發模組 12, 161, 261: transceiver module
13:資料管理模組 13: Data management module
14、162、262:監控分析模組 14, 162, 262: monitoring analysis module
15、264:顯示模組 15, 264: display module
16、26:伺服器 16, 26: server
17、163、263:儲存模組 17, 163, 263: storage module
18:申請模組 18: Application module
圖1係繪示根據本創作之一具體實施例之特權帳號管理系統的功能方塊圖。 Fig. 1 is a functional block diagram of a privileged account management system according to a specific embodiment of the invention.
圖2係繪示根據本創作之另一具體實施例之特權帳號管理系統的功能方塊圖。 Fig. 2 is a functional block diagram of a privileged account management system according to another specific embodiment of the present creation.
圖3係繪示根據本創作之又一具體實施例之特權帳號管理系統的功能方塊圖。 Fig. 3 is a functional block diagram of a privileged account management system according to another specific embodiment of the present creation.
圖4係繪示根據本創作之又一具體實施例之特權帳號管理系統的功能方塊圖。 Fig. 4 is a functional block diagram of a privileged account management system according to another specific embodiment of the present creation.
為了讓本創作的優點,精神與特徵可以更容易且明確地了解,後續將以具體實施例並參照所附圖式進行詳述與討論。值得注意的是,這些具體實施例僅為本創作代表性的具體實施例,其中所舉例的特定方法、裝置、條件、材質等並非用以限定本創作或對應的具體實施例。又,圖中各裝置僅係用於表達其相對位置且未按其實際比例繪述,合先敘明。 In order to make the advantages, spirit and features of this creation easier and clearer to understand, the following will be detailed and discussed with specific embodiments and with reference to the accompanying drawings. It should be noted that these specific embodiments are only representative specific embodiments of the creation, and the specific methods, devices, conditions, materials, etc. exemplified therein are not intended to limit the creation or the corresponding specific embodiments. In addition, each device in the figure is only used to express its relative position and is not drawn according to its actual scale, which is described first.
在本公開的各種實施例中,表述“或”包括同時列出的文字的任何組合或所有組合。例如,表述“A或B”可包括A、可包括B或可包括A和B二者。此外,本創作裝置或元件前的不定冠詞“一”、“一種”和“一個”對裝置或元件的數量要求(即出現次數)無限制性。因此“一”應被解讀為包括一或至少一,並且單數形式的裝置或元件也包括複數形式,除非所述數量明顯指單數形式。 In various embodiments of the present disclosure, the expression "or" includes any or all combinations of words listed at the same time. For example, the expression "A or B" can include A, can include B, or can include both A and B. In addition, the indefinite articles "a", "one" and "one" before the authoring device or element have no limitation on the number of devices or elements (ie, the number of appearances). Therefore, "a" should be interpreted as including one or at least one, and a device or element in the singular form also includes the plural form, unless the number clearly refers to the singular form.
在本說明書的描述中,參考術語“一具體實施例”、“另一具體實施例”或“部分具體實施例”等的描述意指結合該實施例描述的具體特徵、結構、材料或者特點包含於本創作的至少一個實施例中。在本說明書中,對上述術語的示意性表述不一定指的是相同的實施例。而且,描述的具體特徵、結構、材料或者特點可以在任何的一個或多個實施例中以合適的方式結合。 In the description of this specification, the description with reference to the terms "a specific embodiment", "another specific embodiment" or "parts of specific embodiments" etc. means that the specific features, structures, materials or features described in conjunction with the embodiment include In at least one embodiment of this creation. In this specification, the schematic representations of the aforementioned terms do not necessarily refer to the same embodiment. Moreover, the described specific features, structures, materials or characteristics can be combined in any one or more embodiments in a suitable manner.
請參考圖1,圖1係繪示根據本創作之一具體實施例之特權帳號管理系統1的功能方塊圖。在本具體實施例中,特權帳號管理系統1包含目標伺服器11A及11B、儲存模組17、資料管理模組13以及監控分析模組14。目標伺服器11A及11B耦接資料管理模組13,並且監控分析模組14耦接資料管理模組13以及儲存模組17。於實務中,特權帳號管理系統1可應用於企業的資料安全管理。監控分析模組14以及儲存模組17可運作於一電腦主機(如:伺服器)中,並且目標伺服器11A及11B可以有線的或無線的連接於電腦主機中的資料管理模組13。請注意,圖1中的目標伺服器的數量不限於2個,也可為1個或3個以上。
Please refer to FIG. 1, which is a functional block diagram of a privileged
在本具體實施例中,目標伺服器11A包含伺服器資料以及對
應伺服器資料的至少一特權帳號。於實務中,目標伺服器11A可為工業電腦,並且可為企業待管理的資料庫、系統、線上平台的伺服器等。伺服器資料為可用以辨識目標伺服器11A的資料(如:電腦IP位置、電腦編號等)。特權帳號可為系統或資料庫等的最高權限帳號,並且特權帳號可為檔案的形式。舉例來說,當特權帳號管理系統1應用於銀行業時,目標伺服器11A可為金融資料庫,特權帳號為資料庫伺服器的最高權限帳號。請注意,目標伺服器11B的功能與目標伺服器11A的功能大致上相同,於此不再贅述。進一步地,當目標伺服器的數量為3個以上時,各目標伺服器的功能皆與目標伺服器11A的功能大致上相同。
In this specific embodiment, the
在本具體實施例中,儲存模組17用以儲存伺服器列表,其中伺服器列表包含所有目標伺服器的每一目標伺服器資料以及對應每一目標伺服器資料的至少一特權帳號。於實務中,儲存模組17可為硬碟、外接式硬碟等。伺服器列表可包含目標伺服器11A中的伺服器資料以及對應的特權帳號,以及目標伺服器11B中的伺服器資料以及對應的特權帳號。而伺服器列表可以預存或匯入的方式儲存於儲存模組17中。舉例來說,當企業的伺服器上架或現有的伺服器運作時,特權帳號的管理人員可先將所有已上架和現有的伺服器的伺服器資料以及對應伺服器的特權帳號儲存於儲存模組17中。
In this embodiment, the
在本具體實施例中,資料管理模組13監控目標伺服器11A及11B並建立特權帳號清單,而特權帳號清單包含目標伺服器11A及11B的所有特權帳號。於實務中,資料管理模組13可建立於運算晶片中或可為應用程式並且可辨識出特權帳號。資料管理模組13可判斷及得知位於目標伺服
器11A的所有特權帳號及目標伺服器11B的所有特權帳號。在一具體實施例中,資料管理模組13為系統中心配置管理器(System Center Configuration Manager,SCCM)。由於伺服器資料除了可為前述的電腦IP位置及電腦編號之外,也可包含作業系統資料(如:Windows作業系統)。於實務中,當目標伺服器11A與目標伺服器11B皆為Windows作業系統時,Windows系統中的SCCM可直接監控並得知目標伺服器11A及目標伺服器11B的特權帳號以建立特權帳號清單。請注意,資料管理模組13不限於SCCM,也可為其他任何可建立特權帳號清單的功能的管理器。因此,本創作的特權帳號管理系統1可直接得知伺服器的特權帳號,而不需在各伺服器額外安裝資料安全軟體,以提高伺服器的運作能力並且減少伺服器的負擔,進而以降低成本並提高伺服器效能。
In this specific embodiment, the
進一步地,資料管理模組13可於至少一特定時間發送特權帳號清單至監控分析模組14。於實務中,資料管理模組13可定期回報目標伺服器11A及11B中的特權帳號,以監控每一個目標伺服器的特權帳號使用情形。而特定時間可預存於資料管理模組13中,並且可根據需求而設定。舉例來說,特定時間可設定為每日的下午六點,因此,資料管理模組13可於每日的下午六點將特權帳號清單傳送至監控分析模組14。
Further, the
在本具體實施例中,當監控分析模組14接收到資料管理模組13所發送的特權帳號清單後,監控分析模組14比對資料管理模組13所建立的特權帳號清單以及儲存於儲存模組17中的伺服器列表。於實務中,監控分析模組14可建立於運算晶片中。監控分析模組14可藉由比對特權帳號清單以及伺服器列表判斷出各目標伺服器11A及11B是否有異常且未授權的特
權帳號,並且根據判斷結果產生並發送警示訊號。進一步地,特權帳號管理人員可根據警示訊號採取相對應的資安防護處理,進而提升資料安全。
In this specific embodiment, after the monitoring and
在一具體實施例中,當特權帳號清單包含對應目標伺服器11A的第一特權帳號,並且伺服器列表不包含對應目標伺服器11A的第一特權帳號時,監控分析模組14產生並發送警示訊號。於實務中,當資料管理模組13找到伺服器列表沒有紀錄的第一特權帳號時,也就是說,第一特權帳號不為目標伺服器原有的特權帳號,並且也不為企業的特權帳號管理人員於目標伺服器上架時所建立的帳號。換句話說,第一特權帳號有可能為駭客入侵目標伺服器11A所建立的未授權的特權帳號。進一步地,企業的特權帳號管理人員可根據監控分析模組14所發送警示訊息將此帳號自目標伺服器刪除,以提升企業的安全性。
In a specific embodiment, when the list of privileged accounts includes the first privileged account corresponding to the
在一具體實施例中,當伺服器列表包含對應目標伺服器11A的第一特權帳號,並且特權帳號清單不包含對應目標伺服器11A的第一特權帳號時,監控分析模組14產生並發送警示訊號。於實務中,當資料管理模組13所發送的特權帳號清單不包含第一特權帳號時,也就是說,第一特權帳號已不存在。換句話說,目標伺服器11A可能已經下架,因此資料管理模組13無法取得第一特權帳號。然而,由於儲存模組17中的伺服器列表仍包含對應目標伺服器11A的第一特權帳號的資料,因此企業的特權帳號管理人員可根據監控分析模組14所發送警示訊息更新儲存模組17中的伺服器列表,以確實掌控企業所有特權帳號的流動。因此,特權帳號管理系統1可根據特權帳號清單以及伺服器列表自動判斷出異常的特權帳號,進而提升企業的安全管理效率。
In a specific embodiment, when the server list includes the first privileged account corresponding to the
請參考圖2。圖2係繪示根據本創作之另一具體實施例之特權帳號管理系統1的功能方塊圖。本具體實施例與前述的具體實施例的不同之處,係在於本具體實施例的特權帳號管理系統1進一步包含收發模組12。收發模組12耦接目標伺服器11A及11B,並且耦接監控分析模組14。收發模組12用以回收對應特權帳號的特權帳號密碼。當收發模組12於特定時間所回收的特權帳號密碼所對應的特權帳號與伺服器列表不符時,監控分析模組14產生並發送警示訊號。於實務中,收發模組12可為資料傳輸晶片。收發模組12可在特定時間(如:下午6點)回收所有企業人員所申用的特權帳號的特權帳號密碼。而回收特權帳號密碼的方式可為變更密碼的形式,但不限於此。當收發模組12未回收對應特權帳號的特權帳號密碼時,即表示收回對應特權帳號的特權帳號密碼未執行變更,此時,企業的特權帳號管理人員可根據監控分析模組14所發送警示訊息將對應特權帳號的特權帳號密碼進行密碼變更,以控管及避免特權帳號的濫用。因此,特權帳號管理系統1也可透過收發模組12有效地管理特權帳號,提升企業的資料安全。
Please refer to Figure 2. FIG. 2 is a functional block diagram of the privileged
而收發模組12所回收的對應特權帳號的特權帳號密碼除了可與儲存模組17中的伺服器列表分析與比對之外,也可與資料管理模組13所發送的特權帳號清單進行分析與比對。在一具體實施例中,收發模組12回收對應特權帳號的特權帳號密碼的同時,也根據特權帳號密碼所對應的特權帳號產生申用記錄。當資料管理模組13所發送的特權帳號清單與收發模組12的申用記錄不符時,監控分析模組14產生並發送警示訊號。舉例來說,當資料管理模組13所發送的特權帳號清單中,目標伺服器11A的使用紀錄包含第一特權帳號並且收發模組12所產生的申用記錄中不包含對應目標
伺服器11A的第一特權帳號時,也就是說,第一特權帳號並未行正常授權申用。企業的特權帳號管理人員可根據監控分析模組14所產生並發送的警示訊號尋找第一特權帳號的歷史紀錄。因此,特權帳號管理系統1可根據特權帳號清單以及回收的特權帳號密碼自動判斷出異常的特權帳號,以有效地管理企業的特權帳號,進而提升企業的安全管理效率。
The privileged account password corresponding to the privileged account recovered by the
而前述的特定時間可為收發模組12回收特權帳號的時間,也可為回收各特權帳號的依據。在一具體實施例中,目標伺服器11A的第一特權帳號包含第一特定時間,當收發模組12於該第一特定時間未回收對應第一特權帳號的特權帳號密碼並且伺服器列表包含第一特權帳號時,監控分析模組14產生該警示訊號。本具體實施例中的第一特定時間與前述的特定時間的不同之處係在於,前述的特定時間係為固定的時間點,並且收發模組12於固定的時間點回收所有特權帳號;而本具體實施例的第一特定時間係為第一特權帳號的使用時間,進一步地,多個特權帳號可分別包含不同的使用時間,因此,收發模組12可根據各特權帳號的使用時間回收特權帳號。於實務中,第一特定時間可為第一特權帳號的使用期限(如:3小時),並且第一特定時間可預設於收發模組12中。因此,當收發模組12於3小時後未回收到第一特權帳號時,監控分析模組14產生警示訊號。因此,特權帳號管理系統1也可藉由特權帳號的時效性比對回收的特權帳號以及特權帳號清單以判斷異常特權帳號,進而提升資料安全。
The aforementioned specific time may be the time when the
而本創作的特權帳號管理系統1也可進一步包含申請模組18。申請模組18耦接收發模組12及監控分析模組14,並且用以發送申請訊息至收發模組12。申請訊息包含至少一目標伺服器資料以及對應目標伺服
器的特權帳號。於實務中,申請模組18可為申請特權帳號的應用程式、系統或介面,並且申請模組18可整合於電腦或伺服器中。當企業人員需申用或申請新增目標伺服器11A的特權帳號時,申請模組18可發送包含目標伺服器11A的伺服器資料以及對應伺服器資料的特權帳號的申請訊息至收發模組12。而當申請訊息與伺服器列表不符時,監控分析模組14產生並發送警示訊號。
The privileged
在一具體實施例中,當申請訊息包含第二伺服器資料以及第二特權帳號,並且伺服器列表不包含第二伺服器資料以及第二特權帳號時,收發模組12建立第二伺服器資料以及對應第二伺服器資料的第二特權帳號於伺服器列表中。於實務中,當伺服器列表不包含第二伺服器資料時,也就是說,包含第二伺服器資料的第二伺服器不為現有的伺服器,因此,第二伺服器有可能是即將上架的伺服器,而申請訊息為伺服器管理人所新增申請的特權帳號。因此,企業的特權帳號管理人員可根據監控分析模組14所發送警示訊息確認即將上架的伺服器的訊息,以確實掌控企業所有的特權帳號。
In a specific embodiment, when the application message includes the second server data and the second privilege account, and the server list does not include the second server data and the second privilege account, the
進一步地,監控分析模組14也可比對申請模組18所發送的申請訊息、儲存於儲存模組17的伺服器列表以及資料管理模組13所發送的特權帳號清單。在一具體實施例中,申請訊息以及伺服器列表包含目標伺服器11A的第一特權帳號,當特權帳號清單包含目標伺服器11A的第一特權帳號以及第二特權帳號,而伺服器列表不包含目標伺服器11A的第二特權帳號時,監控分析模組14產生並發送警示訊號。於實務中,當特權帳號清單包含第二特權帳號,但是伺服器列表不包含第二特權帳號時,也就是說,目
標伺服器11A中的第二特權帳號不為原有的而係新增的。然而,申請訊息中包含了目標伺服器11A的特權帳號申請紀錄。因此,特權帳號管理人員可根據監控分析模組14所產生並發送的警示訊息尋找申用目標伺服器11A的特權帳號的企業人員,進而判斷第二特權帳號建立的合法性。因此,特權帳號管理系統1可藉由多個資料來源進行交叉比對,進而提升企業資料安全。
Furthermore, the monitoring and
請繼續參考圖2。本具體實施例的特權帳號管理系統1進一步包含顯示模組15耦接監控分析模組14。顯示模組15用以接收並顯示監控分析模組14所發送的警示訊號。於實務中,警示訊號可為文字、圖像及聲音等,並且顯示模組15可為電腦螢幕、手機螢幕及可用以顯示的裝置。而監控分析模組14也可將未授權帳號、異常帳號數量顯示於顯示模組15,因此,特權帳號管理人員可透過顯示模組15所顯示的警示訊號進行後續的資安防護作業,以提升資料安全。
Please continue to refer to Figure 2. The privileged
請參考圖3,圖3係繪示根據本創作之又一具體實施例之特權帳號管理系統1的功能方塊圖。本具體實施例與先前具體實施例的不同之處係在於本具體實施例的特權帳號管理系統1中的收發模組161、監控分析模組162以及儲存模組163整合於伺服器16中。於實務中,伺服器16可為由特權帳號管理人員所管理的電腦主機。因此,特權帳號的建立、儲存及收發皆可集中管理,以提升資料安全。請注意,本具體實施例的收發模組161、監控分析模組162以及儲存模組163的功能與前述的具體實施例的收發模組、監控分析模組以及儲存模組的功能大致相同,於此不再贅述。請參考圖4,圖4係繪示根據本創作之又一具體實施例之特權帳號管理系統1的功能方塊圖。在本具體實施例中,特權帳號管理系統中的收發模組261、監控分
析模組262、儲存模組263以及顯示模組264整合於伺服器26中。請注意,本具體實施例的收發模組261、監控分析模組262、儲存模組263及顯示模組264的功能與前述的具體實施例的收發模組、監控分析模組、儲存模組及顯示模組的功能大致相同,於此不再贅述。
Please refer to FIG. 3, which is a functional block diagram of the privileged
綜上所述,本創作之特權帳號管理系統可根據多種資料源交叉比對以準確地判斷未授權的特權帳號,進而提升資料安全。並且可藉由整合式的管理器取得各伺服器的特權帳號資料,而不需在各伺服器安裝其他相關整合軟體,進而降低成本並提高伺服器效能。 To sum up, the privileged account management system of this creation can accurately determine unauthorized privileged accounts based on cross-comparison of multiple data sources, thereby enhancing data security. And the privileged account data of each server can be obtained through the integrated manager, without installing other related integrated software on each server, thereby reducing costs and improving server performance.
藉由以上較佳具體實施例之詳述,係希望能更加清楚描述本創作之特徵與精神,而並非以上述所揭露的較佳具體實施例來對本創作之範疇加以限制。相反地,其目的是希望能涵蓋各種改變及具相等性的安排於本創作所欲申請之專利範圍的範疇內。因此,本創作所申請之專利範圍的範疇應根據上述的說明作最寬廣的解釋,以致使其涵蓋所有可能的改變以及具相等性的安排。 Based on the above detailed description of the preferred embodiments, it is hoped that the characteristics and spirit of the creation can be described more clearly, and the scope of the creation is not limited by the preferred embodiments disclosed above. On the contrary, its purpose is to cover various changes and equivalent arrangements within the scope of the patent application for this creation. Therefore, the scope of the patent application for this creation should be interpreted in the broadest sense based on the above description, so that it covers all possible changes and equivalent arrangements.
1:特權帳號管理系統 1: Privileged account management system
11A、11B:目標伺服器 11A, 11B: target server
13:資料管理模組 13: Data management module
14:監控分析模組 14: Monitoring analysis module
17:儲存模組 17: Storage module
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW109203649U TWM599062U (en) | 2020-03-30 | 2020-03-30 | Privileged account management system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW109203649U TWM599062U (en) | 2020-03-30 | 2020-03-30 | Privileged account management system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TWM599062U true TWM599062U (en) | 2020-07-21 |
Family
ID=72601710
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW109203649U TWM599062U (en) | 2020-03-30 | 2020-03-30 | Privileged account management system |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWM599062U (en) |
-
2020
- 2020-03-30 TW TW109203649U patent/TWM599062U/en unknown
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12113831B2 (en) | Privilege assurance of enterprise computer network environments using lateral movement detection and prevention | |
| Cheng et al. | Enterprise data breach: causes, challenges, prevention, and future directions | |
| Saxena et al. | Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution | |
| US9516062B2 (en) | System and method for determining and using local reputations of users and hosts to protect information in a network environment | |
| US9348984B2 (en) | Method and system for protecting confidential information | |
| US7421491B2 (en) | Method and system for monitoring individual devices in networked environments | |
| US9008617B2 (en) | Layered graphical event mapping | |
| CN107154939B (en) | Method and system for tracking data | |
| Malecki | Best practices for preventing and recovering from a ransomware attack | |
| JP2016521388A (en) | Techniques for predicting and protecting spear phishing targets | |
| US12032694B2 (en) | Autonomous machine learning methods for detecting and thwarting ransomware attacks | |
| US20180077190A1 (en) | Cloud-based threat observation system and methods of use | |
| TWI758705B (en) | Intellectual anti-hacking and privilege governance system | |
| WO2024258881A1 (en) | Dynamic authentication revocation utilizing privilege assurance | |
| Kurpjuhn | The guide to ransomware: how businesses can manage the evolving threat | |
| Sujeetha et al. | Cyber-space and its menaces | |
| Siddesh et al. | Orchestrating data integrity through remote auditing and compliance assurance | |
| KR101044291B1 (en) | Real-time web page forgery detection and recovery system | |
| Data | Georgia | |
| TWM599062U (en) | Privileged account management system | |
| Lin | System security threats and controls | |
| Iordache | Database–Web Interface Vulnerabilities | |
| Malecki | Optimising storage processes to reduce the risk of ransomware | |
| Gyabi et al. | Data Security in Rural Banking Sector: A Case Study in Ashanti Region | |
| Aldhizer III et al. | Mitigating the growing threat to sensitive data: 21st century mobile devices |