WO2022118433A1 - アドレス管理装置、アドレス管理システム、アドレス管理方法及びプログラム - Google Patents
アドレス管理装置、アドレス管理システム、アドレス管理方法及びプログラム Download PDFInfo
- Publication number
- WO2022118433A1 WO2022118433A1 PCT/JP2020/045065 JP2020045065W WO2022118433A1 WO 2022118433 A1 WO2022118433 A1 WO 2022118433A1 JP 2020045065 W JP2020045065 W JP 2020045065W WO 2022118433 A1 WO2022118433 A1 WO 2022118433A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security inspection
- address
- information
- address management
- inspection execution
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims description 157
- 238000007689 inspection Methods 0.000 claims abstract description 315
- 238000012545 processing Methods 0.000 claims abstract description 94
- 230000004044 response Effects 0.000 claims abstract description 40
- 238000012544 monitoring process Methods 0.000 claims description 51
- 230000005540 biological transmission Effects 0.000 claims description 25
- 230000008859 change Effects 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 26
- 238000000034 method Methods 0.000 description 18
- 230000035515 penetration Effects 0.000 description 17
- 238000012360 testing method Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 238000011835 investigation Methods 0.000 description 3
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Definitions
- the present invention relates to an address management device, an address management system, an address management method, and a program that manages address information related to one or more security inspection execution terminals that access the security inspection target system for security inspection.
- a service is provided to inspect the security of a system consisting of software and hardware. For example, by using such a service, a company can grasp the security flaws and vulnerabilities of the system owned by the company (for example, a web system that executes data processing in response to access from a terminal). can. Then, the company can take security measures based on the grasped information and the like.
- Penetration test is one of the security inspection methods mentioned above. Penetration testing examines the vulnerabilities hidden in the system to be inspected, the robustness of the system to be inspected, and the degree thereof by accessing the system to be inspected for investigation, intrusion, and cyber attacks via the Internet. You can check.
- the inspector (pen tester) who performs the penetration test informs the inspection requester of the IP (Internet Protocol) address of the inspection terminal and information on his / her identity before the start of the security inspection. This is to distinguish between performing penetration tests during the inspection period and real cyber attacks.
- the following work is required to perform a security inspection via the Internet. Specifically, if a rule for denying a predetermined access is set by a firewall or the like provided in the system to be inspected, a sufficient penetration test cannot be performed on the system to be inspected inside the firewall. Therefore, during the security inspection period by the penetration test, work for permitting the passage of access from the inspection execution terminal may be required.
- Patent Document 1 in order to prevent spoofing and unintentional invitation of a third party, the authorization system acquires and verifies the terminal information with the signature of the person, and releases the smart lock when the authentication is possible. It describes what to do.
- the address information of the inspection execution terminal will be changed.
- the address of the terminal for executing the security inspection may change over time.
- An object of the present invention is an address capable of realizing an environment for executing a security inspection by appropriately ensuring the authenticity of the security inspection execution terminal even if the address information of the security inspection execution terminal is changed.
- the purpose is to provide a management device, an address management system, an address management method and a program.
- the address management device includes an acquisition unit that acquires address information about one or more security inspection execution terminals that access the security inspection target system for security inspection, and the security inspection target.
- the network node In response to a request from a network node that manages the system, the network node is provided with a public processing unit that discloses address information regarding one or more security inspection execution terminals.
- the address management system is one or more that access the security inspection target system, the network node that manages the security inspection target system, and the security inspection target system for security inspection.
- the security inspection execution terminal is provided with an address management device that manages address information related to the above-mentioned one or more security inspection execution terminals, and the above-mentioned address management device obtains address information related to the above-mentioned one or more security inspection execution terminals. It has an acquisition unit for acquisition and a public processing unit that discloses address information regarding one or more security inspection execution terminals to the network node in response to a request from the network node.
- the address management method is to acquire address information about one or more security inspection execution terminals that access the security inspection target system for security inspection, and the security inspection target system.
- the network node In response to a request from the network node that manages the above, the network node is provided with the disclosure of the address information related to the one or more security inspection execution terminals.
- the program acquires address information about one or more security inspection execution terminals that access the security inspection target system for security inspection, and manages the security inspection target system.
- the computer is made to disclose the address information related to the above-mentioned one or more security inspection execution terminals to the above-mentioned network node.
- FIG. 1 is an explanatory diagram showing an example of the configuration of the address management system 1 applied to the embodiment of the present disclosure.
- FIG. 2 is a block diagram showing an example of the configuration of the address management device 100.
- FIG. 3 is a diagram showing an example of the configuration of information elements included in the pen tester information 300.
- FIG. 4 is a diagram showing an example of the configuration of the pen tester registration information 400 regarding the pen tester information stored by the storage unit 120.
- FIG. 5 is a diagram showing an example of the configuration of the pen tester registration information 500 including the approval result as an information element.
- FIG. 6 is a block diagram showing an example of a specific configuration of the monitoring unit 135.
- FIG. 7 is an explanatory diagram for explaining the overall processing flow of the address management system 1 when the connectability of the address information is valid.
- FIG. 8 is an explanatory diagram for explaining the overall processing flow of the address management system 1 when the connectability of the address information is invalid.
- FIG. 9 is a block diagram showing an example of a schematic configuration of the address management device 100 according to the modified example.
- FIG. 10 is an explanatory diagram for explaining a specific example of communication permission information when the security device 22 operates as a firewall.
- FIG. 11 is an explanatory diagram for explaining the flow of processing related to the control information transmission processing unit 141.
- FIG. 12 is a block diagram showing an example of a schematic configuration of the address management device 100 according to the second embodiment.
- a service for inspecting the security of a system composed of software and hardware is provided. For example, by using such a service, a company can grasp the security flaws and vulnerabilities of the system owned by the company (for example, a web system that executes data processing in response to access from a terminal). can. Then, the company can take security measures based on the grasped information and the like.
- Penetration test is one of the security inspection methods mentioned above. Penetration testing examines the vulnerabilities hidden in the system to be inspected, the robustness of the system to be inspected, and the degree thereof by accessing the system to be inspected for investigation, intrusion, and cyber attacks via the Internet. You can check.
- the inspector (pen tester) who performs the penetration test informs the inspection requester of the IP (Internet Protocol) address of the inspection terminal and information on his / her identity before the start of the security inspection. This is to distinguish between performing penetration tests during the inspection period and real cyber attacks.
- the following work is required to perform a security inspection via the Internet. Specifically, if a rule for denying a predetermined access is set by a firewall or the like provided in the system to be inspected, a sufficient penetration test cannot be performed on the system to be inspected inside the firewall. Therefore, during the security inspection period by the penetration test, work for permitting the passage of access from the inspection execution terminal may be required.
- the address information of the inspection execution terminal will be changed.
- the address of the terminal for executing the security inspection may change over time.
- the purpose of this embodiment is to realize an environment for executing security inspection by appropriately ensuring the authenticity of the security inspection execution terminal even if the address information of the security inspection execution terminal is changed. do.
- the address information of one or more security inspection execution terminals that access the security inspection target system for security inspection is acquired, and the security inspection target system is managed.
- the address information regarding one or more security inspection execution terminals is disclosed to the network node.
- FIG. 1 is an explanatory diagram showing an example of the configuration of the address management system 1 applied to the embodiment of the present disclosure.
- the address management system 1 includes an address management device 100, a security inspection target system 20, a network node 21, a security device 22, and three security inspection execution terminals 30a, 30b, and 30c (security when collectively referred to). It is referred to as an inspection execution terminal 30).
- the number of security inspection execution terminals 30 is not limited to the example shown in FIG.
- the security inspection target system 20 is an inspection target system composed of at least one of software and hardware. More specifically, the security inspection target system 20 is a web composed of software resources and / or hardware resources for executing data storage and processing in response to access from, for example, a security inspection execution terminal 30. It is a system.
- the address management system 1 accesses the security inspection target system 20 for investigation, intrusion, cyber attack, and the like. Such access is performed by the security inspection execution terminal 30 via the Internet 2.
- the address management device 100 manages the address information related to the security inspection execution terminal 30, specifically, as will be described later.
- the network node 21 is a node that manages the security inspection target system 20 according to the operation input of the inspection requester.
- the security device 22 functions as a firewall for preventing access such as a cyber attack to the security inspection target system 20.
- the security device 22 is, for example, a device having a security function or a general-purpose computer that implements software having the security function.
- the security device 22 may be an IPS / IDS (Intrusion Prevention System / Intrusion Detection System), a WAF (Web Application Firewall), or a UTM (Unified Threat Management).
- FIG. 2 is a block diagram showing an example of the configuration of the address management device 100.
- the address management device 100 includes a network communication unit 110, a storage unit 120, and a processing unit 130.
- the network communication unit 110 receives a signal from the network and transmits the signal to the network.
- Storage unit 120 The storage unit 120 temporarily or permanently stores programs (instructions) and parameters for the operation of the address management device 100, as well as various data.
- the program includes one or more instructions for the operation of the address management device 100.
- Processing unit 130 provides various functions of the address management device 100.
- the processing unit 130 includes an acquisition unit 131, a public processing unit 133, a monitoring unit 135, a request unit 137, and an approval unit 139.
- the processing unit 130 may further include other components other than these components. That is, the processing unit 130 can perform operations other than the operations of these components.
- the specific operations of the acquisition unit 131, the public processing unit 133, the monitoring unit 135, the request unit 137, and the approval unit 139 will be described in detail later.
- the network communication unit 110 may be mounted by a network adapter and / or a network interface card or the like.
- the storage unit 120 may be mounted by a memory (for example, a non-volatile memory and / or a volatile memory) and / or a hard disk.
- the processing unit 130 may be implemented by one or more processors.
- the acquisition unit 131, the disclosure processing unit 133, the monitoring unit 135, the request unit 137, and the approval unit 139 may be implemented by the same processor or may be separately implemented by different processors.
- the memory (storage unit 120) may be contained in the one or more processors, or may be outside the one or more processors.
- the address management device 100 may include a memory for storing a program (instruction) and one or more processors capable of executing the program (instruction).
- the one or more processors execute the above program to perform the operation of the processing unit 130 (operation of the acquisition unit 131, the public processing unit 133, the monitoring unit 135, the request unit 137, and / or the approval unit 139). May be good.
- the above program may be a program for causing the processor to execute the operation of the processing unit 130 (the operation of the acquisition unit 131, the public processing unit 133, the monitoring unit 135, the request unit 137, and / or the approval unit 139).
- the address management device 100 acquires the address information related to the security inspection execution terminal 30 that accesses the security inspection target system 20 for security inspection. Further, the address management device 100 (public processing unit 133) discloses the address information regarding the security inspection execution terminal 30 to the network node 21 in response to the request from the network node 21.
- the address information regarding the security inspection execution terminal 30 is specifically an IP (Internet Protocol) address used by the security inspection execution terminal 30 to access the Internet, and a MAC (Media) for identifying a network interface. Access Control) Address, etc.
- IP Internet Protocol
- MAC Media
- the address information such as the IP address of the corresponding security inspection execution terminal 30 is disclosed to the network node 21 in response to the request from the network node 21, so that the security inspection execution terminal Even if the address information of the 30 is changed, it is possible to realize an environment for executing the security inspection by appropriately ensuring the authenticity of the security inspection execution terminal 30.
- the above address information is used as one information element in the pen tester information regarding the pen tester who is the user of the security inspection execution terminal 30, for example, from the security inspection execution terminal 30 to the address management device 100. Will be sent to.
- the pen tester information includes a plurality of information elements as follows.
- FIG. 3 is a diagram showing an example of the configuration of information elements included in the pen tester information 300.
- the pen tester information 300 includes a name, a company name, an organization name, an email address, an IP address, a MAC address, an ID card image (business card, license, face photo attached to a personal number card, etc.). Includes biometric information (face feature data, fingerprint data, iris data, etc.).
- the address management device 100 (acquisition unit 131) registers the pen tester information by storing the pen tester information acquired from the security inspection execution terminal 30 in the storage unit 120.
- FIG. 4 is a diagram showing an example of the configuration of the pen tester registration information 400 regarding the pen tester information stored by the storage unit 120.
- the pen tester registration information 400 includes the pen tester information 300, the registration date and time of the pen tester information 300, and the update date and time of the address information (for example, IP address and MAC address) included in the pen tester information 300. include.
- the update of the address information will be described later.
- the address management device 100 (acquisition unit 131) stores the pen tester registration information 400 in the storage unit 120
- the pen tester information included in the pen tester registration information 400 (for example, the pen tester information 300 shown in FIG. 3). ) May be generated for accessing a web page displayed on a web browser (two-dimensional code information indicating a URL).
- the code information corresponds to the identification information for identifying the address information of the corresponding security inspection execution terminal 30.
- the address management device 100 (public processing unit 133) refers to the pen tester registration information 400 stored in the storage unit 120, and various information related to the pen tester (for example, the pen tester information shown in FIG. 3). 300) is disclosed to the inspection requester side (network node 21).
- the method of publishing may be any mechanism such as a web page in a website.
- the code information for accessing the web page displaying the pen tester information 300 on the web browser is generated as described above, the code information is on the web page associated with the code information.
- the pen tester information 300 will be released to the public.
- the above-mentioned code information is notified to the inspection requester, for example, as follows.
- the code information generated by the address management device 100 acquisition unit 131 is notified to the security inspection execution terminal 30 by e-mail or the like using the email address of the corresponding security inspection execution terminal 30.
- the security inspection execution terminal 30 notifies the network node 21 of the code information corresponding to the identification information for identifying the corresponding address information in response to the operation by the pen tester. This allows the inspection requester to receive the code information.
- the network node 21 accesses a predetermined web page using the code information in response to the operation by the inspection requester, and the corresponding security inspection execution terminal 30.
- the pen tester information 300 of is displayed.
- the network node 21 acquires the address information disclosed by the public processing unit 133 of the address management device 100 by making a request using the identification information corresponding to the code information.
- the address management device 100 (approval unit 139) approves the access for security inspection by the corresponding security inspection execution terminal 30 based on the notification information from the network node 21.
- the process related to approval is performed in the following flow.
- This notification information includes information elements indicating approval or denial.
- the notification information is notified from the network node 21 to the address management device 100, for example, by e-mail. Further, the public processing unit 133 may generate code information for approval notification. In this case, the network node 21 is accessed to the web page according to the code information, so that the corresponding security inspection execution terminal 30 is used. Approval may be given.
- the address management device 100 When the address management device 100 (approval unit 139) receives the notification information from the network node 21, the address management device 100 registers the information element as an information element in the pen tester registration information 400 stored in the storage unit 120.
- FIG. 5 is a diagram showing an example of the configuration of the pen tester registration information 500 including the approval result as an information element. With reference to FIG. 5, it is recognized that the access for the security inspection by the corresponding security inspection execution terminal 30 is approved or denied according to the notification information.
- the address management device 100 sends information indicating that the approval result is denial by e-mail to the security inspection execution terminal 30 (pen tester). Communicate to. Not limited to such a transmission method, code information for accessing a web page displaying an approval result may be transmitted to a security inspection execution terminal 30 (pen tester).
- the process related to approval by the address management device 100 is not limited to the above-mentioned process, and various modifications can be made.
- the approval is not limited to the case where the approval is performed based on the notification information from the network node 21, and the approval may be performed based on the history information regarding the security inspection execution terminal 30, for example.
- the security inspection execution terminal 30 has been authorized to access the inspection target system other than the security inspection target system 20 for security inspection in the past, the number of times, the frequency, and the like satisfy the predetermined conditions.
- the access for security inspection by the corresponding security inspection execution terminal 30 may be approved regardless of the notification information from the network node 21.
- the address management device 100 (monitoring unit 135) responds when, for example, the approval unit 139 approves the access for security inspection by the corresponding security inspection execution terminal 30.
- the connectivity of the address information related to the security inspection execution terminal 30 is monitored.
- the address management device 100 (request unit 137) transmits information for requesting the update of the address information to the security inspection execution terminal 30 based on the connection possibility of the address information.
- the monitoring means 150 periodically confirms the connection possibility by using, for example, a ping command for the IP address included in the pen tester registration information stored in the storage unit 120.
- FIG. 6 is a block diagram showing an example of a specific configuration of the monitoring unit 135.
- the monitoring unit 135 includes a transmission processing unit 1351, a reception processing unit 1353, and a determination processing unit 1355.
- the transmission processing unit 1351 transmits an echo request message for monitoring the connection possibility of the address information (IP address) to the security inspection execution terminal 30 corresponding to the address information.
- IP address connection possibility of the address information
- the reception processing unit 1353 receives an echo response message for the echo request message from the corresponding security inspection execution terminal 30.
- the reception processing unit 1353 does not receive the echo response message for the echo request message from the corresponding security check execution terminal 30.
- the judgment processing unit 1355 determines that the connection possibility of the address information regarding the corresponding security inspection execution terminal 30 is valid or invalid based on the reception status of the echo request message. For example, when the echo request message is received within a predetermined time, it is determined that the connection possibility of the address information regarding the corresponding security inspection execution terminal 30 is valid. On the other hand, if the echo request message cannot be received within a predetermined time, it is determined that the connection possibility of the address information regarding the corresponding security inspection execution terminal 30 is invalid.
- Monitoring of connectivity based on the Ping command as described above is performed, for example, every hour.
- the interval of such monitoring is not limited to one hour, and may be any time according to the request from the inspection requester of the security inspection target system 20. Further, the interval of monitoring is not limited to the predetermined interval as described above, and the interval of monitoring may be arbitrarily changed.
- the monitoring unit 135 sets the transmission frequency of the echo request message to the corresponding security inspection execution terminal 30 based on the update history of the address information related to the corresponding security inspection execution terminal 30. Specifically, if the update frequency of the address information related to the security inspection execution terminal 30 is low, it is assumed that it is unlikely that the address information will be updated in the future, and the echo request message to the corresponding security inspection execution terminal 30 is sent. Make the transmission interval longer. On the other hand, if the update frequency of the address information related to the security inspection execution terminal 30 is high, it is assumed that there is a high possibility that the address information will be updated in the future, and the interval at which the echo request message is transmitted to the corresponding security inspection execution terminal 30. To be shorter.
- the monitoring unit 135 sends the corresponding security inspection execution terminal 30 to the corresponding security inspection execution terminal 30 based on whether or not the address information regarding the corresponding security inspection execution terminal 30 is the address information managed by the gateway server of the mobile communication carrier. You may set the transmission frequency of the echo request message of. For example, when the address information related to the corresponding security inspection execution terminal 30 is the address information managed by the gateway server of the mobile communication carrier, the corresponding security inspection execution terminal 30 is compared to the case where it is not. Echo Request messages are sent at shorter intervals.
- the address management device 100 (monitoring unit 135) completes the process. After that, the address management device 100 (monitoring unit 135) repeats executing the ping command again one hour later.
- the address management device 100 (monitoring unit 135) notifies the requesting unit 137 of information indicating that the IP address has been changed.
- monitoring of address information is not limited to monitoring using the Ping command.
- agent software capable of executing synchronization processing with the address management device 100 may be installed in advance in the security inspection execution terminal 30. Then, the agent software may operate so as to poll the address management device 100 for information on the connectivity possibility that can be monitored by the Ping command.
- the address management device 100 (request unit 137) has a change in the IP address when the connection possibility of the address information (IP address) regarding the corresponding security inspection execution terminal 30 is invalid. If so, the update request information for requesting the update of the address information is transmitted to the corresponding security inspection execution terminal 30.
- the update request information is included in the notification e-mail addressed to the e-mail address included in the pen tester information registered for the corresponding security inspection execution terminal 30.
- the security inspection execution terminal 30 (pen tester) requests the update of the IP address by accessing the address management device 100 according to the notification mail.
- the security inspection execution terminal 30 (pen tester) transmits information for requesting the update of the address information to the address management device 100 based on the update request information.
- the security inspection execution terminal 30 may further send information indicating the continuation of the inspection or the end of the inspection to the address management device 100 by replying to the notification mail. Further, the notification mail may include code information for accessing a web page for updating the IP address managed by the address management device 100. In this case, the security inspection execution terminal 30 can request the address management device 100 to update the IP address by accessing the web page according to the code information.
- the address management device 100 (acquisition unit 131) responds to the information for requesting the update of the IP address from the security inspection execution terminal 30, and the address information (for example, IP address, MAC) regarding the corresponding security inspection execution terminal. Address etc.) is updated. Specifically, the address management device 100 (acquisition unit 131) updates the update date and time, the IP address, the MAC address, and the like among the information elements included in the pen tester registration information stored in the storage unit 120.
- the address management device 100 may further monitor the image information related to the security inspection performed by the security inspection execution terminal 30.
- the address management device 100 public processing unit 133 discloses the image information related to the security inspection to the network node 21 in response to the request from the network node 21.
- the address management device 100 uses, for example, data of a pen tester's face image and a display monitor image captured by a Web camera provided in the security inspection execution terminal 30 as a security inspection execution terminal. Received from 30 and stores the received image data in the storage unit 120.
- the address management device 100 (public processing unit 133) publishes the image data stored in the storage unit 120 on the website in response to a request from the network node 21.
- the inspection requester can confirm the image related to the security inspection by the pen tester by accessing the address management device 100 using the network node 21.
- FIG. 7 is an explanatory diagram for explaining the overall processing flow of the address management system 1 when the connectability of the address information is valid.
- step ST701 the security inspection execution terminal 30 creates pen tester information and transmits the created pen tester information to the address management device 100 (acquisition unit 131).
- step ST703 the address management device 100 (acquisition unit 131) accesses the corresponding registration date / time information and code information (accesses the pen tester information) based on the pen tester information acquired from the security inspection execution terminal 30. Code information for). Further, the pen tester information and the registration date / time information are sent to the storage unit 120. Further, the code information is disclosed to the network node 21 (inspection requester) by the disclosure processing unit 133.
- step ST705 the address management device 100 (storage unit 120) stores the pen tester registration information. Further, the pen tester information included in the pen tester registration information is sent to the public processing unit 133.
- the address management device 100 (public processing unit 133) publishes the pen tester information on the Web page shown in the code information. Further, the network node 21 (inspection requester) refers to the pen tester information by accessing the Web page using the code information. Further, the network node 21 (inspection requester) transmits the approval notification information regarding the access for the security inspection by the pen tester information 300 of the corresponding security inspection execution terminal 30 to the address management device 100 (approval unit 139). ..
- the address management device 100 (approval unit 139) registers the approval notification information received from the network node 21. Specifically, the information indicating approval or denial is stored in the storage unit 120 as an information element included in the corresponding pen tester registration information. After that, the address management device 100 (approval unit 139) transmits the code information for accessing the web page displaying the approval result to the corresponding security inspection execution terminal 30. The address management device 100 (approval unit 139) requests the monitoring unit 135 to monitor the corresponding security inspection execution terminal 30.
- step ST711 the security inspection execution terminal 30 displays the approval result using the code information transmitted from the address management device 100. This allows the pen tester to confirm the approval result.
- the address management device 100 monitors the connection possibility of the address information of the security inspection execution terminal 30 to be monitored by executing the Ping command. Specifically, the address management device 100 (monitoring unit 135) transmits an echo request message to the security inspection execution terminal 30, and receives an echo response message from the security inspection execution terminal 30. In this way, the address management device 100 can detect that the connection possibility of the address information of the security inspection execution terminal 30 is valid.
- FIG. 8 is an explanatory diagram for explaining the overall processing flow of the address management system 1 when the connectability of the address information is invalid.
- steps ST801 to ST811 is the same as the processing of steps ST701 to S712 shown in FIG. 7 described above, and thus the description thereof will be omitted.
- the address management device 100 monitors the connection possibility of the address information of the security inspection execution terminal 30 to be monitored by executing the Ping command. Specifically, the address management device 100 (monitoring unit 135) transmits an echo request message to the security inspection execution terminal 30.
- the monitoring unit 135 may connect the address information. It is judged to be invalid.
- step ST815 the address management device 100 (request unit 137) transmits the update request information for requesting the update of the address information (IP address) to the security inspection execution terminal 30.
- the information for requesting the update of the address information is transmitted from the security inspection execution terminal 30 to the address management device 100 in response to the update request information.
- the address management device 100 (acquisition unit 131) responds to the information for requesting the update of the IP address from the security inspection execution terminal 30, and the address information regarding the corresponding security inspection execution terminal.
- Update IP address, MAC address, etc.
- the update date and time, the IP address, the MAC address, and the like are updated.
- the address management device 100 stores the pen tester information in the storage unit 120, so that the inspection requester can receive the attribute information of the pen tester. And the address information (IP address) of the security inspection execution terminal 30 used by the pen tester can be inquired.
- the address management device 100 (monitoring unit 135) periodically or irregularly monitors the connection possibility of the address information (IP address) of the security inspection execution terminal 30, so that the registered contents of the storage unit 120 (the registered contents (IP address)) It can be guaranteed that there is no change in the pen tester registration information).
- the address management device 100 (request unit 137) sends the update request information to the security inspection execution terminal 30. By sending, it is possible to prompt the pen tester to update the registration information.
- the network node 21 (inspection requester) is the authenticity of the pen tester that operates the security inspection execution terminal 30.
- the sex can be easily confirmed.
- FIG. 9 is a block diagram showing an example of a schematic configuration of the address management device 100 according to the modified example.
- the address management device 100 transmits control information transmission processing for transmitting control information for access for security inspection to a network node (security device 22) that controls access to the security inspection target system 20.
- a unit 141 may be further provided.
- the processing related to the control information transmission processing unit 141 will be described.
- control information transmission processing unit 141 when the control information transmission processing unit 141 is approved by the approval unit 139 for access for security inspection by the security inspection execution terminal 30, communication permission information for the IP address and MAC address, which are the corresponding address information, is obtained. Is generated as control information. This communication permission information is sent from the control information transmission processing unit 141 to the security device 22.
- FIG. 10 is an explanatory diagram for explaining a specific example of communication permission information when the security device 22 operates as a firewall.
- the control information transmission processing unit 141 refers to the pen tester registration information 400 stored in the storage unit 120, and communicates the access control list 1020 for the corresponding security inspection execution terminal 30. Generated as permission information.
- the access control list 1020 of the example shown in FIG. 10 shows that a packet having a source IP address of 12.34.56.78 and a destination IP address of [inspection target IP / 24] is permitted.
- the control information transmission processing unit 141 waits until the update registration of the IP address in the pen tester information is completed. After that, the control information transmission processing unit 141 generates an access control list again in response to the completion of the update registration, and transmits the access control list to the security device 22. Information for requesting approval for generating an access control list may be transmitted to the network node 21. In this case, when the address management device 100 receives information from the network node 21 for requesting approval for generating an access control list with the consent of the inspection requester, the control information transmission processing unit 141 newly controls the access. Create a list.
- FIG. 11 is an explanatory diagram for explaining the flow of processing related to the control information transmission processing unit 141.
- the address management device 100 (approval unit 139) registers the approval notification information received from the network node 21. After that, the address management device 100 (approval unit 139) transmits information indicating the approval result to the control information transmission processing unit 141.
- the address management device 100 (control information transmission processing unit 141) generates an access control list for the approved security inspection execution terminal 30. The generated access control list is notified to the security device 22.
- step ST1105 the security device 22 registers an access control list and performs access control based on the access control list. After that, the process shown in FIG. 11 is terminated.
- the address management device 100 (control information transmission processing unit 141) obtains an access control list used by the security device 22 that operates a firewall or the like according to the approval result by the approval unit 139. It can be dynamically generated. As a result, the address management device 100 can automatically register the access control list in the security device 22 regardless of the operation input by the inspection requester or the operator.
- the modification it is not necessary to instruct the operator to register a rule for passing the firewall for the inspection at the time of the security inspection by the penetration tester (security inspection execution terminal 30). In this way, according to the modification, it is possible to reduce the workload of the operator and the like and provide an environment for executing the penetration test more efficiently.
- FIG. 12 is a block diagram showing an example of a schematic configuration of the address management device 100 according to the second embodiment.
- the address management device 100 includes an acquisition unit 151 and a public processing unit 153.
- the acquisition unit 151 and the public processing unit 153 may be implemented by one or more processors, a memory (for example, a non-volatile memory and / or a volatile memory), and / or a hard disk.
- the acquisition unit 151 and the public processing unit 153 may be implemented by the same processor, or may be separately implemented by different processors.
- the memory may be contained in the one or more processors, or may be outside the one or more processors.
- the address management device 100 is one or more security inspection execution terminals that access the security inspection target system (for example, the security inspection target system 20) for security inspection.
- the address information about the security inspection execution terminal 30 is acquired.
- the address management device 100 public processing unit 153) responds to a request from a network node (for example, network node 21) that manages the security inspection target system (for example, security inspection target system 20), and the network node (for example).
- a network node for example, network node 21
- the security inspection execution terminals for example, the security inspection execution terminal 30
- the network node 21 for example, the address information related to the above-mentioned one or more security inspection execution terminals (for example, the security inspection execution terminal 30) is disclosed to the network node 21).
- the acquisition unit 151 and the public processing unit 153 included in the address management device 100 according to the second embodiment have the address management device 100 according to the first embodiment, respectively.
- the acquisition unit 131 and the public processing unit 153 may be operated.
- the description of the first embodiment may also be applied to the second embodiment.
- the second embodiment is not limited to this example.
- the second embodiment has been described above. According to the second embodiment, even if the address information of the security inspection execution terminal is changed, it is possible to provide an environment for appropriately ensuring the authenticity of the security inspection execution terminal and executing the security inspection. It will be possible.
- the steps in the process described herein do not necessarily have to be performed in chronological order in the order described in the sequence diagram.
- the steps in the process may be executed in a different order from the order described in the sequence diagram, or may be executed in parallel.
- some of the steps in the process may be deleted, and additional steps may be added to the process.
- one of a plurality of devices (or units) constituting the address management device described in the present specification for example, an acquisition unit and / or a public processing unit.
- One or more devices (or units), or modules for one of the plurality of devices (or units) described above) may be provided.
- a method including the processing of the above-mentioned components may be provided, and a program for causing the processor to execute the processing of the above-mentioned components may be provided.
- a non-transitory computer readable medium may be provided to the computer on which the program is recorded.
- such devices, modules, methods, programs, and computer-readable non-temporary recording media are also included in the invention.
- Appendix 1 An acquisition unit that acquires address information about one or more security inspection execution terminals that access the security inspection target system for security inspection, and A public processing unit that discloses address information about one or more security inspection execution terminals to the network node in response to a request from the network node that manages the security inspection target system. Address management device.
- Appendix 2 A monitoring unit that monitors the connectivity of the address information, The address management device according to Appendix 1, further comprising a requesting unit for transmitting information for requesting update of the address information to the one or more security inspection execution terminals based on the connectability of the address information. ..
- the monitoring unit A transmission processing unit that sends an echo request message for monitoring the connectivity of the address information to the corresponding security inspection execution terminal, and A reception processing unit that receives an echo response message to the echo request message from the corresponding security inspection execution terminal.
- the address management device further comprising a determination processing unit for determining whether the connection possibility of the address information regarding the corresponding security inspection execution terminal is valid or invalid based on the reception status of the echo request message.
- Appendix 4 The address management device according to Appendix 3, wherein the monitoring unit sets the frequency of sending an echo request message to the corresponding security inspection execution terminal based on the update history of the address information related to the corresponding security inspection execution terminal. ..
- the monitoring unit further monitors the image information related to the security inspection performed by the one or more security inspection execution terminals.
- the address management device according to any one of Supplementary note 2 to 5, wherein the disclosure processing unit discloses image information related to the security inspection to the network node in response to a request from the network node.
- Appendix 7 further includes a control information transmission processing unit that transmits control information for access for the security inspection by the corresponding security inspection execution terminal to a network node that controls access to the security inspection target system.
- (Appendix 9) Security inspection target system and The network node that manages the security inspection target system and One or more security inspection execution terminals that access the security inspection target system for security inspection, and It is equipped with an address management device that manages address information related to the one or more security inspection execution terminals.
- the address management device is An acquisition unit that acquires address information related to one or more security inspection execution terminals, and An address management system having a public processing unit that publishes address information about one or more security inspection execution terminals to the network node in response to a request from the network node.
- the one or more security inspection execution terminals notify the network node of the identification information for identifying the corresponding address information.
- the address management device is A monitoring unit that monitors the connectivity of the address information, Based on the connectivity of the address information, a requesting unit for transmitting information for requesting the update of the address information is further provided to one or more security inspection execution terminals.
- the supplementary note 9 or 10 wherein the one or more security inspection execution terminals transmit information for requesting the update of the address information to the address management device based on the information for requesting the update. Address management system.
- Appendix 12 The address management system according to Appendix 11, wherein the acquisition unit of the address management device updates the address information regarding the corresponding security inspection execution terminal in response to the information for requesting the update.
- Appendix 14 Monitoring the connectivity of the address information and The address management method according to Appendix 13, further comprising transmitting information for requesting update of the address information to the one or more security inspection execution terminals based on the connectability of the address information.
- (Appendix 15) Acquiring address information about one or more security inspection execution terminals that access the security inspection target system for security inspection, and In response to a request from the network node that manages the security inspection target system, the address information regarding the one or more security inspection execution terminals is disclosed to the network node.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
1.本発明の実施形態の概要
2.アドレス管理システム1
3.第1の実施形態
3.1.アドレス管理装置100の構成
3.2.動作例
3.3.変形例
4.第2の実施形態
4.1.アドレス管理装置100の構成
4.2.動作例
5.他の実施形態
まず、本発明の実施形態の概要を説明する。
ソフトウェア及びハードウェアなどにより構成されるシステムのセキュリティ検査を行うサービスが提供されている。例えば企業は、このようなサービスを利用することで、当該企業が有するシステム(例えば、端末からのアクセスに応じてデータ処理を実行するウェブシステム)のセキュリティ上の欠陥、脆弱性を把握することができる。そして、当該企業は、把握した情報などに基づいて、セキュリティ上の対策を講じることが可能となる。
本開示の実施形態では、セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末に関するアドレス情報を取得し、上記セキュリティ検査対象システムの管理を行うネットワークノードからの要求に応じて、上記ネットワークノードに、上記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開する。
図1を参照して、本開示の実施形態に適用されるアドレス管理システム1の構成の例を説明する。図1は、本開示の実施形態に適用されるアドレス管理システム1の構成の一例を示す説明図である。図1を参照すると、アドレス管理システム1は、アドレス管理装置100、セキュリティ検査対象システム20、ネットワークノード21、セキュリティ装置22、及び3つのセキュリティ検査実行用端末30a、30b、30c(総称した場合にセキュリティ検査実行用端末30と呼ぶ。)を含む。なお、セキュリティ検査実行用端末30の数は、図1に示す例に限らない。
続いて、図2~図11を参照して、第1の実施形態を説明する。
図2を参照して、第1の実施形態に係るアドレス管理装置100の構成の例を説明する。図2は、アドレス管理装置100の構成の例を示すブロック図である。図2を参照すると、アドレス管理装置100は、ネットワーク通信部110、記憶部120、及び処理部130を備える。
ネットワーク通信部110は、ネットワークから信号を受信し、ネットワークへ信号を送信する。
記憶部120は、アドレス管理装置100の動作のためのプログラム(命令)及びパラメータ、並びに様々なデータを、一時的に又は恒久的に記憶する。当該プログラムは、アドレス管理装置100の動作のための1つ以上の命令を含む。
処理部130は、アドレス管理装置100の様々な機能を提供する。処理部130は、取得部131、公開処理部133、監視部135、依頼部137、及び承認部139を備える。なお、処理部130は、これらの構成要素以外の他の構成要素をさらに含みうる。すなわち、処理部130は、これらの構成要素の動作以外の動作も行いうる。取得部131、公開処理部133、監視部135、依頼部137、及び承認部139の具体的な動作は、後に詳細に説明する。
ネットワーク通信部110は、ネットワークアダプタ並びに/又はネットワークインタフェースカード等により実装されてもよい。記憶部120は、メモリ(例えば、不揮発性メモリ及び/若しくは揮発性メモリ)並びに/又はハードディスク等により実装されてもよい。処理部130は、1つ以上のプロセッサにより実装されてもよい。取得部131、公開処理部133、監視部135、依頼部137、及び承認部139は、同一のプロセッサにより実装されてもよく、別々に異なるプロセッサにより実装されてもよい。上記メモリ(記憶部120)は、上記1つ以上のプロセッサ内に含まれていてもよく、又は、上記1つ以上のプロセッサ外にあってもよい。
次に、第1の実施形態に係る動作例について説明する。
上記アドレス情報は、セキュリティ検査実行用端末30のユーザであるペンテスターに関するペンテスター情報内の一つの情報要素として、例えばセキュリティ検査実行用端末30からアドレス管理装置100に送られる。
アドレス管理装置100(公開処理部133)は、記憶部120に記憶されるペンテスター登録情報400を参照し、ペンテスターに係る各種情報(例えば、図3に示すペンテスター情報300)を検査依頼者側(ネットワークノード21)に公開する。公開する方法は、Webサイト内のWebページなど、どのような仕組みであってもよい。
アドレス管理装置100(承認部139)は、ネットワークノード21からの通知情報に基づいて、対応するセキュリティ検査実行用端末30によるセキュリティ検査のためのアクセスを承認する。
アドレス管理装置100(監視部135)は、例えば承認部139により対応するセキュリティ検査実行用端末30によるセキュリティ検査のためのアクセスが承認された場合に、対応するセキュリティ検査実行用端末30に関するアドレス情報の接続可能性(Connectivity)を監視する。そして、アドレス管理装置100(依頼部137)は、アドレス情報の接続可能性に基づいて、セキュリティ検査実行用端末30に、アドレス情報の更新を依頼するための情報を送信する。
例えば、監視手段150は、記憶部120に記憶されるペンテスター登録情報に含まれるIPアドレスに対して、例えばpingコマンドを用いることにより、接続可能性を定期的に確認する。
アドレス管理装置100(依頼部137)は、対応するセキュリティ検査実行用端末30に関するアドレス情報(IPアドレス)の接続可能性が無効である場合、すなわちIPアドレスに変更があった場合に、対応するセキュリティ検査実行用端末30に、アドレス情報の更新を依頼するための更新依頼情報を送信する。
アドレス管理装置100(監視部135)は、セキュリティ検査実行用端末30により行われるセキュリティ検査に関する画像情報を更に監視してもよい。この場合、アドレス管理装置100(公開処理部133)は、ネットワークノード21からの要求に応じて、ネットワークノード21に、セキュリティ検査に関する画像情報を公開する。
次に、図7及び図8を参照して、第1の実施形態に係るアドレス管理システム1の全体の処理の流れについて説明する。図7は、アドレス情報の接続可能性が有効である場合におけるアドレス管理システム1の全体の処理の流れを説明するための説明図である。
以上のように第1の実施形態によれば、アドレス管理装置100が、ペンテスター情報を記憶部120に記憶することにより、検査依頼者に対して、当該ペンテスターの属性情報、および当該ペンテスターが使用するセキュリティ検査実行用端末30のアドレス情報(IPアドレス)を照会することができる。
次に、変形例に係る第1の実施形態について説明する。図9は、変形例に係るアドレス管理装置100の概略的な構成の例を示すブロック図である。図9を参照すると、アドレス管理装置100は、セキュリティ検査のためのアクセスのための制御情報を、セキュリティ検査対象システム20へのアクセスを制御するネットワークノード(セキュリティ装置22)に送信する制御情報送信処理部141を更に備えてもよい。以下では、制御情報送信処理部141に関連する処理について説明する。
続いて、図12を参照して本発明の第2の実施形態を説明する。上述した第1の実施形態は、具体的な実施形態であるが、第2の実施形態は、より一般化された実施形態である。
図12は、第2の実施形態に係るアドレス管理装置100の概略的な構成の例を示すブロック図である。図12を参照すると、アドレス管理装置100は、取得部151、及び公開処理部153を備える。
第2の実施形態に係る動作例を説明する。
一例として、第2の実施形態に係るアドレス管理装置100が備える取得部151、及び公開処理部153は、それぞれ、第1の実施形態に係るアドレス管理装置100が備える取得部131、及び公開処理部153の動作を行ってもよい。この場合に、第1の実施形態についての説明は、第2の実施形態にも適用されうる。なお、第2の実施形態は、この例に限定されない。
以上、本発明の実施形態を説明したが、本発明はこれらの実施形態に限定されるものではない。これらの実施形態は例示にすぎないということ、及び、本発明のスコープ及び精神から逸脱することなく様々な変形が可能であるということは、当業者に理解されるであろう。
セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末に関するアドレス情報を取得する取得部と、
前記セキュリティ検査対象システムの管理を行うネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開する公開処理部と、
を備えるアドレス管理装置。
前記アドレス情報の接続可能性を監視する監視部と、
前記アドレス情報の接続可能性に基づいて、前記1以上のセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信する依頼部と、を更に備える、付記1記載のアドレス管理装置。
前記監視部は、
前記アドレス情報の接続可能性を監視するためのエコー要求メッセージを、対応するセキュリティ検査実行用端末に送信する送信処理部と、
前記対応するセキュリティ検査実行用端末から、前記エコー要求メッセージに対するエコー応答メッセージを受信する受信処理部と、
前記エコー要求メッセージに関する受信状況に基づいて、前記対応するセキュリティ検査実行用端末に関するアドレス情報の接続可能性が有効又は無効であると判断する判断処理部とを備える、付記2記載のアドレス管理装置。
前記監視部は、前記対応するセキュリティ検査実行用端末に関するアドレス情報の更新履歴に基づいて、前記対応するセキュリティ検査実行用端末へのエコー要求メッセージの送信頻度を設定する、付記3記載のアドレス管理装置。
前記依頼部は、前記対応するセキュリティ検査実行用端末に関する前記アドレス情報の接続可能性が無効である場合に、前記対応するセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信する、付記3又は4記載のアドレス管理装置。
前記監視部は、前記1以上のセキュリティ検査実行用端末により行われるセキュリティ検査に関する画像情報を更に監視し、
前記公開処理部は、前記ネットワークノードからの要求に応じて、前記ネットワークノードに、前記セキュリティ検査に関する画像情報を公開する、付記2乃至5のうち何れか1項記載のアドレス管理装置。
前記ネットワークノードからの通知情報に基づいて、対応するセキュリティ検査実行用端末による前記セキュリティ検査のためのアクセスを承認する承認部を更に備える、付記1乃至6のうち何れか1項記載のアドレス管理装置。
前記対応するセキュリティ検査実行用端末による前記セキュリティ検査のためのアクセスのための制御情報を、前記セキュリティ検査対象システムへのアクセスを制御するネットワークノードに送信する制御情報送信処理部を更に備える、付記7記載のアドレス管理装置。
セキュリティ検査対象システムと、
前記セキュリティ検査対象システムの管理を行うネットワークノードと、
前記セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末と、
前記1以上のセキュリティ検査実行用端末に関するアドレス情報を管理するアドレス管理装置と、を備え、
前記アドレス管理装置は、
前記1以上のセキュリティ検査実行用端末に関するアドレス情報を取得する取得部と、
前記ネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開する公開処理部と、を有する、アドレス管理システム。
前記1以上のセキュリティ検査実行用端末は、対応するアドレス情報を識別するための識別用情報を、前記ネットワークノードに通知し、
前記ネットワークノードは、前記識別用情報を用いて前記要求を行うことにより、前記アドレス管理装置が有する前記公開処理部により公開されるアドレス情報を取得する、付記9記載のアドレス管理システム。
前記アドレス管理装置は、
前記アドレス情報の接続可能性を監視する監視部と、
前記アドレス情報の接続可能性に基づいて、1以上のセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信する依頼部と、を更に備え、
前記1以上のセキュリティ検査実行用端末は、前記更新を依頼するための前記情報に基づいて、アドレス情報の更新を要求するための情報を、前記アドレス管理装置に送信する、付記9又は10記載のアドレス管理システム。
前記アドレス管理装置の前記取得部は、前記更新を要求するための前記情報に応じて、対応するセキュリティ検査実行用端末に関するアドレス情報を更新する、付記11記載のアドレス管理システム。
セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末に関するアドレス情報を取得することと、
前記セキュリティ検査対象システムの管理を行うネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開することと、
を備えるアドレス管理方法。
前記アドレス情報の接続可能性を監視することと、
前記アドレス情報の接続可能性に基づいて、前記1以上のセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信することと、を更に備える、付記13記載のアドレス管理方法。
セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末に関するアドレス情報を取得することと、
前記セキュリティ検査対象システムの管理を行うネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開することと、
をコンピュータに実行させるプログラム。
2 インターネット
20 セキュリティ検査対象システム
21 ネットワークノード
22 セキュリティ装置
30、30a、30b、30c セキュリティ検査実行用端末30
100 アドレス管理装置
131、151 取得部
133、153 公開処理部
135 監視部
1351 送信処理部
1353 受信処理部
1355 判断処理部
137 依頼部
139 承認部
141 制御情報送信処理部
Claims (15)
- セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末に関するアドレス情報を取得する取得部と、
前記セキュリティ検査対象システムの管理を行うネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開する公開処理部と、
を備えるアドレス管理装置。 - 前記アドレス情報の接続可能性を監視する監視部と、
前記アドレス情報の接続可能性に基づいて、前記1以上のセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信する依頼部と、を更に備える、請求項1記載のアドレス管理装置。 - 前記監視部は、
前記アドレス情報の接続可能性を監視するためのエコー要求メッセージを、対応するセキュリティ検査実行用端末に送信する送信処理部と、
前記対応するセキュリティ検査実行用端末から、前記エコー要求メッセージに対するエコー応答メッセージを受信する受信処理部と、
前記エコー要求メッセージに関する受信状況に基づいて、前記対応するセキュリティ検査実行用端末に関するアドレス情報の接続可能性が有効又は無効であると判断する判断処理部とを備える、請求項2記載のアドレス管理装置。 - 前記監視部は、前記対応するセキュリティ検査実行用端末に関するアドレス情報の更新履歴に基づいて、前記対応するセキュリティ検査実行用端末へのエコー要求メッセージの送信頻度を設定する、請求項3記載のアドレス管理装置。
- 前記依頼部は、前記対応するセキュリティ検査実行用端末に関する前記アドレス情報の接続可能性が無効である場合に、前記対応するセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信する、請求項3又は4記載のアドレス管理装置。
- 前記監視部は、前記1以上のセキュリティ検査実行用端末により行われるセキュリティ検査に関する画像情報を更に監視し、
前記公開処理部は、前記ネットワークノードからの要求に応じて、前記ネットワークノードに、前記セキュリティ検査に関する画像情報を公開する、請求項2乃至5のうち何れか1項記載のアドレス管理装置。 - 前記ネットワークノードからの通知情報に基づいて、対応するセキュリティ検査実行用端末による前記セキュリティ検査のためのアクセスを承認する承認部を更に備える、請求項1乃至6のうち何れか1項記載のアドレス管理装置。
- 前記対応するセキュリティ検査実行用端末による前記セキュリティ検査のためのアクセスのための制御情報を、前記セキュリティ検査対象システムへのアクセスを制御するネットワークノードに送信する制御情報送信処理部を更に備える、請求項7記載のアドレス管理装置。
- セキュリティ検査対象システムと、
前記セキュリティ検査対象システムの管理を行うネットワークノードと、
前記セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末と、
前記1以上のセキュリティ検査実行用端末に関するアドレス情報を管理するアドレス管理装置と、を備え、
前記アドレス管理装置は、
前記1以上のセキュリティ検査実行用端末に関するアドレス情報を取得する取得部と、
前記ネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開する公開処理部と、を有する、アドレス管理システム。 - 前記1以上のセキュリティ検査実行用端末は、対応するアドレス情報を識別するための識別用情報を、前記ネットワークノードに通知し、
前記ネットワークノードは、前記識別用情報を用いて前記要求を行うことにより、前記アドレス管理装置が有する前記公開処理部により公開されるアドレス情報を取得する、請求項9記載のアドレス管理システム。 - 前記アドレス管理装置は、
前記アドレス情報の接続可能性を監視する監視部と、
前記アドレス情報の接続可能性に基づいて、1以上のセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信する依頼部と、を更に備え、
前記1以上のセキュリティ検査実行用端末は、前記更新を依頼するための前記情報に基づいて、アドレス情報の更新を要求するための情報を、前記アドレス管理装置に送信する、請求項9又は10記載のアドレス管理システム。 - 前記アドレス管理装置の前記取得部は、前記更新を要求するための前記情報に応じて、対応するセキュリティ検査実行用端末に関するアドレス情報を更新する、請求項11記載のアドレス管理システム。
- セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末に関するアドレス情報を取得することと、
前記セキュリティ検査対象システムの管理を行うネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開することと、
を備えるアドレス管理方法。 - 前記アドレス情報の接続可能性を監視することと、
前記アドレス情報の接続可能性に基づいて、前記1以上のセキュリティ検査実行用端末に、アドレス情報の更新を依頼するための情報を送信することと、を更に備える、請求項13記載のアドレス管理方法。 - セキュリティ検査対象システムに対するセキュリティ検査のためのアクセスを行う1以上のセキュリティ検査実行用端末に関するアドレス情報を取得することと、
前記セキュリティ検査対象システムの管理を行うネットワークノードからの要求に応じて、前記ネットワークノードに、前記1以上のセキュリティ検査実行用端末に関するアドレス情報を公開することと、
をコンピュータに実行させるプログラム。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/038,959 US20240031412A1 (en) | 2020-12-03 | 2020-12-03 | Address management apparatus, address management system, address management method, and program |
PCT/JP2020/045065 WO2022118433A1 (ja) | 2020-12-03 | 2020-12-03 | アドレス管理装置、アドレス管理システム、アドレス管理方法及びプログラム |
JP2022566580A JP7464148B2 (ja) | 2020-12-03 | 2020-12-03 | アドレス管理装置、アドレス管理システム、アドレス管理方法及びプログラム |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2020/045065 WO2022118433A1 (ja) | 2020-12-03 | 2020-12-03 | アドレス管理装置、アドレス管理システム、アドレス管理方法及びプログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022118433A1 true WO2022118433A1 (ja) | 2022-06-09 |
Family
ID=81853036
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2020/045065 WO2022118433A1 (ja) | 2020-12-03 | 2020-12-03 | アドレス管理装置、アドレス管理システム、アドレス管理方法及びプログラム |
Country Status (3)
Country | Link |
---|---|
US (1) | US20240031412A1 (ja) |
JP (1) | JP7464148B2 (ja) |
WO (1) | WO2022118433A1 (ja) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004259020A (ja) * | 2003-02-26 | 2004-09-16 | Kyocera Communication Systems Co Ltd | 認証システム、プログラム、記録媒体および認証方法 |
JP2004356787A (ja) * | 2003-05-28 | 2004-12-16 | Hitachi Ltd | セキュリティ検査システム |
JP2006268492A (ja) * | 2005-03-24 | 2006-10-05 | Fujitsu Ltd | プログラム、クライアント認証要求方法、サーバ認証要求処理方法、クライアント及びサーバ |
JP2014191440A (ja) * | 2013-03-26 | 2014-10-06 | Fujitsu Ltd | プログラム、診断方法及び診断システム |
US20180349615A1 (en) * | 2013-08-05 | 2018-12-06 | Netflix, Inc. | Dynamic security testing |
-
2020
- 2020-12-03 JP JP2022566580A patent/JP7464148B2/ja active Active
- 2020-12-03 WO PCT/JP2020/045065 patent/WO2022118433A1/ja active Application Filing
- 2020-12-03 US US18/038,959 patent/US20240031412A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004259020A (ja) * | 2003-02-26 | 2004-09-16 | Kyocera Communication Systems Co Ltd | 認証システム、プログラム、記録媒体および認証方法 |
JP2004356787A (ja) * | 2003-05-28 | 2004-12-16 | Hitachi Ltd | セキュリティ検査システム |
JP2006268492A (ja) * | 2005-03-24 | 2006-10-05 | Fujitsu Ltd | プログラム、クライアント認証要求方法、サーバ認証要求処理方法、クライアント及びサーバ |
JP2014191440A (ja) * | 2013-03-26 | 2014-10-06 | Fujitsu Ltd | プログラム、診断方法及び診断システム |
US20180349615A1 (en) * | 2013-08-05 | 2018-12-06 | Netflix, Inc. | Dynamic security testing |
Also Published As
Publication number | Publication date |
---|---|
JP7464148B2 (ja) | 2024-04-09 |
US20240031412A1 (en) | 2024-01-25 |
JPWO2022118433A1 (ja) | 2022-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107135073B (zh) | 接口调用方法和装置 | |
US8819787B2 (en) | Securing asynchronous client server transactions | |
US9298890B2 (en) | Preventing unauthorized account access using compromised login credentials | |
US8412932B2 (en) | Collecting account access statistics from information provided by presence of client certificates | |
US9641535B2 (en) | Apparatus and data processing systems for accessing an object | |
JP2016129037A (ja) | アプリケーション証明のためのシステムおよび方法 | |
US20170026401A1 (en) | System and method for threat visualization and risk correlation of connected software applications | |
US8769128B2 (en) | Method for extranet security | |
US9251367B2 (en) | Device, method and program for preventing information leakage | |
US20160182221A1 (en) | Method and system for controlling the exchange of privacy-sensitive information | |
CN108830070A (zh) | 无人参与且安全的设备授权 | |
US11863586B1 (en) | Inline package name based supply chain attack detection and prevention | |
CN113868659A (zh) | 一种漏洞检测方法及系统 | |
US8195952B2 (en) | System and method of facilitating the identification of a computer on a network | |
US11222100B2 (en) | Client server system | |
CN114938288A (zh) | 一种数据访问方法、装置、设备以及存储介质 | |
JP2007065810A (ja) | セキュリティ検査システム | |
CN112688963A (zh) | 网关授权接入与对外开放服务的方法、装置及存储介质 | |
CN113812125B (zh) | 登录行为的校验方法及装置、系统、存储介质、电子装置 | |
WO2022118433A1 (ja) | アドレス管理装置、アドレス管理システム、アドレス管理方法及びプログラム | |
KR101619928B1 (ko) | 이동단말기의 원격제어시스템 | |
CN111885006B (zh) | 页面访问、授权访问方法和装置 | |
Phumkaew et al. | Android forensic and security assessment for hospital and stock-and-trade applications in thailand | |
US12028351B2 (en) | Protecting against API attacks by continuous auditing of security compliance of API usage relationship | |
JPWO2017047087A1 (ja) | データ検査システム、データ検査方法とそのプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20964285 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022566580 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18038959 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20964285 Country of ref document: EP Kind code of ref document: A1 |