Sensitive instruction protection method and device and storage medium
A technology of sensitive instructions and protection equipment, applied in the field of network security, can solve the problems of single protection method for sensitive instructions, easy to be breached, and inability to effectively prevent the execution of illegal operations in a timely manner, so as to enhance the protection ability and achieve diversity Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] see figure 2 , the method includes:
[0040] Step 201: When the operation instruction of the resource management platform is a sensitive instruction, determine the sensitivity level of the operation instruction;
[0041] Step 202: Based on the preset mapping relationship and the sensitivity level of the operation instruction, determine the protection strategy corresponding to the sensitivity level of the operation instruction; wherein, the mapping relationship includes the corresponding relationship between at least two sensitivity levels and at least two protection strategies;
[0042] Step 203: Protect sensitive instructions based on the determined protection policy.
[0043] Here, the subject of execution of steps 201 to 203 may be a processor of a resource management platform, or a processor of a protection device for sensitive instructions.
[0044] In some embodiments, before determining that the operation instruction of the resource management platform is a se...
Embodiment 2
[0059] In order to better reflect the purpose of the present invention, on the basis of the first embodiment of the present invention, a further example is given. Here, the resource management platform takes the 4A unified security management platform as an example, as image 3 As shown, the method includes:
[0060] Step 301: Obtain the operation instruction in the 4A unified security management platform.
[0061] Before performing step 301, it also includes: when the user logs in to the 4A platform through the single sign-on management module, and performs daily operation and maintenance operations, the system log monitoring platform in the 4A platform will monitor all instructions received by the server in real time.
[0062] Specifically, build an ELK real-time system log monitoring platform to analyze SYSLOG logs and monitor operating instructions in real time. The monitoring object is mainly the server equipment in the 4A platform. By monitoring the SYSLOG log of the se...
Embodiment 3
[0095] For the method of the embodiment of the present invention, the embodiment of the present invention also provides a protective device for sensitive instructions, such as Figure 7 As shown, the protection device 70 includes: a processor 701 and a memory 702; wherein,
[0096] The processor 701 is used to execute the protection program of the sensitive instruction stored in the memory 702, so as to realize the following steps:
[0097] When the operation instruction of the resource management platform is a sensitive instruction, determine the sensitivity level of the operation instruction;
[0098] Based on the preset mapping relationship and the sensitivity level of the operation instruction, determine the protection strategy corresponding to the sensitivity level of the operation instruction; wherein, the mapping relationship includes at least two correspondences between sensitivity levels and at least two protection strategies;
[0099] Based on the determined protect...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


