Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Automatic reinforcing method for security configuration of information system

A technology for security configuration and information system, applied in the field of automatic reinforcement of information system security configuration, it can solve the problems of heavy workload, manpower, and high requirements for inspectors' skills and experience, and achieve the goal of improving efficiency, reducing rectification costs, and improving operation level. Effect

Pending Publication Date: 2020-04-17
INNER MONGOLIA POWER GRP
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It is the most basic requirement for information system security to conduct security configuration inspections based on enterprise and industry security configuration guidance standards and specifications. By adopting unified security configuration standards to standardize the daily operations of technicians on various systems, operation and maintenance personnel have However, in actual work, security operation and maintenance personnel still encounter the problem that security configuration inspection and problem repair need to be done manually, which requires high skills and experience of inspectors, and the workload is huge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic reinforcing method for security configuration of information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] An information system security configuration automatic reinforcement method, including developing an automatic reinforcement script program for security configuration items of various operating systems, databases, and middleware, and then integrating the complete reinforcement script and rollback script into a unified WEB management system , complete the hardening by connecting the target system through the system, and manage and record the whole process of hardening;

[0025] It specifically includes the following steps:

[0026] S1. Develop automated reinforcement scripts for various components:

[0027] S1-1. Fully study the information system configuration inspection requirements based on hierarchical protection, compare the default configurations of various systems, and confirm the main non-compliant configuration inspection items;

[0028] S1-2. Investigate the current business environment, eliminate configuration items that affect business or cannot be reinforce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an automatic reinforcing method for security configuration of an information system. The method comprises developing automated consolidated script programs for security configuration items of various operating systems, databases and middleware, integrating a complete reinforcing script and a complete backspacing script into a unified WEB management system, connecting the system with a target system to complete reinforcement, and managing and recording the whole reinforcing process. The method disclosed by the invention is developed for the configuration reinforcement ofcommon components such as the server operating system, the database and the middleware; operation and maintenance personnel are helped to confront with equipment and software environments with complicated types and large quantities in the network; equipment can be quickly and effectively inspected, automatic safety reinforcement can be performed, risk auditing reports can be made, projects whichdo not accord with safety specifications can be ultimately identified, accordingly, rectification compliance requirements can be met, the method is high in quick deployment and application capacity, diversified reinforcement choices can be provided for the operation and maintenance personnel, and the method can be popularized widely.

Description

technical field [0001] The invention relates to the technical field of security assurance of information systems, in particular to an automatic reinforcement method for security configuration of an information system. Background technique [0002] In recent years, my country's power system has accelerated its pace towards the market, and the national power industry system has begun to transform into the market. Power supply companies at all levels have established information systems and Internet-based management applications to improve labor productivity, improve management levels, strengthen information feedback, and improve Scientific and accurate decision-making improves the comprehensive competitiveness of enterprises. However, with the interconnection of the power information network and its complete integration into the Internet, the power information network is facing increasingly prominent information system security issues. As a national infrastructure, the informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/71G06F9/445G06F8/60G06F11/36
CPCG06F21/71G06F9/44505G06F8/60G06F11/3688
Inventor 王鹏李勇韩俊飞李秀芬王蓓刘妍蕾潘涛俞超宇李泽昊
Owner INNER MONGOLIA POWER GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products