Policy configuration method and system for cloud safety, electronic equipment and storage medium

A technology of security configuration and policy configuration, applied in the field of security on the cloud, can solve problems such as inconsistent security configuration policies, short life cycle, lack of security policy management, etc., to reduce complexity, improve operation and maintenance efficiency, and increase flexibility Effect

Pending Publication Date: 2020-05-19
HARBIN ANTIY TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For cloud security configuration strategies, most of the security policies are configured based on the cloud platform’s own security, operation and maintenance security, and other dimensions, ignoring multi-dimensional security configurations that combine cloud business, cloud application development life cycle, and cloud security operation and maintenance. Unified Planning of Strategy
[0005] 2. The security configuration policies of cloud platforms, cloud applications, and cloud security products are not unified, and policy adaptation is difficult
When users configure security policies, they need to match different languages ​​and protocols, which makes it difficult to configure security policies on the cloud and lacks unified management of security policies.
[0007] 3. The security configuration policies on the cloud are changeable, and the lack of security configuration policies can detect and respond in real time
[0008] For workloads on the cloud, it becomes thinner and thinner, and the service life cycle is shorter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Policy configuration method and system for cloud safety, electronic equipment and storage medium
  • Policy configuration method and system for cloud safety, electronic equipment and storage medium
  • Policy configuration method and system for cloud safety, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The specific implementations of a multi-standard security benchmark detection method, system, target host, server, electronic device, and storage medium provided by the embodiments of the present invention will be described below with reference to the accompanying drawings.

[0060] figure 1 A flowchart of a policy configuration method for cloud security provided by an embodiment of the present invention, as shown in figure 1As shown, the method includes the following steps:

[0061] Step S11: Obtain a security configuration policy, which includes security configuration indicators;

[0062] Step S12: Perform unified configuration management on security configuration indicators to obtain structured configuration strategies;

[0063] Unified management of the specified scenario-based, standardized, and index-based security configuration policies, and at the same time complete integration with CI / CD pipelines, that is, the right movement of security configuration policie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an on-cloud safety policy configuration method and system, electronic equipment and a storage medium, and relates to the technical field of on-cloud safety. The method comprisesthe steps: obtaining a safety configuration policy which comprises a safety configuration index; performing unified configuration management on the safety configuration indexes to obtain a structuredconfiguration strategy; and processing the structured configuration strategy, obtaining and issuing a strategy execution task, and controlling execution of the strategy execution task. According to the method, the strategy configuration complexity can be reduced, the strategy configuration flexibility is improved, and the operation and maintenance efficiency is improved through unified safety strategy management and configuration.

Description

technical field [0001] The present invention relates to the technical field of security on the cloud, in particular to a policy configuration method, system, electronic equipment and storage medium for security on the cloud. Background technique [0002] In the process of security protection on the cloud, weak and lagging security configuration policies will directly affect the security of cloud services. An accurate, timely and continuous monitoring method for security configuration policies is very important. However, in the face of complex and changeable cloud environments, diverse technologies, and differentiated enterprise cloud security requirements, there are still many difficulties in the traditional cloud security configuration policy management method: [0003] 1. The security configuration strategy on the cloud lacks a comprehensive and unified consideration of business, development, and operation and maintenance [0004] For cloud security configuration strategi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F21/57
CPCG06F9/44505G06F21/577G06F2221/034
Inventor 廖中华李松肖新光
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products