Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private cloud virtual machine automatic security management method and device, terminal, and storage medium

A security management and virtual machine technology, applied in the fields of private cloud virtual machine automatic security management methods, terminals, storage media, and devices, can solve the problem that security operation and maintenance personnel have limited operation authority, security operation and maintenance personnel cannot assess and reduce security risks, It is impossible to assess and reduce virtual machine security risks, so as to reduce management pressure and comprehensively assess and reduce security risks.

Inactive Publication Date: 2021-12-07
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, in a scenario where there are many virtual machines and complex services, security operation and maintenance personnel cannot timely and on-demand perform relevant security risk assessment and reduction; on the other hand, security operation and maintenance personnel generally have limited operation authority and cannot obtain information about virtual machines related information, it is impossible to conduct a more comprehensive security risk assessment and mitigation for virtual machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private cloud virtual machine automatic security management method and device, terminal, and storage medium
  • Private cloud virtual machine automatic security management method and device, terminal, and storage medium
  • Private cloud virtual machine automatic security management method and device, terminal, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Private clouds are generally used within enterprises to provide R&D and internal application operation, and their security has attracted more and more attention. At present, the security management of private cloud in the industry generally provides centralized management through the security management module, which usually requires security operation and maintenance personnel to actively perform relevant scanning and configuration operations. On the one hand, in a scenario where there are many virtual machines and complex services, security operation and maintenance personnel cannot timely and on-demand perform relevant security risk assessment and reduction; on the other hand, security operation and maintenance personnel generally have limited operation authority and cannot obtain information about virtual machines It is impossible to conduct a more comprehensive security risk assessment and mitigation for virtual machines without relevant information.

[0054] There...

Embodiment 2

[0062] The security management of the virtual machine is convenient. In some scenarios, the user also needs to ensure the security of access rules, that is, configure the port information that the host can allow access to. Therefore, in the method for automatic security management of a private cloud virtual machine provided in Embodiment 2, when submitting a virtual machine creation application, relevant information is included in the application, and the cloud platform creates the virtual machine at the same time. Compared with the existing technology, security operation and maintenance personnel cannot obtain relevant information, that is, they cannot perform configuration, and when there are a large number of virtual machines, the configuration cannot be completed in time.

[0063] Such as figure 2 Shown is a schematic flowchart of a method for automatic security management of a private cloud virtual machine provided in the second embodiment, including the following steps....

Embodiment 3

[0087] Considering that the user needs to change the virtual machine during the running process of the virtual machine, in order to ensure the security of the virtual machine, this embodiment also configures security information when the virtual machine is changed.

[0088] Such as image 3 Shown is a schematic flowchart of a method for automatic security management of a private cloud virtual machine provided in the third embodiment, including the following steps.

[0089] S1. Receive a virtual machine creation application submitted by a user, and create the virtual machine.

[0090] Wherein, the virtual machine creation application submitted by the user includes information about a list of ports to be opened and information about a network to be used.

[0091] S2, monitoring whether the user has completed mounting the operating system image on the created virtual machine and completing the configuration of the virtual machine, if completed, perform the following steps, other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private cloud virtual machine automatic security management method and device, a terminal, and a storage medium. The method comprises the following steps: receiving a virtual machine creation application submitted by a user, and creating a virtual machine; monitoring whether the user finishes mounting an operating system mirror image on the created virtual machine and finishing the configuration of the virtual machine; if so, executing the following steps; otherwise, continuously monitoring; retrieving system vulnerabilities according to the mounted operating system mirror image, and pushing the retrieved system vulnerabilities to the user; performing ARP attack prevention configuration on the virtual machine according to virtual machine configuration information. According to the method and the device, when a cloud platform create virtual machines, setting and management of related security information are automatically carried out, security assurance is actively provided for private cloud users, timely and automatic security management of a large number of virtual machines can be realized, the management pressure of security operation and maintenance personnel is reduced, the cloud platform can obtain more information of the virtual machine, so that more comprehensive security risk assessment and reduction are provided for the virtual machines.

Description

technical field [0001] The present invention relates to the field of security management of private cloud virtual machines, in particular to a method, device, terminal and storage medium for automatic security management of private cloud virtual machines. Background technique [0002] Private clouds are generally used within enterprises to provide R&D and internal application operation, and their security has attracted more and more attention. At present, the security management of private cloud in the industry generally provides centralized management through the security management module, which usually requires security operation and maintenance personnel to actively perform relevant scanning and configuration operations. On the one hand, in a scenario where there are many virtual machines and complex services, security operation and maintenance personnel cannot timely and on-demand perform relevant security risk assessment and reduction; on the other hand, security opera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/57
CPCG06F9/45558G06F21/577G06F2009/45587G06F2009/45595
Inventor 刘雁鸣
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products