As a maintenance engineer, the responsibility is not urgent to quickly locate and deal with problems, but to prevent the situation, this is our value, is not?
(i) Solution strategy
When interviewing and being interviewed, we need to pay attention to the dimensions and height of the answer, we must directly kill the competitor, the boss.
(ii) Solution tactics
< Span style= "Background-color:rgb (255,192,0); font-family: ' The song Body '; > via upload to directory this way to upload Trojans to linux server,
can be started by visiting a website from a malicious person -->linux system -->http Service - Middleware Services - Program Code -->db--> storage, layer multiplication protection.
(c) from the Span style= "font-family: ' The song Body '; Color:rgb (62,62,62); Background-color:rgb (255,192,0);" > user access angle answer reference
-
The developer code restricts the upload file type, For example, you cannot upload a. PHP program (JS and Backend code control).
-
Detects uploaded content, including text and files, and is controlled through programs, the Web services layer (middleware layer), and the database.
-
Controls permissions to upload directories and permissions for non-site directories (Linux file directory permissions +web service layer control).
-
Access and execution control (Web service layer + file system storage layer) after Trojan file.
-
MD5 fingerprints and backups of files such as important profiles, commands, and web configurations.
-
Install anti-virus software CLAMAV, etc., regular monitoring Trojan horse.
-
Configure server firewalls and intrusion detection services.
-
Monitors server file changes, process changes, port changes, critical security logs, and timely alerting.
(iv) from the perspective of internal management : Prevention of the right to be raised
A VPN Management Server or a Web Management server.
SSH monitors the intranet.
Use of Springboard machine, Operation Audit.
sudo centralized management, locking key files.
The site directory, upload directory permissions belong to group control.
Do system and site file backup fingerprint monitoring alarm.
Dynamic password Authentication.
This article is from the "funny Brother Notes" blog, be sure to keep this source http://qiuyt.blog.51cto.com/1229789/1919663
How to prevent Trojan horse in Linux system?