Bkjia.com integrated message: at present, network boundary security protection cannot effectively protect network security. Only border security and Intranet Security Management three-dimensional control is the way out.
Intranet security focuses on internal network users, application environments, application environment boundaries, and Intranet Communication Security that cause information security threats. How to build a unified security control system and implement three-dimensional real-time supervision has become a challenge for network administrators.
Intranet security is more than just the stack of security products. At present, Intranet security has been deployed by simple security products, and has risen to the level of how to implement a credible and controllable three-dimensional protection system. The four-level trusted authentication mechanism ensures a win-win situation between security and management.
Level 1 Certification: hardware-level security protection and access control. Physical security reinforcement is implemented at the bottom layer of the computer terminal. the BIOS-level logon authentication and full-disk data protection are implemented using security cards. This prevents unauthorized users from starting from the disc and bypassing the protection software to steal data, at the same time, users cannot install operating systems or uninstall software at will.
Level 2 authentication: operating system-based identity authentication and file protection. The USB-KEY-based two-factor authentication technology is used to achieve trusted and controllable login of the operating system-that is, after the computer hardware is started, user permissions can be restricted. In addition, if a system disaster occurs on the computer terminal, appropriate system backup and disaster recovery measures must be taken.
Level 3 authentication: Implement Authorization Control for program installation and operation. Black/white list control of applications: Only programs signed and authorized by the administrator can run and use on a single terminal to further regulate the use of software programs of end users.
Level 4 Certification: Implements authentication management for trusted computers to access the Intranet. Security and control of network boundaries is a basic problem of Intranet security. Through the trusted terminal authentication subsystem based on 802.1X authentication protocol, the network can be securely connected.
After a level-4 trusted authentication mechanism is established, some basic protection requirements for identity authentication, media management, data protection, and security audit are also required. Finally, real-time monitoring is required.
- How terminal auditing can better serve Intranet Security (figure)
- Chinasec's intrinsic Intranet security market advances to the petrochemical energy field
- Expert discussion on Intranet Security Technology Analysis and standards