In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
Editor to share with you what is the difference between Cmd and traditional Linux security controls, I believe that most people do not know much about it, so share this article for your reference, I hope you can learn a lot after reading this article, let's go to know it!
Cmd can help organizations monitor, verify, and block activities that are beyond the scope of the system's expected use.
There is a new Linux security tool for you to learn about: Cmd (pronounced "see em dee"), which greatly changes the type of control over Linux users. It goes far beyond traditional user rights configuration and plays an active role in monitoring and controlling commands that users can run on Linux systems.
Cmd is developed by a company of the same name and focuses on cloud applications. As more and more applications migrate to cloud environments that rely on Linux, the gap in available tools makes it difficult to fully implement the required security. In addition, Cmd can be used to manage and protect local systems.
The difference between Cmd and traditional Linux Security controls
Milun Tesovic and Jake King, leaders of Cmd, say organizations cannot confidently predict or control user behavior unless they understand how users work every day and what is considered "normal". They seek to provide a tool that can finely control, monitor, and verify user activities.
Cmd monitors user activity by forming a user activity profile that depicts the activities that these users usually do, paying attention to anomalies in their online behavior (login time, commands used, user location, and so on). The behavior of the product is configurable and can be changed quickly.
The tools that most people use to detect threats, identify vulnerabilities, and control user permissions have been in use for a long time, but we are still struggling to keep our systems and data secure. Cmd makes it easier for us to determine the intentions of malicious users, whether they are trying to hack into accounts or represent internal threats.
View real-time Linux sessions
How does Cmd work?
When monitoring and managing user activities, Cmd can:
Collect information that describes user activity
Use baselines to determine what is normal
Use specific metrics to detect and proactively prevent threats
Send an alert to the person in charge
Build a custom policy in Cmd
Cmd extends what system administrators can control through traditional methods, such as configuring sudo permissions to provide more granular and context-specific control.
Administrators can choose upgrade policies that can be managed separately from the user rights controls managed by the Linux system administrator.
The Cmd client provides real-time visualization (rather than post-mortem log analysis) and can block operations, require additional authentication, or negotiate authorization as needed.
In addition, Cmd supports custom rules based on geolocation if user location information is available. And the new policy can be pushed to the client deployed on the host in a few minutes.
These are all the contents of this article entitled "what is the difference between Cmd and traditional Linux security controls?" Thank you for reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.