In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
With the rapid development of information security, internal security threats are increasing day by day, and the ideas of comprehensive protection and internal threat protection have been paid more and more attention, and all levels of policy compliance, such as the Sarbanes Act (Sarbanes-Oxley Act), "Information system level Protection" and other laws and regulations have put forward clear requirements for operation and maintenance personnel operation behavior audit. Operation and maintenance fortress machine as the operation and maintenance security audit product will become the last line of defense of information system security, its role will become more and more important, the scope of application will be rapidly extended to information systems in various industries, at the same time, its own development has also appeared a new trend. Therefore, in the current situation, it is very necessary for everyone to have a clearer understanding of the development history and trend of the fortress machine.
The origin of the fortress machine
Around the year 2000, with the continuous development of global information technology and the continuous progress of information construction, large institutions and enterprises in important industries such as telecommunications, finance, taxation, public security, finance, electric power, oil, and so on, began to use a large number of server hosts to run key business, and gradually centralize the server hosts into the computer room for unified management. With the centralization of servers and the increasing complexity of IT systems, operation and maintenance personnel from different backgrounds, such as system administrators, system operation and maintenance personnel, system application high-authority users, maintenance personnel from third-party manufacturers and other temporary high-authority personnel, begin to bring greater potential risks to the safe operation of enterprise information systems. At the same time, with the Sarbanes-Oxley Act and other compliance legal requirements come into effect, business activities, business management, projects and investment, etc., must have control and audit means. Managers need to have effective technical means and professional products to control, restrict and track the behavior of users, and determine whether the behavior of users poses a threat to the safe operation of the enterprise internal network. Therefore, the operation and maintenance fortress machine came into being.
The first generation of fortress machine
The springboard machine can be called the first generation fortress machine. Around 2000, high-end industry users will deploy jumping machines in the computer room in order to centrally manage the remote login of operation and maintenance personnel. Jumping machine is a server, maintenance personnel in the maintenance process, first of all to log in to this server, and then from this server to log in to the target equipment for maintenance. However, the jumping machine does not achieve the control and audit of the operation and maintenance personnel. In the process of using the jumping machine, there will still be operation accidents caused by misoperation and illegal operation. Once the operation accident occurs, it is difficult to quickly locate the cause and the responsible person.
The second generation fortress machine
Due to all kinds of problems existing in the springboard machine, the improved second-generation fortress machine appeared. The second-generation fortress machine is deployed between the external network and the enterprise internal network to provide secure access to specific resources of the internal network, mainly using SSL × × mode. Access to specific resources of the internal network must first be completed by logging in to the top of the fortress machine. It mainly meets the functional requirements of users for the most commonly used operation and maintenance protocols, and supports the audit of operation and maintenance protocols such as text (such as Telnet,SSH) and graphics (such as RDP).
The third generation fortress machine
With the increasing demand for operation and maintenance audit, users need more and more types of protocols supported by the fortress machine, and the second generation fortress machine is unable to respond to these requirements. Therefore, the third generation fortress machine using protocol agent appears, which cuts off the direct access of the terminal computer to the network and server resources and takes over the access of the terminal computer to the network and server. The third generation fortress machine integrates more user application requirements, and its supporting protocols such as database protocol, web application protocol and so on. At present, most of the fortress machines on the market belong to the third generation of fortress machines.
What are the opportunities for the next fortress?
At present, the products of some operation and maintenance fortress machine manufacturers generally have the following problems:
1. The operation and maintenance fortress machine has become a new system vulnerability. As the operation and maintenance fortress machine is the only way to connect the front and rear, the first to bear the brunt has become an important target, increasing the risk. Therefore, the services or modules loaded by the system should be minimized so as to minimize the risk that they can be used.
two。 Deployment is difficult, management is tedious, and user experience is not good. Especially in the case of many kinds of management equipment and large number of equipment, there are some problems, such as complex configuration interface, incoherent mode of operation, time-consuming deployment and so on.
The research and development team of Shangsi Excellence has been committed to providing the world's leading operation and maintenance risk management services for many years, and they predict that the next generation of fortress machines should be intelligent fortress machines that can fully perceive the needs of users and make them intelligent, safe and reliable.
The research and development team of Shangsi Excellence believes that the next-generation fortress will change the way operators interact with IT infrastructure in a more intelligent way, and significantly improve the security, compliance, efficiency, flexibility and response speed of the interaction, which can not only solve the operational risks of operation and maintenance, but also easily support all kinds of terminal applications of operation and maintenance, and make deployment simple and easy to use. As a result, managers will be freed from the complex operation and maintenance management and focus on improving the core values of the data center.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.