i
目 录
1 安全概述 ··············································································································································· 1-1
1.1 安全威胁与价值 ································································································································· 1-1
1.1.1 面临的威胁 ······························································································································ 1-1
1.1.2 安全价值 ································································································································· 1-1
1.2 安全框架 ············································································································································ 1-1
1.3 安全管理原则及建议 ·························································································································· 1-3
1.3.1 账户原则及建议 ······················································································································ 1-3
1.3.2 专用原则 ································································································································· 1-3
1.3.3 审计原则及建议 ······················································································································ 1-4
1.3.4 证书和密钥建议 ······················································································································ 1-4
1.3.5 安全评估建议 ·························································································································· 1-4
1.3.6 备份建议 ································································································································· 1-4
1.3.7 漏洞扫描建议 ·························································································································· 1-4
1.3.8 网络连接变更建议 ··················································································································· 1-5
1.3.9 网络日常维护建议 ··················································································································· 1-5
1.3.10 补丁建议 ······························································································································· 1-6
1.4 适用产品 ············································································································································ 1-6
2 身份鉴别 ··············································································································································· 2-1
2.1 操作员身份鉴别 ································································································································· 2-1
2.1.1 功能简介 ································································································································· 2-1
2.1.2 使用场景 ································································································································· 2-1
2.1.3 操作步骤 ································································································································· 2-1
2.2 最终用户身份鉴别 ····························································································································· 2-3
2.2.1 功能简介 ································································································································· 2-3
2.2.2 使用场景 ································································································································· 2-3
2.2.3 操作步骤 ································································································································· 2-4
3 访问控制 ··············································································································································· 3-1
3.1 平台访问控制 ····································································································································· 3-1
3.1.1 功能简介 ································································································································· 3-1
3.1.2 使用场景 ································································································································· 3-1
3.1.3 操作步骤 ································································································································· 3-1
3.2 操作系统访问控制 ····························································································································· 3-2
3.2.1 功能简介 ································································································································· 3-2
评论