暂无图片
暂无图片
暂无图片
暂无图片
暂无图片
H3C ONEStor分布式存储系统 安全管理指南-6W100-整本手册.pdf
633
46页
6次
2022-05-23
免费下载
H3C ONEStor 3.0 分布式存储系统
安全管理指南
资料版本:6W100-20220520
Copyright © 2022 新华三技术有限公司 版权所有,保留一切权利。
非经本公司书面许可,任何单位和个人不得擅自摘抄、复制本文档内容的部分或全部,并不得以任何形式传播。
除新华三技术有限公司的商标外,本手册中出现的其它公司的商标、产品标识及商品名称,由各自权利人拥有。
本文档中的信息可能变动,恕不另行通知。
i
1 安全概述 ··············································································································································· 1-1
1.1 安全威胁与价值 ································································································································· 1-1
1.1.1 面临的威胁 ······························································································································ 1-1
1.1.2 安全价值 ································································································································· 1-1
1.2 安全框架 ············································································································································ 1-1
1.3 安全管理原则及建议 ·························································································································· 1-3
1.3.1 账户原则及建议 ······················································································································ 1-3
1.3.2 专用原则 ································································································································· 1-3
1.3.3 审计原则及建议 ······················································································································ 1-4
1.3.4 证书和密钥建议 ······················································································································ 1-4
1.3.5 安全评估建议 ·························································································································· 1-4
1.3.6 备份建议 ································································································································· 1-4
1.3.7 漏洞扫描建议 ·························································································································· 1-4
1.3.8 网络连接变更建议 ··················································································································· 1-5
1.3.9 网络日常维护建议 ··················································································································· 1-5
1.3.10 丁建议 ······························································································································· 1-6
1.4 适用产品 ············································································································································ 1-6
2 身份鉴别 ··············································································································································· 2-1
2.1 操作员身份鉴别 ································································································································· 2-1
2.1.1 功能简介 ································································································································· 2-1
2.1.2 使用场景 ································································································································· 2-1
2.1.3 操作步骤 ································································································································· 2-1
2.2 最终用户身份鉴 ····························································································································· 2-3
2.2.1 功能简介 ································································································································· 2-3
2.2.2 使用场景 ································································································································· 2-3
2.2.3 操作步骤 ································································································································· 2-4
3 访问控制 ··············································································································································· 3-1
3.1 平台访问控制 ····································································································································· 3-1
3.1.1 功能简介 ································································································································· 3-1
3.1.2 使用场景 ································································································································· 3-1
3.1.3 操作步骤 ································································································································· 3-1
3.2 操作系统访问控 ····························································································································· 3-2
3.2.1 功能简介 ································································································································· 3-2
of 46
免费下载
【版权声明】本文为墨天轮用户原创内容,转载时必须标注文档的来源(墨天轮),文档链接,文档作者等基本信息,否则作者和墨天轮有权追究责任。如果您发现墨天轮中有涉嫌抄袭或者侵权的内容,欢迎发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。

评论

关注
最新上传
暂无内容,敬请期待...
下载排行榜
Top250 周榜 月榜