当前位置:网站首页>Iguard6.0 - appropriate website protection system
Iguard6.0 - appropriate website protection system
2022-06-24 03:33:00 【Tiancun information】
With the emergence of new Internet technologies , The architecture technology and resources involved in the website are becoming more and more diverse and complex . This also puts forward higher challenges and more fine-grained requirements for the protection of various resources of the website .
The real needs of users we often encounter include :
- my CMS Production system , Will you publish web files with problematic content ?
- My website allows you to upload pictures and attached files , Will these functions be utilized , Cause the bad guys to secretly upload Trojan files ?
- What if a malicious script file is fake as a picture file ?
- Except for web files , Other key documents ( Such as configuration files ) It's also important. , Will it be changed ? ……
These problems are essentially determined by the characteristics of different resources , Different resources need different inspection elements . Try to list the common resource file inspection elements as follows :
- General resource files (html/css/js etc. )
Whether there are sensitive words in the web content ? Whether the source is normal ?
- Script files (php/jsp/asxp etc. )
Whether the file will be placed in an unmanageable location outside the website directory ? Whether the existing script has been illegally tampered with ?
- User generated files (UGC file )
Whether the file type is Web Application allowed ? If the type is OK , Whether the content is harmful ?
- The configuration file (config Class )
Whether the modification method is reasonable ? It's best to have detailed modification records .
Summarize the protection concerns of several common resource files ——
iGuard6.0 Webpage tamper proof system It can provide rich information for the above user scenarios 、 Modular inspection method , It can realize all-round protection of website resources through flexible and free configuration .
The following screenshots are for example only , The actual scene must be more complex and diverse . Let's see iGuard6.0 How to solve the above Web Protection needs .
General documents
Whether the source is normal , have access to iGuard6.0 Of Trusted updates or Specify updates modular , Setting the directory of the website can only be legally written by a specific user and a specific process , Reject all other update channels .
Whether the content text is normal , You can go through iGuard6.0 Of Publish scan or Drive scan modular , Set the keyword text that needs to filter warnings . except iGuard6.0 Built in filtered text , Users can also set their own filtering and monitoring text .
Script files
Because the script file has the ability of code execution , So whether the key script files will be placed outside the website directory , It is also often paid special attention by website administrators . have access to iGuard6.0 Of Drive filter modular , Set globally to prohibit the generation of a ( high ) some ( dangerous ) Script file of type . Only approved processes can update script files in the website directory , All other operations are considered ultra vires , Can be directly prohibited .
Integrity of existing script files , have access to iGuard6.0 Of Inline comparison modular , By comparing with the content summary of the original document , Ensure that existing files are not illegally tampered with .
User files
At a time of increasing interactivity , Websites inevitably have files generated by user interaction , Filtering and protection of such documents , It has always been an important part of website security . Concerns about such resources mainly focus on : Whether the file type uploaded by the user exceeds the set range ; Even if the file type does not exceed the limit , Whether to disguise files or hide high-risk content .
iGuard6.0 Careful consideration has been made in both aspects . Such as through Drive filter modular , Strictly limit the types of files that middleware processes are allowed to generate , The middleware process can only be uploaded in the specified directory , Generate low-risk files that cannot be executed as scripts , As shown in the figure below .gif、.jpg and .doc.
If you want to more closely review the contents of uploaded files , Enable Drive scan modular , When files are generated in the upload directory , The actual type and content of the file , Do further checks , And different subsequent processing can be set .
The configuration file
The configuration file does not belong directly to the web page file , But they are also an integral part of website resources . In practice Web In the case of safe penetration , There are many ways to modify the website configuration file , So as to achieve the effect of tampering with the website . therefore , This website resource that is easy to be ignored , It should also be included in protection and monitoring .
Control of configuration files , It depends on the actual situation , Can be loose or strict . A relaxed scenario can only monitor changes to the configuration file , But each modification can have a snapshot backup ; Strictly, you can limit that only specific processes and specific users can modify the configuration file , In addition, any combination operation will be rejected directly .
The above examples are the most basic use cases , In the real world ,iGuard6.0 Web page tamper proof system according to specific requirements , There can be more complex combinations , Provide more overall protection for website resource protection .( Zhu Xiaodan | Tiancun information )
边栏推荐
- How to design a hybrid system
- LeetCode 129. Find the sum of numbers from root node to leaf node
- Why does the fortress machine use an application publisher? What are the main functions of the fortress machine
- Grpc: how to reasonably manage log configuration?
- 2021-10-02: word search. Given an M x n two-dimensional character grid boa
- Can elastic public IP be bound to a home server? The difference between elastic public IP and fixed IP
- JMeter uses JDBC to perform database pressure test
- What technology does cloud computing elasticity scale? What are the advantages of elastic scaling in cloud computing?
- Tke accesses the cluster through kubectl in pod
- What are the configuration requirements for cloud desktop servers? What are the main characteristics of the three points?
猜你喜欢

Community pycharm installation visual database

元气森林推“有矿”,农夫山泉们跟着“卷”?

Get to know MySQL database

Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)

On Sunday, I rolled up the uni app "uview excellent UI framework"

Simple and beautiful weather code

Ar 3D map technology
![[summary of interview questions] zj5](/img/d8/ece82f8b2479adb948ba706f6f5039.jpg)
[summary of interview questions] zj5

QT creator tips

618大促:手机品牌“神仙打架”,高端市场“谁主沉浮”?
随机推荐
2021-10-02: word search. Given an M x n two-dimensional character grid boa
What technology does cloud computing elasticity scale? What are the advantages of elastic scaling in cloud computing?
General scheme for improving reading and writing ability of online es cluster
Why do cloud desktops use rack servers? Why choose cloud desktop?
Troubleshooting and resolution of errors in easycvr calling batch deletion interface
Chapter 5: key led demo case of PS bare metal and FreeRTOS case development
[hot] with a budget of only 100 yuan, how to build a 1-year web site on Tencent cloud??
QT creator tips
What is fortress resource authorization? What is barrier machine?
Disaster recovery series (V) -- database disaster recovery construction
Shopee Clickhouse cold and hot data separation storage architecture and Practice
Using RDM (Remote Desktop Manager) to import CSV batch remote
Process kill problem
What is the role of the distributed configuration center? What are the advantages of a distributed configuration center?
Tencent Mu Lei: real scene 3D linking industrial Internet and consumer Internet
[summary of interview questions] zj6 redis
Grpc: how to implement distributed log tracing?
What are the responsibilities of cloud desktop administrators? How to use cloud desktop?
What does elastic scaling of cloud computing mean? What are the application scenarios for elastic scaling of cloud computing?
What does the cloud desktop server do? What are the cloud desktop functions