What is the fortress machine

 

1, fortress machine is used to solve the "operation and maintenance chaos" of

Fortress machine is used to do? In short sentence, fortress machine is used to solve the "operation and maintenance chaos" of. What is the operation and maintenance confusion? When the company's operation and maintenance staff more and more, as more and more need for the operation and maintenance of equipment, as more and more jobs to participate in the operation and maintenance of diversity, if not a good mechanism, operation and maintenance will produce confusion. Specifically, you want to know "who is allowed to access what devices to which identity" but could not.

 

2, Fort machine so that "operation and maintenance chaos" change "orderly operation and maintenance"

Ever since, the fortress machine was born, it only entrance to assume the operation and maintenance personnel in the operation and maintenance process, authorized by fine, clear "who accessed which devices to which identity", so that the operation and maintenance become confused ordered up.

3, fortress machine so that "operation and maintenance chaos" change "operation and maintenance of security"

The more important point is: Fort machine can not only clear access path for each operation and maintenance personnel can also access each process can become "audit", if there are problems, can be traced back to the source.

How do auditable? The obvious way is "full video" and "query command." The whole video is well understood, then what is the query command it? The so-called command query refers to the operation and maintenance of the operating instructions.

For example, a thief into your home in the last 24 hours, you have surveillance video, but you need to read the 24 hours of video is obviously not a smart thing to do, if then the system can help you 24 hours to appear in the video everyone avatar directly identify and set out, you know what time to come naturally thief.

"Query command" is true, the video file is your last safeguard, but by a query command can help you quickly locate a suspicious location of the video file.

 

reference:

https://jingyan.baidu.com/album/656db91823cbd4e381249cd1.html?picindex=1

 

I understand:

Bastion machine as an intermediate transfer layer, a recording operation and maintenance engineers use authority of each

2. Meanwhile, operation and maintenance engineers need to record login password for each server, only you need to select which server you can login, and password can be entered fortress machine

3. The main role of the audit is to record log book, and facilitate traceability

 

Guess you like

Origin www.cnblogs.com/zzdbullet/p/10938974.html