Security management mechanism inside the chat manufacturers

Experience working for two months to do a lot of outsourcing small projects not previously thing, still have to say manufacturers have their own set of sound system, will not leak like the B station as their own the whole background of the source of that happening .

Computer Office

For example, in the use of office computer this regard, the newly recruited staff that day everyone will receive a computer (MAC and Windows have a look at the work required), are equipped with a computer on everyone's collar of butler , housekeeper of Baidu is a self-development software models, can be responsible for the network connection Baidu, the future home can also be connected by a network of internal Baidu housekeeper (as well as other functions, not tried).

That all the office must be in Baidu network environment using the following Baidu issued computer to work, and this is very different from before, before their own work in the lab where you want to dry on where to dry, I want to change computer dry dry on another computer, this is actually very comfortable, but there is still a lot of risk. Although the project is a laboratory course, he lost the leak may not have much impact, but certainly not the same company's projects, and money that are directly linked.

Speaking here, I think of start-up companies went to a classmate and I say some of the things their company, he said, the company issued a MAC computer to do a live distribution company's less convenient than Windows, and then he put his Windows computer to take to the company office.

Large companies pay more attention to safety norms, small companies focus on efficiency output, large companies from small companies is beginning over the different stages of the value is not the same thing, no matter how do all have their own reason.

Interactive interface

And people often have to call other departments need to interface with each other, no matter who who tune interface must use the token validation, verification by the token in order to obtain the required data. A student can no longer be directly used as an interface to use the time to do the project.

Access Request

Basic rights are inseparable from the manufacturers apply a variety of things to be involved to apply for permission.

  • Development within the company requires the use of Linux machines within the company in the management of the machine by the cloud XX, this time if you want a development machine, it must work orders to fill, after the submission for review.
  • Application down development machine Although web services are running above, you can also access the web service corresponding URL in the company within the network environment, but this website can not be accessed at an external network environment, I am here because there is a demand needs to be at an external network environment access, so they need to apply for permission to look, continue to find the appropriate permissions within the network application URL, be billed for approval.
  • In addition Before, on the line when demand is also involved in the examination and approval authority, after submitting a request on-line demand, approver approval, approval of people think there is no problem before they can be posted on-line.

Security

All internal and external applications have access X birds system for security, protection against unlawful attacks, and recorded IP, there are specific what other features did not quite understand.

Rules and regulations

Regardless of major companies to do security system to do more than fast hardware, as long as the employees want is an internal leak of information within the company that are unavoidable. So the company leaked internal code to github and fired a blog is basically a discovery, and will inform the whole company, if you are an intern, you will be notified of the school, leaving forever indelible black dots on your file , they still behaved more, ye should not do things not to do.

to sum up

These are currently exposed to at work in relation to the internal security of the giant, began to feel whether it had been doing this kind of restriction, then slowly get used to it, manufacturers are doing for so many years to explore out of.

I summed up under these mechanisms have the following advantages:

  1. Not prone to problems on the line, after all, a lot of audit
  2. A good question Responsibility
  3. Ensure that the company will not be easily attacked by hackers

    Good article that I welcome the attention of the public WX No: programmer qogir
    I am a giant background development engineers focused on sharing technology ,, cargo / Programming Resources / Job Interview / growing sentiment, etc., attention and resources to send their own programming 5000G finishing a lot of people helped win the java offer by plane with answers, free download CSDN resources.

Guess you like

Origin www.cnblogs.com/qiaogeli/p/11569356.html