词条 | File integrity monitoring |
释义 |
Generally, the act of performing file integrity monitoring is automated using internal controls such as an application or process. Such monitoring can be performed randomly, at a defined polling interval, or in real-time. Security objectivesChanges to configurations, files and file attributes across the IT infrastructure are common, but hidden within a large volume of daily changes can be the few that impact file or configuration integrity. These changes can also reduce security posture and in some cases may be leading indicators of a breach in progress. Values monitored for unexpected changes to files or configuration items include:
Compliance objectivesMultiple compliance objectives indicate file integrity monitoring as a requirement. Several examples of compliance objectives with the requirement for file integrity monitoring include:
ApplicationsSome examples include:
References1. ^{{cite web |url= http://www.ionx.co.uk/products/verisys/how-it-works |title= Verisys - How it Works |publisher= Ionx|accessdate=2012-09-21}} 2. ^{{cite web|url=http://www.ncircle.com/index.php?s=products_ccm_file-integrity-monitoring|title=File Integrity Monitoring|publisher=nCircle|accessdate=2012-04-18}} 3. ^{{cite web|url=https://www.pcisecuritystandards.org/documents/pa-dss_v2.pdf|title=Payment Card Industry Data Security Standard|publisher=PCI Security Council |accessdate= 2011-10-11}} 4. ^{{cite web|url=https://www.sec.gov/rules/proposed/s74002/card941503.pdf|title=Sarbanes-Oxley Sections 302 & 404 - A White Paper Proposing Practival, Cost Effective Compliance Strategies|publisher=Card Decisions, Inc.|accessdate= 2011-10-11}} 5. ^{{cite web|url=http://www.nerc.com/_layouts/PrintStandard.aspx?standardnumber=CIP-010-2&title=Cyber%20Security%20-%20Configuration%20Change%20Management%20and%20Vulnerability%20Assessments&jurisdiction=null|title=Standard CIP-010-2 - Security Configuration, Change Management and Vulnerability Assessments |publisher=North American Electric Reliability Corporation (NERC)|accessdate= 2016-06-06}} 6. ^{{cite web|url=http://csrc.nist.gov/groups/SMA/fisma/ics/documents/papers/Apply-SP-800-53-ICS-final-22Aug06.pdf|title=Applying NIST SP 800-53 to Industrial Control Systems|publisher=National Institute of Standards and Technology (NIST)|accessdate= 2011-10-11}} 7. ^{{cite web|url=http://csrc.nist.gov/publications/nistpubs/800-66-Rev1/SP-800-66-Revision1.pdf|title=An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule|publisher=National Institute of Standards and Technology|accessdate= 2011-10-11}} 8. ^{{cite web|url=http://www.sans.org/critical-security-controls/control.php?id=3|title=Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers|publisher=SANS Institute|accessdate=2012-11-19}} 9. ^{{cite web|url=https://www.cimcor.com/cimtrak/features/file-integrity-monitoring/|title=CimTrak Integrity Suite|publisher=Cimcor, Inc |accessdate= 2018-10-11}} 10. ^{{cite web|url=https://www.cimcor.com/blog/7-common-file-integrity-monitoring-software-configuration-mistakes|title=7 Common File Integrity Monitoring Software Configuration Mistakes|publisher=Cimcor, Inc |accessdate= 2019-01-20}} 3 : Change management|Computer security|Computer forensics |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。