Fortress machines, that is, in a specific network environment, in order to protect the network and data from intrusion and damage from external and internal users, various technical means are used to collect and monitor every data in the network environment in real time. The system status, security events, and network activities of the components are collected to facilitate centralized alarming, timely processing, and auditing to determine responsibility.
Overview of the bastion machine
Functionally speaking, it integrates core system operation and maintenance and security audit control The two main functions, in terms of technical implementation, cut off the terminal computer's direct access to network and server resources, and use a protocol proxy to take over the terminal computer's access to the network and server.
To put it figuratively, any access to a target by a terminal computer requires translation through an operation and maintenance security audit. For example, the operation and maintenance security audit plays the role of a gatekeeper, and all requests to network devices and servers must pass through this gate.
Therefore, the operation and maintenance security audit can intercept illegal access and malicious attacks, block illegal commands, filter out all illegal access to target devices, and detect misoperations and illegal operations by internal personnel. Audit monitoring to facilitate subsequent accountability tracking.
As an indispensable part of enterprise information security construction, security audit has gradually attracted the attention of users and is an important link in the enterprise security system. At the same time, safety audit is an effective risk control method for prevention before the event and early warning during the event, and is also a reliable source of evidence for post-event traceability.
The above is the detailed content of What is a bastion machine?. For more information, please follow other related articles on the PHP Chinese website!