Baseline Check Overview
What Is a Baseline Check?
Baselines specify the recommended security configurations for OSs, databases, middleware, and applications. They include the configurations of permissions, services, network, password security, and DJCP MLPS compliance.
HSS can check password complexity policies, common weak passwords, and other settings to detect insecure passwords and the configuration risks in systems and critical software. It also provides suggestions to help users correctly handle unsafe settings on servers.
Baseline Check Content
Check Item |
Description |
Supported HSS Edition |
---|---|---|
Baseline check |
Check the unsafe Tomcat, Nginx, SSH login, and system configurations found by HSS. The configuration check standards include cloud security practices, DJCP MLPS compliance, and the general security standard.
The following systems, databases, and applications can be checked:
|
Enterprise, premium, WTP, and container editions |
Password complexity policies |
A password complexity policy specifies the rules that must be followed by user passwords to improve password security and prevent brute-force attacks. This feature checks the password complexity policies in Linux and provides suggestions to help users improve password security. Check items include:
|
All |
Common weak passwords |
A weak password can be easily cracked. Weak passwords defined in the common weak password library. You can check for the weak passwords used by accounts and remind users to change them. Common weak password detection has the following restrictions:
|
All |
Scenarios
Usage Process
No. |
Operation |
Description |
---|---|---|
1 |
The baseline inspection supports automatic and manual baseline checks.
|
|
2 |
After the baseline inspection is complete, you need to view and handle baseline configuration risks. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.