How Do I Handle Security Configuration Issues?
- Sensitive information, for example, key files, certificate files, source code files, and debugging tools
- Problems in the user and group configurations, hard-coded credentials, and authorization and access control. Note that some check items apply to operation systems (OSs) only.
Handle the security configuration issues according to the following instructions.
Export the PDF report and search for security configuration issues. The result of each check item can be pass, failed, or NA (for software packages or firmware that does not include OSs).
The report includes the following items:
- Check items, or, the check methods
- Files that have issues, if any
- Recommended fix suggestions
- Description of check items
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot