HSS Best Practices You May Need
This document summarizes the operation practices of Host Security Service (HSS) in common application scenarios. It provides explicit solution descriptions and operation guidance for each scenario, making it easier for you to use HSS to improve the security of servers and containers.
HSS Best Practices
Category |
Related Document |
---|---|
Access HSS |
Connecting Third-Party Servers to HSS Through Direct Connect and VPC Endpoint |
Third-Party Servers Accessing HSS Through a Direct Connect and Proxy Servers |
|
Server login protection |
|
Vulnerability fixing |
|
SaltStack Remote Command Execution Vulnerabilities (CVE-2020-11651 and CVE-2020-11652) |
|
Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938) |
|
Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-1027) |
|
Weak password protection |
|
Ransomware prevention |
|
Intrusion detection |
|
File protection |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot