Baseline Check Overview
What Is a Baseline Check?
Baselines specify the recommended security configurations for OSs, databases, middleware, and applications. They include the configurations of permissions, services, network, password security, and DJCP MLPS compliance.
HSS can check password complexity policies, common weak passwords, and other settings to detect insecure passwords and the configuration risks in systems and critical software. It also provides suggestions to help users correctly handle unsafe settings on servers.
Baseline Check Content
Check Item |
Description |
Supported HSS Edition |
---|---|---|
Baseline check |
Check the unsafe Tomcat, Nginx, SSH login, and system configurations found by HSS. The configuration check standards include cloud security practices, DJCP MLPS compliance, and the general security standard.
The following systems, databases, and applications can be checked:
|
Enterprise, premium, WTP, and container editions |
Password complexity policies |
A password complexity policy specifies the rules that must be followed by user passwords to improve password security and prevent brute-force attacks. This feature checks the password complexity policies in Linux and provides suggestions to help users improve password security. Check items include:
For details about the password complexity policy check, see Defining a Rule to Check Password Complexity Policies. |
All |
Common weak passwords |
A weak password can be easily cracked. Weak passwords defined in the common weak password library. You can check for the weak passwords used by accounts and remind users to change them. Common weak password detection has the following restrictions:
For details about custom weak passwords, see Defining Weak Passwords. |
All |
Scenarios
Usage Process
No. |
Operation |
Description |
---|---|---|
1 |
After HSS is enabled for a server, HSS automatically performs a baseline check on the server every day from 04:00 to 05:00 based on the default policy. If the default configuration does not meet your requirements, you can modify it or create a custom check policy. |
|
2 |
You can perform a check immediately or schedule it for later.
|
|
3 |
After the baseline check is complete, view and handle the baseline configuration risks in a timely manner. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot