[Wandan safe] A contempt chain in the Internet of the Internet ~~

Author:Information security research Time:2022.08.03

My journal has been launched for a long time, the [Morning Safety] column,

In the form of graphic comics, I will tell you some interesting things and news of the "Internet security circle",

Welcome everyone to submit a lot

In this issue, we have united Aoko Cloud's safe Qing Xiaobao,

Talk about a contempt chain in the online security circle. Essence Essence Don't worry, keep looking down.

The "anti -contempt" guide in the field of "host safety"

Jin Yong said: Where there are people, there are rivers and lakes

Actually, except for rivers and lakes

There are "despicable chains" in where there are people

Especially in the constant safety circle of technology

Just released a chain of contempt in the field of host safety

CWPP → EDR → EPP → anti -virus software

Let's see them one by one

How is it despised by others

Or despise others

01 anti -virus software

As the "big brother" in the security world

Falcinating software is working hard to protect the terminal from invasion of the virus

Helpless it can only identify the known virus according to the virus feature code

Can't identify and kill the virus without the virus library

This not only checks the lag

And as there are more and more virus types

The virus library is also getting larger and bloated

Unable to meet the needs of enterprises light, fast, good, and provincial

The slap in the back waves took one after another

Antivirus software can only be rejuvenated in the second line

02 Second -generation anti -virus software

From passive feature code comparison

Evolution into new virus recognition that does not require real -time updates

Such as behavioral detection

Determine whether it is a malicious program based on its behavior

This is not dependent on the active defense software of traditional feature code scanning

Known as the second -generation anti -virus software

But it is just a supplement to traditional passive defense technology

Can't cure all diseases

The most terrible is that it can only prevent virus on the PC side

Can't keep up with the pace of hacker attack path

03 EPP

If you want to protect the terminal in all aspects

Starting from the PC's anti -virus software is not enough

Because hackers can not only invade from other paths outside the terminal

Can also be invaded with other means other than virus infection

In this case, the concept of EPP is generated

EPP is also known as the third -generation anti -virus software

(Endpoint Protection Platform, endpoint protection platform)

Unlike a single antivirus software

EPP is a set of software tools and technical team operations

It combines multiple endpoint protection solutions

Can protect various types of endpoint devices

(PC, smartphone, tablet)

Can also be used through data loss protection and data encryption services

To protect the static data on the endpoint device

04 EDR

But EPP products are more powerful

Can't cope with complex and targeted attacks

The attacker can successfully bypass the defense through customized malware

Use a variety of technical means and tool combinations

Even more difficult to be recognized

Even if partial alarm is issued

The alarm of various defense tools is also independent of each other

There is nothing to do with each other

It is difficult for security personnel to use these alarms to see the full picture of the attack

In addition, EPP lacks continuous monitoring of the terminal

It is difficult for security personnel to locate the source of threats and the impact caused by threats

To solve these problems

EDR technology came into being

EDR is the next -generation anti -virus element

(Endpoint Detection and Response, endpoint detection and response platform)

Security system combined with other tools

Can continue to monitor the file activities on the endpoint

Actively detect new or unknown threats

You can quickly detect and position the problem when attacking

And track traceability after the attack

Avoid attacks again

05 CWPP

But EDR hasn't been in a few days

Just despise other terminal security products

Because EDR is very powerful in terms of endpoint protection

But in the field of host safety, you can only count as a rookie

In the cloud era, the server forms from physical machines to virtual machines and containers

There is even no server architecture change

The calculation characteristics of these servers themselves

Different from the security threats facing

Traditional terminal products can't play instantly

To this end, Gartner specifically defines a located in

Contempt at the top of the chain -CWPP

(Cloud Workload Protection Platforms)

It is a safe family bucket used to protect the workload on the cloud

For the workload on the cloud, provide multiple dimensions,

Comprehensive protection ability

Gartner divides this ability from the foundation to secondary eight categories

CWPP covers the safety needs of the entire life cycle of the workload

You can protect the server workload from the attack from attack

Regardless of the location or particle size of the workload

CWPP provides all server jobs

Visible and controllability of the load

Although the function of CWPP is enough to make it dominant

But 90%of the actual landing effect is very pulling

The main reasons include the following 3 points

1. Hanging sheep head selling dog meat, not CWPP native product

CWPP concept is released

Immediately attracted the attention of many security manufacturers

But many manufacturers are still dead EDR

Either it is unable to develop products that are truly based on the concept of CWPP

So I thought about a speculative method to replenish other safety products and make up for it.

I was changed to a product that claimed to be CWPP

But you know the actual effect. Essence Essence

Second, the sense of existence of crazy brushing, focusing on the affected business

The essence of security is to better run the business

Some security products violate this basic principle

Agent installed on the host is not only large in size

Also modify the kernel

The invasion of the server is great, and the compatibility hazards are great

If you are not careful, it will affect the business

Third, the security world is green, the function is small and shallow

CWPP products launched by some manufacturers

Although it was not modified by other products

But it was too young, just one or two years after being born

Not only is the functional module missing a lot

The depth of the existing function is not enough

Actually use the effect to imagine

So how to choose a CWPP product?

To say the CWPP product that does not pull the hoe

Qing Xiaobao believes that there should be three younger brothers, the three younger brothers of Agent, Engine, and Console

These three younger brothers can basically defend the threats in all directions

All three younger brothers are extraordinary

Agent lightweight, stable, affecting business 0 effects

The Engine engine is flexible and expanded, and the invasion is alarm in real time

Console control center can be seen in real time, user one -click operation management

、 People have their own duties and cooperate with each other

Completed the one -stop protection of the host information collection, analysis, and presentation

Based on adaptive security concept

Fine particle size, multi -angle, continuousization

Real -time dynamic analysis of threats

Automatic adaptation of changing networks and threat environments

Continue to optimize your own security defense mechanism

Let all kinds of threatening inorganic take

Now you understand this contempt chain, haha ​​~~

- END -

All of them are completed by the Chinese people, and the most complicated genome group | Decoding naked oats "China core"

As a worldwide cultivation of 42 countries and regions of the five continents, oat...

New frozen living cell technology can cause organs to be unable to be damaged

Science Fiction Network June 22 (Liu Yazhu) Organ donation is based on the wishes ...