全文预览

网络安全测试报告2

上传者:学习一点 |  格式:docx  |  页数:13 |  大小:1059KB

文档介绍
en when protected with secure authentication mechanisms.РConfigure the database server to only allow access to trusted systems. For example, the PCI DSS standard requires you to place the database in an work zone, segregated from the DMZР192.168.4.121Р高РThe database allows any remote system the ability to connect to it. It is mended to limit direct access to trusted systems because databases may contain sensitive data, and new vulnerabilities and exploits are discovered routinely for them. For this reason, it is a violation of PCI DSS section 1.3.7 to have databases listening on ports accessible from the , even РConfigure the database server to only allow access to trusted systems. For example, the PCI DSS standard requires you to place the database in an work zone, segregated from the DMZ

收藏

分享

举报
下载此文档