A.Implement a virtual firewall(實(shí)施虛擬防火墻) B.Install HIPS on each VM(每個(gè)虛擬機(jī)安裝主機(jī)入侵防護(hù)系統(tǒng)) C.Virtual switches with VLANs(使用劃分VLAN的虛擬交換機(jī)) D.Develop a patch management guide(開(kāi)發(fā)補(bǔ)丁管理指南)
A.Application white listing(應(yīng)用程序白名單) B.Network penetration testing(網(wǎng)絡(luò)滲透測(cè)試) C.Application hardening(應(yīng)用加固) D.Input fuzzing testing(輸入模糊測(cè)試)
A.Hardware integrity(硬件完整性) B.Data confidentiality(數(shù)據(jù)機(jī)密性) C.Availability of servers(服務(wù)器可用性) D.Integrity of data(數(shù)據(jù)完整性)