Periodically check the accounts as the system administrator as follows:
Only users who pass authentication can log in to the application system. The user name and password complexity and password validity period need to be configured based on security requirements.
The password maintenance suggestions are as follows:
Uppercase letters
Lowercase letters
Digits
Special characters: ` ~ ! @ # $ % ^ & * ( ) - _ = + \ | [ { } ] ; : ' " , < . > / ?
Logging In to the OMU portal)Uppercase letters
Lowercase letters
Digits
Special characters: ` ~ ! @ # $ % ^ & * ( ) - _ = + \ | [ { } ] ; : ' " , < . > / ?
Uppercase letters
Lowercase letters
Digits
Space characters and the following special characters: ` ~ ! @ # $ % ^ & * ( ) - _ = + \ | [ { } ] ; : ' " , < . > / ?
Uppercase letters
Lowercase letters
Digits
Space characters and the following special characters: ~ ` ! @ # $ % ^ & * ( ) - _ + = | { } [ ] : ; ' " < > , . / ? \
You can audit logs to detect potential problems. The system records important operations in logs. You can protect log files by access control.
Periodically check system logs, program logs, and security logs. If any fault is detected, report it to your upper-level department. If you cannot locate or rectify the fault, contact technical support in a timely manner.
Periodically back up log files to external storage media such as disks, tapes, and CD-ROMs. After successful backup, delete the original log files to release the space.
Enterprise administrators are advised to periodically evaluate the device security, especially under circumstances such as system upgrade, capacity expansion, and network migration.
Back up data in the following scenarios:
Perform the following operations when a network connection is changed:
After system maintenance personnel report system attacks to the company, the company uses either of the following methods to resolve the attacks:
Before a device is repaired or deprecated, data stored on the device must be destructed securely.
The system starts to restore factory settings. After factory settings are restored, all configurations on the device are cleared.
Logging In to the OMU portal)
If you want to clear the data stored on the device, you are advised to press Reset on the device to restore the device to factory settings.
Software integrity protection provides the ability to verify software validity and prevent the installation of insecure or unauthenticated software or prevent installed software from being tampered with or infected with viruses. The integrity protection mechanism of software packages is implemented by using digital signatures.
Preparing software packages
OpenPGP is an open security protocol standard (RFC4880), which is widely used for data encryption and digital signatures. OpenPGP contains an independent digital signature standard, which differs from other digital signature standards in key storage, public key distribution mode, message digest calculation process, signature packet format, and verification process.
Installing software packages
Software Package Installation Scenario |
Description |
|---|---|
Installation scenario |
During installation, OpenPGP uses the public key to verify the software package signature. The software package can only be installed after the software package integrity has been verified. |
Patch or upgrade package installation |
When you upload a patch or an upgrade package on the OMU portal, the package will be loaded. When a software package is being loaded, the public key is used to verify the software signature. The software package can be installed only when it passes the verification. If it does not pass the verification, a failure message will be displayed. |
You need to formulate an application patch management regulation and designate specified personnel to semi-annually inspect the patches.
If patch installation is required, contact the equipment vendor. Do not perform upgrade by yourself.
System maintenance personnel must formulate emergency response mechanisms to deal with emergencies, recover the system, and minimize losses.