Technical Solutions
It identifies China Mobile's Internet-exposed asset information and asset fingerprint information through automated means, identifies China Mobile's own assets, external assets and vendors to which the assets belong, establishes asset lists, and realizes automatic identification and management of the entire life cycle of the assets. Access to a variety of heterogeneous tools for security testing in the industry, achieving unified management of heterogeneous tools in task scheduling control and data recovery and processing, has the platform had security testing capabilities such as system vulnerability scanning, Web vulnerability scanning, weak password verification, etc. The security testing is task-driven, and process infiltration and articulation are carried out in each link from the beginning to the end of security testing, so that the process of issuing security tasks, executing tasks, comprehensively analyzing and presenting testing results, rectifying security problems, reviewing security problems, reporting security problems, etc. forms a complete closed loop of risk management. The introduction of external threat intelligence enables timely control of the security status of assets (system information, application components, component status, etc.), and combined with the acquired threat intelligence, enables accurate judgement of the scope of vulnerability impact and timely warning. Web shell risk, counterfeit phishing website risk, botnet risk, and high-risk weak password risk have been collected and identified.
Application Scenarios
The core capabilities of remote detection and auditing of Internet-exposed assets, system vulnerability scanning, Web vulnerability scanning, weak password verification, vulnerability warning, etc. have played an important supporting role in daily inspections, major protection and other tasks. It implements all-round management of assets such as network-wide asset identification, automated closed-loop control of the entire life cycle of assets, IPv6 asset detection, and asset search engine. It leverages correlation and analysis of external threat intelligence with the Internet-exposed Asset Database, to discover security risks of exposed assets, and release warnings.