A.Implement a virtual firewall(實施虛擬防火墻) B.Install HIPS on each VM(每個虛擬機安裝主機入侵防護系統(tǒng)) C.Virtual switches with VLANs(使用劃分VLAN的虛擬交換機) D.Develop a patch management guide(開發(fā)補丁管理指南)
A.Application white listing(應(yīng)用程序白名單) B.Network penetration testing(網(wǎng)絡(luò)滲透測試) C.Application hardening(應(yīng)用加固) D.Input fuzzing testing(輸入模糊測試)
A.Hardware integrity(硬件完整性) B.Data confidentiality(數(shù)據(jù)機密性) C.Availability of servers(服務(wù)器可用性) D.Integrity of data(數(shù)據(jù)完整性)