parent
9cd723ed6d
commit
a04dbfd95a
Binary file not shown.
Binary file not shown.
@ -1,393 +0,0 @@
|
||||
<?xml version='1.0' encoding='utf-8'?>
|
||||
<graphml xmlns="http://graphml.graphdrawing.org/xmlns" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
|
||||
<key id="d11" for="edge" attr.name="created_at" attr.type="long" />
|
||||
<key id="d10" for="edge" attr.name="file_path" attr.type="string" />
|
||||
<key id="d9" for="edge" attr.name="source_id" attr.type="string" />
|
||||
<key id="d8" for="edge" attr.name="keywords" attr.type="string" />
|
||||
<key id="d7" for="edge" attr.name="description" attr.type="string" />
|
||||
<key id="d6" for="edge" attr.name="weight" attr.type="double" />
|
||||
<key id="d5" for="node" attr.name="created_at" attr.type="long" />
|
||||
<key id="d4" for="node" attr.name="file_path" attr.type="string" />
|
||||
<key id="d3" for="node" attr.name="source_id" attr.type="string" />
|
||||
<key id="d2" for="node" attr.name="description" attr.type="string" />
|
||||
<key id="d1" for="node" attr.name="entity_type" attr.type="string" />
|
||||
<key id="d0" for="node" attr.name="entity_id" attr.type="string" />
|
||||
<graph edgedefault="undirected">
|
||||
<node id="驿来特平台">
|
||||
<data key="d0">驿来特平台</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">A platform with security and maintenance features, including monitoring and protection measures for databases and networks.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="微信公众号管理功能模块">
|
||||
<data key="d0">微信公众号管理功能模块</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">A module within the platform that provides operational monitoring for domains, account balances, and database instances.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="Mysql数据库">
|
||||
<data key="d0">Mysql数据库</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">A database system experiencing rapid disk growth, requiring solutions to manage its performance.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="云防火墙">
|
||||
<data key="d0">云防火墙</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">A network security tool providing access control and intrusion prevention for the platform.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="Web应用防火墙">
|
||||
<data key="d0">Web应用防火墙</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">A security tool that protects web applications by analyzing and blocking malicious requests.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="云安全中心">
|
||||
<data key="d0">云安全中心</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">A security service offering protection against viruses, vulnerabilities, and malicious attacks on hosts.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="阿里云">
|
||||
<data key="d0">阿里云</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">A cloud service provider offering vulnerability scanning and other security services.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="运维监控功能">
|
||||
<data key="d0">运维监控功能</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">A feature enabling monitoring of domains, account balances, and database instances.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="防护措施">
|
||||
<data key="d0">防护措施</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Security measures including network, application, and host-level protections.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="维护制度">
|
||||
<data key="d0">维护制度</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Maintenance protocols ensuring database recovery and system security.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="MongoDb实例">
|
||||
<data key="d0">MongoDb实例</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">MongoDB database instances being monitored by the platform's operational features.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="Redis实例">
|
||||
<data key="d0">Redis实例</data>
|
||||
<data key="d1">organization</data>
|
||||
<data key="d2">Redis database instances monitored for CPU and disk usage by the platform.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="ACL访问控制策略">
|
||||
<data key="d0">ACL访问控制策略</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Access control list policies implemented in cloud firewall for network security.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="CNAME接入方式">
|
||||
<data key="d0">CNAME接入方式</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Domain name connection method used for web application firewall protection.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="区域封禁功能">
|
||||
<data key="d0">区域封禁功能</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Geographical blocking feature in web application firewall to restrict foreign IP access.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="扫描防护攻击">
|
||||
<data key="d0">扫描防护攻击</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Scan protection feature in WAF to block malicious scanning attempts.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="BOT管理">
|
||||
<data key="d0">BOT管理</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Bot management system to block crawlers and automated machine behavior.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="主机防勒索">
|
||||
<data key="d0">主机防勒索</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Host anti-ransomware protection provided by cloud security center.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="数据库防勒索">
|
||||
<data key="d0">数据库防勒索</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Database anti-ransomware feature in cloud security solutions.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="等保要求">
|
||||
<data key="d0">等保要求</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Information security level protection requirements for system maintenance.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="RedoLog日志">
|
||||
<data key="d0">RedoLog日志</data>
|
||||
<data key="d1">category</data>
|
||||
<data key="d2">Database redo logs used for incremental recovery testing.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="空难性故障恢复演练">
|
||||
<data key="d0">空难性故障恢复演练</data>
|
||||
<data key="d1">event</data>
|
||||
<data key="d2">Disaster recovery drills to establish service restoration procedures.</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<node id="漏洞扫描服务">
|
||||
<data key="d0">漏洞扫描服务</data>
|
||||
<data key="d3">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d2">Alibaba Cloud provides vulnerability scanning services for system security.</data>
|
||||
<data key="d1">UNKNOWN</data>
|
||||
<data key="d4">驿来特平台安全.docx</data>
|
||||
<data key="d5">1751799414</data>
|
||||
</node>
|
||||
<edge source="驿来特平台" target="微信公众号管理功能模块">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The platform includes the WeChat public account management module for operational monitoring.</data>
|
||||
<data key="d8">monitoring,platform feature</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="驿来特平台" target="云防火墙">
|
||||
<data key="d6">9.0</data>
|
||||
<data key="d7">The platform uses cloud firewall for network security and access control.</data>
|
||||
<data key="d8">network protection,security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="驿来特平台" target="Web应用防火墙">
|
||||
<data key="d6">9.0</data>
|
||||
<data key="d7">The platform employs a web application firewall to protect against malicious requests.</data>
|
||||
<data key="d8">application protection,security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="驿来特平台" target="云安全中心">
|
||||
<data key="d6">9.0</data>
|
||||
<data key="d7">The platform utilizes a cloud security center for host and database protection.</data>
|
||||
<data key="d8">host protection,security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="驿来特平台" target="阿里云">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The platform leverages Alibaba Cloud services for vulnerability scanning and security.</data>
|
||||
<data key="d8">cloud services,security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="微信公众号管理功能模块" target="运维监控功能">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">The module provides operational monitoring features for various platform components.</data>
|
||||
<data key="d8">functionality,monitoring</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="Mysql数据库" target="运维监控功能">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The monitoring function tracks MySQL database disk growth and performance issues.</data>
|
||||
<data key="d8">performance tracking,resource monitoring</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="云防火墙" target="防护措施">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The cloud firewall is part of the platform's network security measures.</data>
|
||||
<data key="d8">network protection,security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="云防火墙" target="ACL访问控制策略">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The cloud firewall implements ACL policies for network access control.</data>
|
||||
<data key="d8">access management,network security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="Web应用防火墙" target="防护措施">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The web application firewall is a key component of the platform's application security.</data>
|
||||
<data key="d8">application protection,security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="Web应用防火墙" target="CNAME接入方式">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The WAF uses CNAME method for domain protection and IP hiding.</data>
|
||||
<data key="d8">domain security,protection method</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="Web应用防火墙" target="区域封禁功能">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">The WAF includes geographical blocking to restrict foreign IP access.</data>
|
||||
<data key="d8">access control,geographical restriction</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="Web应用防火墙" target="扫描防护攻击">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">The WAF provides scanning protection against malicious probes.</data>
|
||||
<data key="d8">security scanning,threat prevention</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="Web应用防火墙" target="BOT管理">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">The WAF includes bot management to block automated threats.</data>
|
||||
<data key="d8">automated threat prevention,bot protection</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="云安全中心" target="防护措施">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The cloud security center is integral to the platform's host and database security.</data>
|
||||
<data key="d8">host protection,security</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="云安全中心" target="主机防勒索">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The security center offers anti-ransomware protection for hosts.</data>
|
||||
<data key="d8">host security,ransomware protection</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="云安全中心" target="数据库防勒索">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The security center provides anti-ransomware features for databases.</data>
|
||||
<data key="d8">database security,ransomware protection</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="阿里云" target="维护制度">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">Alibaba Cloud's services support the platform's maintenance protocols, including vulnerability scanning.</data>
|
||||
<data key="d8">cloud services,maintenance</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="阿里云" target="漏洞扫描服务">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">Alibaba Cloud provides vulnerability scanning services for system security.</data>
|
||||
<data key="d8">cloud services,security scanning</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="运维监控功能" target="MongoDb实例">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">The monitoring system observes MongoDB instance metrics and performance.</data>
|
||||
<data key="d8">database monitoring,performance tracking</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="运维监控功能" target="Redis实例">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">The monitoring feature tracks Redis instance CPU and disk usage.</data>
|
||||
<data key="d8">performance tracking,resource monitoring</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="维护制度" target="等保要求">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The maintenance protocols follow information security level protection requirements.</data>
|
||||
<data key="d8">compliance,security standards</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="维护制度" target="RedoLog日志">
|
||||
<data key="d6">7.0</data>
|
||||
<data key="d7">The maintenance procedures use redo logs for incremental recovery testing.</data>
|
||||
<data key="d8">database maintenance,recovery testing</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
<edge source="维护制度" target="空难性故障恢复演练">
|
||||
<data key="d6">8.0</data>
|
||||
<data key="d7">The maintenance system includes disaster recovery drills for service restoration.</data>
|
||||
<data key="d8">disaster preparedness,recovery planning</data>
|
||||
<data key="d9">chunk-303a6253ad5ce6cedc3106ad88ac03a7</data>
|
||||
<data key="d10">驿来特平台安全.docx</data>
|
||||
<data key="d11">1751799414</data>
|
||||
</edge>
|
||||
</graph>
|
||||
</graphml>
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
Loading…
Reference in new issue