Design Concept
OneTerm Solve
OneTerm offers network security solutions designed to enhance network security, especially when accessing sensitive systems and resources.
-
Access control: Acting as an intermediary, OneTerm restricts direct access to critical systems. Users must authenticate through OneTerm before accessing other servers or systems.
-
Security audit: OneTerm can record user logins and activities, providing audit logs for investigation in case of security incidents. This ensures that every user’s actions are traceable and auditable.
-
Jump access to: OneTerm offers a jump host mechanism, allowing users to connect to other internal servers through OneTerm. This helps reduce the risk of exposing internal servers directly to the outside, as only OneTerm needs to be accessible externally.
-
Password management: OneTerm can enforce robust password policies and centrally manage passwords through a single entry point. This helps improve the overall system’s password security.
-
Session recording: OneTerm can record user sessions with servers, which is valuable for monitoring and investigating privileged user activities. In case of security incidents, session recordings can be replayed to understand detailed operations.
-
Prevent direct attacks: Since OneTerm is the sole entry point for systems and resources, it can serve as a primary obstacle for attackers. This helps reduce the risk of direct attacks on internal systems.
-
Unified access: OneTerm provides a single entry point through which users can access different systems without needing to remember multiple login credentials. This enhances user convenience and work efficiency.
OneTerm Advantage
As part of the Veops Technology operations and maintenance system, OneTerm not only meets the requirements for security control, operational security audit, and compliance with Level 3 protection requirements, but also integrates closely with CMDB to facilitate user operations.
-
Authentication and Authorization: Authentication and Authorization: OneTerm should have a robust and flexible identity authentication and authorization mechanism. This includes supporting multi-factor authentication to ensure that only authorized users can access internal network resources and enabling fine-grained management of user permissions.
-
Secure communication: OneTerm supports secure communication protocols and encryption technologies to protect data transmission between users and internal servers. This helps prevent man-in-the-middle attacks and data leakage.
-
Audit and monitoring: OneTerm features powerful audit and monitoring capabilities, recording user activities and generating audit logs. This helps trace security incidents, identify potential threats, and meet compliance requirements.
-
Remote Management and Session Isolation: OneTerm supports remote management, allowing administrators to securely manage internal servers. Additionally, it should have session isolation functionality to ensure that access between users is isolated from each other, preventing lateral movement attacks.
-
Tightly Integrated with Open Source CMDB OneTerm is closely integrated with Weiyi CMDB (open-source), allowing users to import assets with a single click, ensuring convenient operation and smooth processes.
OneTerm is open and shared, hoping to make progress with all.