
Целью работы ÑвлÑетÑÑ Ð¿Ñ€Ð¾ÐµÐºÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ðµ и разработка прототипа платформы ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸Ñми Ñетевых ÑредÑтв защиты информации, применÑемой Ð´Ð»Ñ Ð¿Ð¾Ð²Ñ‹ÑˆÐµÐ½Ð¸Ñ ÐºÐ¾Ð¼Ð¿Ð»ÐµÐºÑной безопаÑноÑти инфраÑтруктуры. Предметом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑŽÑ‚ÑÑ Ð¼ÐµÑ…Ð°Ð½Ð¸Ð·Ð¼Ñ‹ ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸Ñми Ñетевых ÑредÑтв защиты информации. Объектом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑŽÑ‚ÑÑ Ñетевые ÑредÑтва защиты информации, подлежащие автоматизированному конфигурированию. Задачи, решаемые в ходе иÑÑледованиÑ: 1. Ðнализ рынка ÑиÑтем ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸Ñми Ñетевых ÑредÑтв защиты информации и формирование требований к данным ÑиÑтемам Ñ Ñ†ÐµÐ»ÑŒÑŽ ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð½Ð°Ð¸Ð±Ð¾Ð»ÐµÐµ воÑтребованного на рынке техничеÑкого решениÑ. 2. Разработка архитектуры и выбор техничеÑких решений Ð´Ð»Ñ ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð¿Ð»Ð°Ñ‚Ñ„Ð¾Ñ€Ð¼Ñ‹ ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸Ñми. 3. Разработка прототипа платформы ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸Ñми Ñетевых ÑредÑтв защиты информации. 4. ТеÑтирование прототипа платформы ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸Ñми Ñетевых ÑредÑтв защиты информации. Ð’ результате работы разработан программный прототип ÑиÑтемы, обеÑпечивающий реализацию концепции «инфраÑтруктура как код», включающий в ÑÐµÐ±Ñ Ð½ÐµÐ¾Ð±Ñ…Ð¾Ð´Ð¸Ð¼Ñ‹Ð¹ набор инÑтрументов, взаимоÑвÑзанных между Ñобой единым процеÑÑом, обеÑпечивающим формирование конфигурации в виде кода, ее хранение, теÑтирование, доÑтавку и мониторинг. Полученные результаты могут быть иÑпользованы в качеÑтве оÑновы Ð´Ð»Ñ Ñ€Ð°Ð·Ñ€Ð°Ð±Ð¾Ñ‚ÐºÐ¸ полнофункциональной ÑиÑтемы ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸Ñми Ñетевых ÑредÑтв защиты информации Ð´Ð»Ñ Ð¸ÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð½Ð° крупных предприÑтиÑÑ… РФ.
The goal of the work is to design and develop a prototype of a configuration management platform for network information security tools used to improve the comprehensive security of the infrastructure. The subject of the study is the mechanisms for managing configurations of network information security tools. The object of the study is network information security tools that are subject to automated configuration. Problems solved during the study: 1. Analysis of the market for configuration management systems for network information security tools and the formation of requirements for these systems in order to create the most popular technical solution on the market. 2. Development of architecture and selection of technical solutions to create a configuration management platform. 3. Development of a prototype platform for managing configurations of network information security tools. 4. Testing a prototype platform for managing configurations of network information security tools. As a result of the work, a software prototype of the system was developed that ensures the implementation of the “infrastructure as code†concept, which includes the necessary set of tools interconnected by a single process that ensures the formation of a configuration in the form of code, its storage, testing, delivery and monitoring. The results obtained can be used as a basis for the development of a full-featured configuration management system for network information security tools for use at large enterprises in the Russian Federation.
protection means, ÑÑедÑÑва заÑиÑÑ, инÑÑаÑÑÑÑкÑÑÑа как код, ÑпÑавление конÑигÑÑаÑиÑми, network security, configuration management, компÑÑÑеÑÐ½Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑÑ, конÑигÑÑаÑиÑ, ÑеÑÐµÐ²Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑÑ, configuration, infrastructure as code, computer security
protection means, ÑÑедÑÑва заÑиÑÑ, инÑÑаÑÑÑÑкÑÑÑа как код, ÑпÑавление конÑигÑÑаÑиÑми, network security, configuration management, компÑÑÑеÑÐ½Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑÑ, конÑигÑÑаÑиÑ, ÑеÑÐµÐ²Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑÑ, configuration, infrastructure as code, computer security
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
