- Print
- PDF
System Security Checker scenario
- Print
- PDF
Available in Classic and VPC
You can inspect server security settings conveniently by using the NAVER Cloud Platform’s System Security Checker. You can check how to proceed in details at Start System Security Checker and Use App Security Checker, but we recommend you to look at the entire user scenario of System Security Checker first. If you check out how to use after learning the user scenario, you can use System Security Checker more smoothly. System Security Checker's entire order and the description for each step are the following:
1. Set usage permissions
2. Run security setting inspection
3. View inspection result
4. View and respond with suggested settings
1. Set usage permissions
Set the permission setting to use System Security Checker. The System Security Checker's permissions are defined by mapping them to the “role” of a sub account issued by the NAVER Cloud Platform’s Sub Account. Thus, you need to first create sub accounts other than your main account through Sub Account.
Sub Account is a service provided free of charge upon subscription request. For an introduction on Sub Account and details about its pricing plans, refer to the Services > Management & Governance > Sub Account menu in the NAVER Cloud Platform portal.
You can configure the System Security Checker's admin and user authorities by using a sub account that Sub Account provides. You can refer to the following guide(s):
2. Run security setting inspection
Access the server that you wish to inspect security settings, download the agent and run it. You can designate the inspection target by the Run option. You can refer to the following guide(s):
3. View inspection result
You can see the inspection result on the NAVER Cloud Platform console. You can check the inspection result of the detailed items via the console and inspection report and download it as a PDF or Excel file. You can refer to the following guide(s):
4. View and respond with suggested settings
If the security vulnerability was found through the inspection, it suggest to edit the security settings. You can view the suggested settings for inspection items and the responding methods. You can refer to the following guide(s):