System Security Checker scenario
    • PDF

    System Security Checker scenario

    • PDF

    Article Summary

    Available in Classic and VPC

    You can inspect server security settings conveniently by using the NAVER Cloud Platform’s System Security Checker. You can check how to proceed in details at Start System Security Checker and Use App Security Checker, but we recommend you to look at the entire user scenario of System Security Checker first. If you check out how to use after learning the user scenario, you can use System Security Checker more smoothly. System Security Checker's entire order and the description for each step are the following:

    1. Set usage permissions
    2. Run security setting inspection
    3. View inspection result
    4. View and respond with suggested settings

    1. Set usage permissions

    Set the permission setting to use System Security Checker. The System Security Checker's permissions are defined by mapping them to the “role” of a sub account issued by the NAVER Cloud Platform’s Sub Account. Thus, you need to first create sub accounts other than your main account through Sub Account.

    Note

    Sub Account is a service provided free of charge upon subscription request. For an introduction on Sub Account and details about its pricing plans, refer to the Services > Management & Governance > Sub Account menu in the NAVER Cloud Platform portal.

    You can configure the System Security Checker's admin and user authorities by using a sub account that Sub Account provides. You can refer to the following guide(s):

    2. Run security setting inspection

    Access the server that you wish to inspect security settings, download the agent and run it. You can designate the inspection target by the Run option. You can refer to the following guide(s):

    3. View inspection result

    You can see the inspection result on the NAVER Cloud Platform console. You can check the inspection result of the detailed items via the console and inspection report and download it as a PDF or Excel file. You can refer to the following guide(s):

    4. View and respond with suggested settings

    If the security vulnerability was found through the inspection, it suggest to edit the security settings. You can view the suggested settings for inspection items and the responding methods. You can refer to the following guide(s):


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.