Abstract

In the article an approach to organization of information security infrastructure using the configuration management system is considered, which allows reducing of service labor costs, acceleration of installation, tuning of information and technical services and the software on virtual and physical servers. An analytical review and qualitative comparison of the most common similar currently existing systems are presented, taking into account the characteristics directly related to safe storage of information and interaction between the servers and the choice of the most suitable system for this work. A theoretical description of the security infrastructure building algorithm and examples of software implementation using the SaltStack configuration management system are given. Software for processing of vulnerability scanner reports is developed.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.