Cloud
主机完整性监控
Continuous assessment of a host system’s files, processes, and configurations to detect unauthorized changes, tampering, or integrity violations indicating compromise.
Quick answer: Continuous assessment of a host system’s files, processes, and configurations to detect unauthorized changes, tampering, or integrity violations indicating compromise.
This term page is part of the Protermify Cybersecurity glossary and is published as static HTML for fast indexing and clear language coverage.
Definition
Continuous assessment of a host system’s files, processes, and configurations to detect unauthorized changes, tampering, or integrity violations indicating compromise.
Operational example
Host integrity monitoring detected unauthorized modification of system binaries, triggering an immediate alert to SOC for investigation.
Localized example
主机完整性监控检测到系统二进制文件的未经授权修改,并立即向SOC发出警报以便调查。
Definition language
English reference definition
Source
ISO 27001, NIST Cybersecurity Framework, MITRE ATT&CK
Exam relevance
- CISSP
- CompTIA Security+
- CEH
Target audience
- SOC Analysts
- Security Engineers
- Incident Responders