What is GCB?
GCB is the abbreviation of Government Configuration Baseline.
The purpose of GCB is to standardize the consistent security settings (such as password
length, update period, etc.) of information and communication equipment (such as personal computers,
server hosts, and Netcom equipment, etc.), so as to reduce the risk of becoming a hacker intrusion channel
and causing information security incidents。
TWGCB refers to the setting value specified by the US government configuration benchmark for the Taiwan
computer system environment.
As a co-supply contract manufacturer, WinNexus-GCB module independently developed by Chengyun
Technology can detect and apply GCB to the PC of government agencies and units, and display the
application of GCB in the form of graphs to test whether the endpoint device complies with the TWGCB
group. It is a powerful tool for agencies to conduct GCB import, GCB detection, GCB verification and other
work.
Website link:行政院國家資通安全會報技術服務中心
TWGCB
Account Policy:Detect configurations such as password policy, password length, and account lockout
policy.
Computer Settings:Detects configurations such as security options, user authorization assignments,
Internet communication settings, autoplay, etc.
Firewall Settings:Windows Firewall public profiles, private profiles, domain profiles and other
configurations are detected.
User Settings:User screen saver, Internet communication, network sharing, attachment manager and other
configurations are checked.
Internet Explorer:Internet Explorer's internal network area, trusted website area and other areas are
checked for configuration such as JAVA permissions, login options, Active X control items and other
configuration files.
Google Chrome:Detects configurations such as Google Chrome content settings, HTTP authentication
policies, password managers, setting remote access options, extensions, etc.
Microsoft Edge:Check Microsoft Edge Computer Settings configuration in privacy and security, browser
experience, extensions, developer tools, etc.
Exception management: When the configuration settings of the organization are different from the items
listed in the "Government Configuration Reference Document" announced by the Technical Service Center,
they must be included in the exception management to control the possible risks. If it is not listed in
the "Government Configuration Baseline Document", it does not need to be included in the exception
management.