《3158 Building a Zero Trust Secure MQ Environment.pdf》由会员分享,可在线阅读,更多相关《3158 Building a Zero Trust Secure MQ Environment.pdf(43页珍藏版)》请在三个皮匠报告上搜索。
1、October 21-24,2024Mandalay Bay Convention CenterLas Vegas,NevadaMatt LemingIBM,STSM,Architect MQ for z/OSSession 3158Building a Zero Trust,Secure MQ EnvironmentContentsZero TrustWhat is Zero Trust?PrinciplesIBM MQ and Zero Trust InventoryAuthenticationLeast privilegeAuditingOther considerationsMQIPT
2、Channel authentication rulesAMS IntegritySummaryQuestions2IBM TechXchange|2024 IBM Corporation#IBMTechXchangeZero Trust3IBM TechXchange|2024 IBM Corporation#IBMTechXchangeWhat is Zero Trust?4https:/csrc.nist.gov/pubs/sp/800/207/final Zero trust is a cybersecurity paradigm focused on resource protect
3、ion and the premise that trustis never granted implicitly but must be continually evaluated.Zero trust architecture is an end-to-end approach to enterprise resource and data security that encompasses identity(person and non-person entities),credentials,access management,operations,endpoints,hosting
4、environments,and the interconnecting infrastructure.IBM TechXchange|2024 IBM Corporation#IBMTechXchange5An approach to security that eliminates implicit trustThe model of relying on perimeter firewalls to protect your critical systems does not workAttackers have proven that getting past the“moat”is
5、quite easyMust guard against insider threatsIBM TechXchange|2024 IBM Corporation#IBMTechXchangeWhat is Zero Trust?3 principlesAuthenticate Authenticate everyoneeveryone No implicit trust Every connection authenticated Only able to do what they need to do Request access for resources Encrypt all nece
6、ssary data Collect audit logs6Least privilegeLeast privilegeAssume breachAssume breachIBM TechXchange|2024 IBM Corporation#IBMTechXchangeIBM MQ and Zero Trust7IBM TechXchange|2024 IBM Corporation#IBMTechXchange3 principlesAuthenticate Authenticate everyoneeveryone No implicit trust Every connection