《利用零信任数据包路由防范数据泄露威胁 [LRN2553].pdf》由会员分享,可在线阅读,更多相关《利用零信任数据包路由防范数据泄露威胁 [LRN2553].pdf(24页珍藏版)》请在三个皮匠报告上搜索。
1、Zero Trust Packet RoutingProtecting Against Exfiltration ThreatsChrista ScuraDirector of Product Management Identity&SecurityOracleOct 13-16,2025Ryo ShirahamaSenior Solutions ArchitectNomura Research Institute What Well Cover2Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restrict
2、ed/Highly Restricted123Why Are We Here?Zero Trust Packet RoutingWhats New4Securing an Oracle Application5NRI:Where Security Comes First6Whats NextWhy Are We Here?Global losses driven by data exfiltration3Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Restricted$1
3、0.5 TAverage cost per data breechAverage cost per attack$4.3 M$4.4 MSource:IBM The Security Challenges of Traditional Network Security Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Restricted4Overly Complex:Thousands of IP rules and configurations to manage lead
4、 to costly mistakes.Lateral Movement:A threat actor who gains access to a single node can move freely across the network to access sensitive data.Data Exfiltration:Attackers who have access to data can use their own credentials to transfer it to external,unauthorized locations.Compromised Credential
5、s:Stolen credentials can be used from anywhere to access sensitive information,even when the network itself is secure.Complex rules,small mistakes,and attackers exploit every gap.That is why we built Zero Trust Packet Routing5Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restrict
6、ed/Highly RestrictedThere Must Be a Better WayLarge enterprise applications can require 5,000+policiesNetwork security admins juggle hundreds of rules per subnet6Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly RestrictedLegacy controls dont work for modern,interco