零信任范式的采用.pdf

编号:184999 PDF 11页 395.12KB 下载积分:VIP专享
下载报告请您先登录!

零信任范式的采用.pdf

1、1|2024 SNIA.All Rights Reserved.Adopting the Zero Trust ParadigmEric Hibbard,CISSP,FIP,CISASamsung Semiconductor,Inc.2|2024 SNIA.All Rights Reserved.Perimeter Security Model Many organizations use a traditional perimeter security model Assumes that all users inside the network can be trusted while a

2、ll users outside the network are untrustworthy Assumes an effective barrier can be established and maintained Resources accessed from the Internet are often located within a DMZ Firewalls,intrusion detection systems(IDS),and virtual private networks(VPN)are common elements of perimeter security3|202

3、4 SNIA.All Rights Reserved.Zero Trust(ZT)Security Model Primarily focused on data and service protection;can also include all enterprise assets(devices,infrastructure components,applications,virtual and cloud components)subjects(end users,applications and other non-human entities that request inform

4、ation from resources)Assumes that an attacker is present in the environment Assumes an enterprise-owned environment is no different(i.e.,no more trustworthy)than any non-enterprise-owned environment In this paradigm,there is no implicit trust4|2024 SNIA.All Rights Reserved.Tenets of Zero Trust All d

5、ata sources and computing services are considered resources All communication is secured regardless of network location Access to individual enterprise resources is granted on a per-session basis Access to resources is determined by dynamic policy The enterprise monitors and measures the integrity a

6、nd security posture of all owned and associated assets All resource authentication and authorization are dynamic and strictly enforced before access is allowed The enterprise collects as much information as possible about the current state of assets,network infrastructure and communications and uses

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(零信任范式的采用.pdf)为本站 (alkaid) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠