NSA:在网络和环境支柱中推进零信任成熟度 12页 2024

VIP文档

ID:72672

阅读量:1

大小:0.63 MB

页数:12页

时间:2025-01-03

金币:10

上传者:人情世故
U/OO/125052-24 | PP-24-0689 | MAR 2024 Ver. 1.0
National Security Agency | Cybersecurity Information Sheet
Advancing Zero Trust Maturity Throughout the
Network and Environment Pillar
Executive summary
After gaining access to an organization’s network, one of the most common techniques
malicious cyber actors use is lateral movement through the network, gaining access to
more sensitive data and critical systems. The Zero Trust network and environment pillar
curtails adversarial lateral movement by employing controls and capabilities to logically
and physically segment, isolate, and control access (on-premises and off-premises)
through granular policy restrictions.
The network and environment pillar works in concert with the other Zero Trust pillars as
part of a holistic Zero Trust security model that assumes adversary breaches occur
inside the network, and so limits, verifies, and monitors activities throughout the
network.
The concepts introduced in this cybersecurity information sheet provide guidance on
enhancing existing network security controls to limit the potential impact of a
compromise through data flow mapping, macro and micro segmentation, and software
defined networking. These capabilities enable host isolation, network segmentation,
enforcement of encryption, and enterprise visibility. As organizations mature their
internal network control, they greatly improve their defense-in-depth posture and,
consequently, can better contain, detect, and isolate network intrusions.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭