1-04在设备支柱中推进零信任成熟度 18页

VIP文档

ID:72692

阅读量:1

大小:0.89 MB

页数:18页

时间:2025-01-03

金币:10

上传者:人情世故
U/OO/214644-23 | PP-23-3606 | OCT 2023 Ver. 1.0
National Security Agency | Cybersecurity Information Sheet
Advancing Zero Trust Maturity Throughout the
Device Pillar
Executive summary
Continued cyber incidents have called attention to the immense challenges of ensuring
effective cybersecurity across the federal government, as with many large enterprises,
and demonstrate that “business as usual” approaches are no longer sufficient to defend
the nation from cyber threats. The government can no longer depend only on traditional
strategies and defenses to protect critical systems and data. [1]
A modernized cybersecurity frameworkZero Trustintegrates visibility from multiple
vantage points, makes risk-aware access decisions, and automates detection and
response. Implementing this framework places network defenders in a better position to
secure sensitive data, systems, applications, and services. [2]
This cybersecurity information sheet (CSI) provides recommendations for maturing
devicesthe Zero Trust device pillarto effectively ensure all devices seeking access
earn trust based on device metadata and continual checks to determine if the device
meets the organization’s minimum bar for access. The primary capabilities of the device
pillar are:
identification, inventory, and authentication
detection of unknown devices and configuration compliance checks of known
ones
device authorization using real time inspections
remote access protections
hardware updates and software patches
device management capabilities
endpoint detection and response for threat detection and mitigation
This CSI further discusses how these capabilities integrate into a comprehensive Zero
Trust (ZT) framework, as described in Embracing a Zero Trust Security Model. [2]
National Security System (NSS), Department of Defense (DoD), and Defense Industrial
Base (DIB) owners and operators should use this and complementary guidance to
understand how to take concrete steps for maturing device security by implementing the
outlined capabilities.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭