在用户支柱中推进零信任成熟度 22页 2023

VIP文档

ID:72693

阅读量:1

大小:0.75 MB

页数:22页

时间:2025-01-03

金币:10

上传者:人情世故
U/OO/127344-23 | PP-23-0208 | APR 2023 Ver. 1.1
National Security Agency | Cybersecurity Information Sheet
Advancing Zero Trust Maturity Throughout the User
Pillar
Executive Summary
According to the 2020 Verizon Data Breach Investigations Report, over 80% of
breaches due to hacking involved credentials, whether lost or stolen, to impersonate
users for further compromise
1
.[1] Such cyber incidents are on the rise, creating
economic disruption and impacting national security.
This cybersecurity information sheet (CSI) provides recommendations for maturing
identity, credential and access management (ICAM) capabilities to effectively mitigate
such cyberattacks. It further discusses how these capabilities integrate into a
comprehensive Zero Trust (ZT) framework, as described in Embracing a Zero Trust
Security Model. [2] National Security System owners and operators should take
concrete steps to mature identity and access security controls and the operational
practices related to establishing digital identities and authenticating and authorizing
users to access critical resources. Doing so will provide system owners and operators
the ability to identify, resist, and respond to many cyber intrusion techniques.
Adoption of ZT principles is not accomplished overnight. Implementation is achieved
through careful and deliberate planning and continuous incremental improvements.
Building capabilities aligned to a mature ZT framework requires integrating every
system in the enterprise with the controls defined for each of seven pillars User,
Device, Data, Application/Workload, Network/Environment, Visibility & Analytics, and
Automation & Orchestration, starting with the user pillar, which builds on existing ICAM
capabilities.
1
Version 1.1 corrects the quote to data directly from Verizon’s 2020 Data Breach Investigations Report instead of the version 1.0 quote that was from
GovTech.com’s discussion on Verizon’s 2020 report.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭