在可视化和分析支柱中推进零信任成熟度 13页 2024

VIP文档

ID:72694

阅读量:1

大小:0.69 MB

页数:13页

时间:2025-01-03

金币:10

上传者:人情世故
U/OO/164512-24 | PP-24-2134 | May 2024 Ver. 1.0
National Security Agency | Cybersecurity Information Sheet
Advancing Zero Trust Maturity Throughout the
Visibility and Analytics Pillar
Executive summary
In the ever-expanding landscape of cybersecurity, threats manifest in various forms and
often infiltrate systems discreetly. The constant risk of intrusion underscores the critical
importance of swift detection and mitigation.
This cybersecurity information sheet (CSI) centers on the visibility and analytics aspect
of the Zero Trust (ZT) model, emphasizing the significance of comprehensively
observing data characteristics and events within an enterprise-wide environment.
Prioritizing cyber-related data analysis aids in informing policy decisions, facilitating
response actions, and constructing a risk profile to proactively fortify security measures.
Visibility and analytics form the cornerstone of any ZT strategy, empowering
organizations to harness infrastructure, tools, data, and techniques for proactively
mitigating risks and for rapid identification, detection, and response to emerging cyber
threats. Evolving from traditional signature-based approaches, detection (visibility and
analytics) and response capabilities are increasingly adopting behavior-based
methodologies to combat the sophistication of modern cyber threats. This pillar
highlights the benefits of continuous monitoring and provides insights essential for
identifying and mitigating potential security risks to assure that only authorized users
and devices access sensitive resources.
This CSI offers recommendations for advancing visibility and analytics within the ZT
framework. It explains how these capabilities seamlessly integrate into a comprehensive
ZT framework as detailed in the NSA publication, Embracing a Zero Trust Security
Model. [1] National Security System (NSS), Department of Defense (DoD), and Defense
Industrial Base (DIB) stakeholders can leverage this guidance in conjunction with
complementary resources to enhance visibility and analytics through the implementation
of outlined capabilities.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭