Joke Collection Website - Public benefit messages - What are the zero-trust technologies?

What are the zero-trust technologies?

The three technologies of zero trust refer to: SDP software definition boundary, IAM identity rights management and MSG micro-isolation.

1, software-defined boundary SDP

SDP is a software-defined boundary, which is a new generation network security model based on the concept of zero trust proposed by CSA, the international cloud security alliance, in 20 14. SDP supports application owners to deploy security boundaries when needed to isolate services from insecure networks. SDP replaces physical devices with logical components that run under the control of the application owner. SDP only allows access to enterprise application infrastructure after device authentication and verification.

2. Identity rights management IAM

Identity rights management IAM is the core of most organizations' security and IT operation strategies. It enables enterprises to automatically access more and more technical assets while managing potential security and compliance risks. Identity management supports and protects the digital identity of all users, applications and data.

3. Micro-separating monosodium glutamate

Micro-isolation is a network security technology, which can logically divide the data center into different security segments with different workload levels, and then define security control and provide services for each unique segment. Micro-isolation enables IT personnel to deploy flexible security policies in data centers using network virtualization technology without installing multiple physical firewalls. Micro isolation can be used to protect each virtual machine. In the enterprise network with policy-driven application layer security control, it can greatly enhance the flexibility of enterprises.

Development background of zero trust

Traditional network security is based on the physical boundary defense of firewall, which is also known as intranet. The concept of firewall originated in 1980s. The premise of this defense mode is that all the office equipment and data resources of the enterprise are in the intranet, and the intranet is completely reliable.

However, with the continuous rise of emerging technologies such as cloud computing, big data and Internet of Things, enterprise IT architecture is changing from borderless to borderless, and the traditional security boundary is gradually disintegrating. With the continuous advancement of new infrastructure represented by 5G and industrial Internet, the process of borderless evolution will be further accelerated. At the same time, zero-trust security has gradually entered people's field of vision and become a new concept and framework to solve the network security problem in the new era.

Reference to the above content: Baidu Encyclopedia-Zero Trust