Joke Collection Website - Public benefit messages - What are the zero-trust technologies?
What are the zero-trust technologies?
1, software-defined boundary SDP
SDP is a software-defined boundary, which is a new generation network security model based on the concept of zero trust proposed by CSA, the international cloud security alliance, in 20 14. SDP supports application owners to deploy security boundaries when needed to isolate services from insecure networks. SDP replaces physical devices with logical components that run under the control of the application owner. SDP only allows access to enterprise application infrastructure after device authentication and verification.
2. Identity rights management IAM
Identity rights management IAM is the core of most organizations' security and IT operation strategies. It enables enterprises to automatically access more and more technical assets while managing potential security and compliance risks. Identity management supports and protects the digital identity of all users, applications and data.
3. Micro-separating monosodium glutamate
Micro-isolation is a network security technology, which can logically divide the data center into different security segments with different workload levels, and then define security control and provide services for each unique segment. Micro-isolation enables IT personnel to deploy flexible security policies in data centers using network virtualization technology without installing multiple physical firewalls. Micro isolation can be used to protect each virtual machine. In the enterprise network with policy-driven application layer security control, it can greatly enhance the flexibility of enterprises.
Development background of zero trust
Traditional network security is based on the physical boundary defense of firewall, which is also known as intranet. The concept of firewall originated in 1980s. The premise of this defense mode is that all the office equipment and data resources of the enterprise are in the intranet, and the intranet is completely reliable.
However, with the continuous rise of emerging technologies such as cloud computing, big data and Internet of Things, enterprise IT architecture is changing from borderless to borderless, and the traditional security boundary is gradually disintegrating. With the continuous advancement of new infrastructure represented by 5G and industrial Internet, the process of borderless evolution will be further accelerated. At the same time, zero-trust security has gradually entered people's field of vision and become a new concept and framework to solve the network security problem in the new era.
Reference to the above content: Baidu Encyclopedia-Zero Trust
- Related articles
- Recently, I have no money to pay back my credit card, and I have received several SMS dunning notices from Ping An Credit Card. I wonder if this will affect my personal credit?
- If the car is parked in the non-motor vehicle lane and the battery car hits the headlights of the car, the traffic police will take full responsibility for the battery car, and I will do it ~
- The ending of the Russian film "Short Message"
- Because I am traveling in Shenzhou, I want to go to other places (in the province). I don't know how to send text messages to pack roaming packages.
- The consequences of sending spam messages being shut down by the business hall
- You can't receive text messages if you change your calling card.
- How to comfort the object when it comes to menstruation?
- A message of blessing for the operation
- Unicom 3G( 186) package A, B, C three solutions business introduction!
- The beginning of spring wish words