2022年网络安全零信任调查.pdf

The challenge of integration is formidable, says Wilson. “Zero trust is not aswitch that you turn on,”but a philosophy of putting controls on data at the local level.A successful zero-trust strategy involves all vendors working together to ensure secure access to the applications or areas they’re responsible for.”A single large moat has become lots of little tiny moats everywhere,”Wilson says. The technical challenge is to build the moats deep enough to protect, but not so deep that applications can’t talk to one another as needed. “The segmentation piece is really, really hard,”he says.

本文来自知之小站

 

PDF报告已分享至知识星球,微信扫码加入查阅下载3万+精选资料,年享1万+精选更新

(星球内含更多未发布精选报告.其它事宜可联系zzxz_88@163.com)