- Mastering Windows Security and Hardening
- Mark Dunkerley Matt Tumbarello
- 235字
- 2021-06-18 18:37:58
Implementing a Zero Trust approach
To close out the chapter, we wanted to touch on a concept known as Zero Trust. The Zero Trust architecture model was created by John Kindervag while he was at Forrester Research Inc. back in 2010. You may be wondering what exactly Zero Trust is. Essentially, it is a model where we trust no one until we can validate who they are, who they are meant to be, and whether they are authorized to have access to the system or information. Effectively implementing a Zero Trust model is going to require a multilayered approach to the security strategy along with the use of the most current and modern technology available. The method of allowing a user to access the environment with only a username and password is outdated and insecure. With Microsoft's version of a Zero Trust model, they are recommending the use of a strong identity, ensuring devices are enrolled within a management tool, enforcing the concept of least privilege, and verifying the health of both devices and services. To support this model, some of the technologies include Azure Active Directory, multi-factor authentication, biometrics, Conditional Access, Microsoft Intune, and Microsoft Defender ATP. As you read through this book, you will find the guidance and instructions that are provided will ultimately lead to a Zero Trust model.
Tip
You can read more about the Zero Trust Microsoft model here: https://www.microsoft.com/en-us/itshowcase/implementing-a-zero-trust-security-model-at-microsoft.
- 攻守道:企業數字業務安全風險與防范
- Learning Python for Forensics
- 網絡空間安全:管理者讀物
- 數字安全藍皮書:本質屬性與重要特征
- 反黑命令與攻防從新手到高手(微課超值版)
- Instant Java Password and Authentication Security
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Kali Linux高級滲透測試(原書第4版)
- 復雜信息系統網絡安全體系建設指南
- Securing Network Infrastructure
- 網絡入侵檢測系統原理與應用
- Instant OSSEC Host-based Intrusion Detection System
- AI+網絡安全:智網融合空間體系建設指南
- 大中型網絡入侵要案直擊與防御
- 極限黑客攻防:CTF賽題揭秘