- Mastering Windows Security and Hardening
- Mark Dunkerley Matt Tumbarello
- 235字
- 2021-06-18 18:37:58
Implementing a Zero Trust approach
To close out the chapter, we wanted to touch on a concept known as Zero Trust. The Zero Trust architecture model was created by John Kindervag while he was at Forrester Research Inc. back in 2010. You may be wondering what exactly Zero Trust is. Essentially, it is a model where we trust no one until we can validate who they are, who they are meant to be, and whether they are authorized to have access to the system or information. Effectively implementing a Zero Trust model is going to require a multilayered approach to the security strategy along with the use of the most current and modern technology available. The method of allowing a user to access the environment with only a username and password is outdated and insecure. With Microsoft's version of a Zero Trust model, they are recommending the use of a strong identity, ensuring devices are enrolled within a management tool, enforcing the concept of least privilege, and verifying the health of both devices and services. To support this model, some of the technologies include Azure Active Directory, multi-factor authentication, biometrics, Conditional Access, Microsoft Intune, and Microsoft Defender ATP. As you read through this book, you will find the guidance and instructions that are provided will ultimately lead to a Zero Trust model.
Tip
You can read more about the Zero Trust Microsoft model here: https://www.microsoft.com/en-us/itshowcase/implementing-a-zero-trust-security-model-at-microsoft.
- 網絡安全與管理
- Android應用安全實戰:Frida協議分析
- CTF實戰:技術、解題與進階
- Practical Network Scanning
- 反黑命令與攻防從新手到高手(微課超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- 網絡安全技術及應用(第3版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- Learning Devise for Rails
- 可信計算3.0工程初步(第二版)
- 網絡安全與攻防入門很輕松(實戰超值版)
- INSTANT Apple Configurator How-to
- 隱私計算:推進數據“可用不可見”的關鍵技術
- VMware vCloud Security
- 復雜信息系統網絡安全體系建設指南