特權訪問管理(PAM)之零信任特權Zero Trust Privilege(16k字PDF公號發「零信任AI反腐系統」下載)

2021-03-03 科學Sciences

特權訪問管理(PAM)之零信任特權Zero Trust Privilege

文|centrify,譯|秦隴紀,數據簡化DataSimp©20190126Sat

目錄

B  特權訪問管理(PAM)之零信任特權Zero Trust Privilege(13000字)

1. 零信任特權Zero Trust Privilege

2. 零信託特權的六個原則

3. 結論

參考文獻(1160字)

1. 零信任特權Zero Trust Privilege

ZeroTrust Privilege為現代企業IT威脅景觀重新定義了舊的特權訪問管理(PAM)。組織必須放棄舊的「信任但驗證」模式,這種模式依賴於明確定義的邊界。ZeroTrust要求從網絡內部或外部對特權訪問採用「永不信任,始終驗證,強制執行最小特權」的方法。

零信任權限要求基於驗證誰請求訪問權限,請求的上下文以及訪問環境的風險來授予最小權限訪問權限。通過實施最小權限訪問,組織可以最小化攻擊面,提高審計和合規性可見性,並降低現代混合企業的風險,複雜性和成本。[6]

What is Zero Trust Privilege?

ZeroTrust Privilege redefines legacy Privileged Access Management (PAM) for themodern enterprise IT threatscape. Organizations must discard the old model of「trust but verify」, which relied on well-defined boundaries. Zero Trustmandates a 「never trust, always verify, enforce least privilege」 approach toprivileged access, from inside or outside the network.

ZeroTrust Privilege requires granting least privilege access based on verifying whois requesting access, the context of the request, and the risk of the accessenvironment. By implementing least privilege access, organizations minimize theattack surface, improve audit and compliance visibility, and reduce risk,complexity and costs for the modern, hybrid enterprise.

FIGURE: The Zero TrustPrivilege Approach

傳統的PAM對於擴展的Threatscape來說還不夠

Legacy PAM已經存在了幾十年,並且是在當天所有特權訪問都限制在網絡內部的系統和資源時設計的。環境是系統管理員具有共享的「root」帳戶,他們將從密碼保險庫中檢出,通常用於訪問伺服器,資料庫或網絡設備。Legacy PAM達到了目的。

但是,今天的環境不同,特權訪問不僅包括基礎設施,資料庫和網絡設備,還擴展到雲環境。它還包括大數據項目,必須為DevOps自動化,現在需要覆蓋數百個容器或微服務來代表以前的單個伺服器。

除此之外,我們現在都生活在高級持續威脅(APT)的世界中,這些威脅為組織的金融資產,智慧財產權和聲譽帶來了不斷增長的變化風險。擴展訪問權限和獲取憑據是大多數APT的重要組成部分,特權訪問是皇冠上的寶石。Forrester(參見Forrester Wave:Privileged IdentityManagement:2016年第3季度)表示「80%安全漏洞涉及特權憑證。」

圖:從傳統特權訪問管理向雲就緒零信任特權的轉變

支持雲的零信任權限旨在處理不僅是人而且還有機器,服務和API的請求者。仍然會有共享帳戶,但為了增加保證,最佳做法現在建議個人身份,而不是共享帳戶,可以應用最小權限。所有控制項都必須是動態的和風險感知的,這需要現代機器學習和用戶行為分析。現在,PAM必須與更廣泛的生態系統集成和互操作,包括AWS和Azure等IaaS提供商,HashiCorp和Ansible等DevOps CI / CD管道工具,以及Docker,Kubernetes和CoreOS等Container解決方案。

Legacy PAM Is Not Enough for the ExpandedThreatscape

LegacyPAM has been around for decades and was designed back in the day when ALL yourprivileged access was constrained to systems and resources INSIDE your network.The environment was systems admins with a shared 「root」 account that they wouldcheck out of a password vault, typically to access a server, a database ornetwork device. Legacy PAM served its purpose.

However,today’s environment is different, privileged access not only coversinfrastructure, databases and network devices, but is extended to cloudenvironments. It also includes big data projects, it must be automated forDevOps, and it now needs to cover hundreds of containers or microservices torepresent what used to be a single server.

Ontop of this, we now all live in a world of Advanced Persistent Threats (APTs)that create a growing and changing risk to organizations』 financial assets,intellectual property and reputations. Expanding access and obtainingcredentials is an essential part of most APTs, with privileged access being thecrown jewels. Forrester (see Forrester Wave: Privileged Identity Management: Q32016) stated that 「80% of security breaches involve privilege credentials.」

FIGURE: The Shift fromLegacy Privileged Access Management to Cloud-Ready Zero Trust Privilege

Cloud-readyZero Trust Privilege is designed to handle requesters that are not only humanbut also machines, services and APIs. There will still be shared accounts, butfor increased assurance, best practices now recommend individual identities,not shared accounts, where least privilege can be applied. All controls must bedynamic and risk-aware, which requires modern machine learning and userbehavior analytics. Now PAM must integrate and interoperate with a much broaderecosystem including IaaS providers like AWS and Azure, with DevOps CI/CDPipeline tools such as HashiCorp and Ansible, and with Container solutions suchas Docker, Kubernetes and CoreOS.

2. 零信託特權的六個原則

零信任特權方法可幫助企業根據驗證請求訪問權限的人員,請求的上下文以及訪問環境的風險來授予最小權限訪問權限。通過實施最小權限訪問,ZeroTrust Privilege可最大限度地減少攻擊面,提高審計和合規性可見性,並降低現代混合企業的風險,複雜性和成本。零信任特權建立在六個原則之上,詳情如下:

The Six Tenets of Zero TrustPrivilege

AZero Trust Privilege approach helps enterprises grant least privilege accessbased on verifying who is requesting access, the context of the request and therisk of the access environment. By implementing least privilege access, ZeroTrust Privilege minimizes the attack surface, improves audit and compliancevisibility, and reduces risk, complexity and costs for the modern, hybridenterprise. Zero Trust Privilege is built on six tenets, which are covered indetail below:

2.1 驗證誰

今天,身份不僅包括人,還包括工作量,服務和機器。正確驗證世衛組織意味著利用企業目錄身份,消除本地帳戶並減少帳戶和密碼的總數,從而減少攻擊面。許多大型組織已經對Microsoft的ActiveDirectory進行了標準化,但使用ZeroTrust Privilege,您無需在任何特定目錄上進行標準化。實際上,您可以在不同的目錄中保留不同的身份群。重要的部分是通過HR審查的企業目錄標識為用戶建立身份,這意味著當該人的僱傭關係終止時,這些身份將自動禁用。您想要的最後一件事是要離開的資料庫管理員(DBA),但仍保留其特權訪問權限。

特權訪問的最佳實踐是為每個管理員建立唯一的帳戶以用於管理目的。Microsoft建議這些是備用管理員帳戶(通常稱為「破折號」,因為用戶帳戶附加了典型的「-A」)與管理員用戶關聯但與管理員的最終用戶身份分開,這通常是具有電子郵件地址的公知帳戶。這樣,如果公共電子郵件帳戶遭到入侵,則不會公開其備用管理員帳戶。

要驗證誰,我們還必須在任何地方應用多重身份驗證(MFA)。在登錄期間,在密碼籤出時,在權限提升時- 任何時候都有新請求。通過特權訪問,在授予訪問權限之前,我們必須確定誰在另一端。MFA是必備的,密碼不夠好。讓我們面對現實,10%的人可能會將「admin」作為您的密碼- 這不會削減它。好消息是MFA比以前更容易,當你以前需要等待120秒才能出現新的6位數代碼並輸入它。現在用戶只需要通知他們的手機和/或只是觸摸他們的FIDO鍵。

在實施MFA時,至少對管理職能部門執行國家標準與技術研究院(NIST)保證等級2至關重要。這意味著雙重挑戰:你知道的東西,以及你擁有的東西。一個很好的例子是密碼與手機推送通知或手機生成的OTP相結合。對於大多數關鍵資產,建議儘可能進一步增加NISTAssurance Level-3。除了基於硬體的加密令牌(例如智慧卡或FIDO密鑰)之外,這還包括使用密碼的雙因素身份驗證。谷歌聲稱他們沒有一次成功的網絡釣魚攻擊,因為他們為所有用戶實施了FIDO密鑰。

Verify Who

Today,identities include not just people but workloads, services and machines.Properly verifying WHO means leveraging enterprise directory identities,eliminating local accounts and decreasing the overall number of accounts andpasswords, reducing the attack surface. Many large organizations havestandardized on Microsoft’s Active Directory, but with Zero Trust Privilege youdon’t have to standardize on any particular directory. In fact, you can keepdifferent populations of identities in different directories. The importantpart is to establish identity for users via HR-vetted enterprise directoryidentities, meaning these identities are automatically disabled when theperson’s employment is terminated. The last thing you want is a databaseadministrator (DBA) to leave, but still, retain their privileged access rights.

Abest practice for privileged access is to establish unique accounts for eachadministrator to use for admin purposes. Microsoft suggests that these be「Alternate Admin Accounts」 (commonly referred to as 「dash a」 due to the typical「-A」 appended to the user’s account) that are associated with the admin userbut are separate from the admin’s end user identity, which is typically apublicly-known account with an email address. This way, if the public emailaccount gets compromised, it does not expose their Alternate Admin Account.

Toverify who, we must also apply Multi-Factor Authentication (MFA) everywhere.During login,upon password checkout,at privilege elevation— anytimethere is a new request. With privileged access we must know with certainty whois on the other end before granting access. MFA is a must-have, passwords arenot good enough. Let’s face it, 10% of you probably have the word 「admin」 asyour password – that’s not going to cut it. The good news is MFA is way easierthan before, when you used to have to wait for 120 seconds for a new 6-digitcode to come up and type it in. Now users just get a push notification to theirphone and/or just touch their FIDO key.

Whenimplementing MFA, it is critical to enforce National Institute for Standardsand Technology (NIST) Assurance Level-2 at a minimum for admin functions. Thismeans a dual challenge: something you know, and something you have. A goodexample is a password combined with a push notification to your phone, or anOTP generated by your phone. For most critical assets it is recommended toincrease even further to NIST Assurance Level-3, where possible. This includestwo-factor authentication with a password in addition to a hardware-basedcryptographic token, such as a smart card or FIDO key. Google claims they havenot had a single successful phishing attack since they implemented FIDO keysfor all users.

2.2 語境化請求

首先,我們需要從為什麼擁有「請求和批准」訪問流程這一點開始。有意義的是,資料庫管理員(DBA)不應具有訪問所有資料庫的默認權限,只能訪問當天需要工作的資料庫。這樣,如果DBA的憑據被洩露,我們就限制了攻擊面。對於每個請求,重要的是要知道為什麼某人或某事正在執行特權活動。為此,我們必須了解訪問請求背後的背景,並根據提供的上下文審查和批准請求。

最小特權的概念是僅提供執行特定任務所需的特權級別,並且僅提供執行該任務所需的時間量。要執行最小權限,訪問權限必須了解上下文才能做出適當的訪問決策。

記錄請求上下文通常包括將請求與特定故障單相關聯並提供原因,以及請求的內容和持續時間。一旦請求被上下文化,那麼它必須被路由以獲得批准,並且此工作流程可以像您希望的那樣簡單或複雜。對於大公司來說,要最好地實現這一步驟,可能需要將PAM解決方案與企業級ITSM(IT服務管理)解決方案(如ServiceNow或IGA(IdentityGovernance Administration)平臺,如SailPointTechnologies)集成。

Contextualize Request

First,we need to start with why it is important to have a 「request and approve」access process. It makes sense that a database administrator (DBA) should nothave default rights to access all databases, only to the ones they need to workon that day. That way, if that DBA’s credentials are compromised, we havelimited the attack surface. For each request, it is important to know WHYsomebody, or something is performing privileged activity. To do this, we mustunderstand the context behind the request for access, and review and approvethe request based on the context provided.

Theconcept of least privilege is to only provide the needed level of privilege toperform a certain task and only for the amount of time necessary to performthat task. To execute least privilege, the granter of access must understandthe context to be able to make the appropriate access decision.

Recordingthe request context typically includes associating the request with a certaintrouble ticket and providing a reason, as well as what is being requested andfor how long. Once the request is contextualized, then it must be routed forapproval and this workflow can be as simple or complex as you would like tomake it. For larger companies to best achieve this step, it’s likely going toinvolve the integration of a PAM solution with an enterprise grade ITSM (ITService Management) solution like ServiceNow or IGA (Identity GovernanceAdministration) platform like SailPoint Technologies.

2.3 安全的管理環境

訪問特權資源時,關鍵是我們不要在伺服器連接期間啟用惡意軟體訪問伺服器或引入感染。為實現這一目標,我們需要確保只通過乾淨的源來實現訪問。零信任特權意味著阻止來自也可以訪問Internet和電子郵件的用戶工作站的直接訪問,這些工作站很容易被惡意軟體感染。只能通過經過批准的特權管理控制臺授予訪問權限,這可以通過多種方式實現,包括通過管理跳轉框對基於Web的敏感系統進行訪問,例如CentrifyZero Trust Privilege Services及其連接器。

具有分布式連接器的現代雲跳盒是實現分布式組織的安全管理環境的好方法。過去,您只需要從網絡內部進行安全訪問。但正確設計的ZeroTrust Privilege Admin Environment的優點在於它不僅允許遠程員工全天候訪問資源,而且非常適合外包IT或外包開發用戶,因為它減少了對虛擬專用網絡(VPN)的需求並處理安全客戶端和分布式連接器之間的所有傳輸安全性。

分布式跳轉主機或「連接器」用於在同一網絡中進行負載平衡以及支持多個不同的專用網絡的雙重目的。這些連接器位於資源所在的位置,例如DMZ,IaaS或具有私有,相互身份驗證的連接的虛擬專用網絡。這些安全連接允許基於Web的SSH或RDP在任何位置工作。對於外包的第三方用戶,它包括聯合入站認證,這意味著認證可以依賴於合作夥伴的授權員工目錄,從而提供更高的身份保證。

Secure Admin Environment

Whenaccessing privileged resources, it is critical that we do not either enablemalware access to servers or introduce infections during our connection toservers. To achieve this, we need to make sure access is only achieved througha clean source. Zero Trust Privilege means preventing direct access from userworkstations that also have access to the Internet and email, which are tooeasily infected with malware. Access should only be granted through approvedPrivileged Admin Consoles, which can be achieved in many ways, includingweb-based access to sensitive systems via an administrative jump box, such asthe Centrify Zero Trust Privilege Services with its Connectors. 


Moderncloud jump boxes with distributed connectors are a great way to achieve asecure admin environment for distributed organizations. In the past you onlyhad to secure access from inside your network. But the beauty of a properlydesigned Zero Trust Privilege Admin Environment is it not only allows remotestaff to access resources 24x7, but it is well-suited for outsourced IT oroutsourced development users because it alleviates the need for a VirtualPrivate Network (VPN) and handles all the transport security between the secureclient and distributed connectors.


Distributedjump hosts or 「connectors」 serve the dual purpose for load balancing in thesame network and for supporting multiple, different private networks. Theseconnectors go where the resources are located, such as DMZ, IaaS, or VirtualPrivate Network with private, mutually authenticated connections. These secureconnections allow Web-based SSH or RDP that works from any location. Foroutsourced, third-party users it includes federated in-bound authentication,meaning authentication can depend on a partner’s directory of authorizedemployees, providing much higher identity assurance.

2.4 授予最少特權

作為概念的最小特權比您意識到的更為常見。考慮您辦公室的物理訪問控制:不同級別的用戶擁有不同的訪問權限,並且可以訪問您必須請求並獲得批准的某些區域。這在物理安全空間中都得到了很好的認可,同樣的邏輯適用於邏輯安全性。它在授予對特權資源的基於角色的粒度訪問時適用。

授予最小特權的另一個目標是限制網絡上的橫向移動。這是攻擊者訪問敏感數據的主要方式:它們從一個位置開始並橫向移動,直到找到他們正在尋找的內容。如果我們將他們可以訪問的內容分開,那麼我們可以阻止橫向移動。就像沒有人應該有一個訪問所有內容的密鑰/徽章一樣,你真的不想在伺服器上使用root帳戶,因為它提供了太多的訪問權限而且沒有歸屬於實際用戶,我們稱之為「鮑勃。「相反,Bob應該使用他的備用管理員權限直接登錄到目標系統,這使他可以只重新啟動一組特定的伺服器。如果他需要更改配置或訪問其他目標系統,那麼他必須通過ServiceNow之類的請求訪問指定的時間段,並且可能會要求進行多重身份驗證(MFA)。完成後,Bob的權利將減少到所需的數量。

Grant Least Privilege

Leastprivilege as a concept is more common than you realize. Think of physicalaccess control at your office: different levels of users have different accessrights, and to get access to certain areas you must request and be approved.This is all very well recognized in the physical security space, and the samelogic applies for logical security. It applies when granting granularrole-based access to privileged resources.

Anotherobjective to granting least privilege is to limit lateral movement across thenetwork. This is the primary way attackers get access to sensitive data: theystart in one location and move laterally until they find what they are lookingfor. If we zone off what they have access to then we can stop lateral movement.Just like nobody should have a single key/badge that accesses everything, youreally don’t want to use the root account on a server, as it gives too muchaccess and has no attribution to the actual user, who we』ll call 「Bob.」 InsteadBob should login directly to the target system with his alternate adminentitlements that give him access to restart only a particular set of servers.If he needs to change the configuration or access a different target system,then he must request access for a specified period of time through somethinglike ServiceNow and may be asked for Multi-Factor Authentication (MFA). Oncecomplete, Bob’s entitlements will reduce back to just what is needed.

2.5 審核一切

對於特權會話,最佳做法是審核所有內容。通過記錄所執行的所有操作的記錄,審計日誌不僅可以用於取證分析,以準確找到問題,還可以將操作歸因於特定用戶。由於這些會議非常重要,因此最佳做法是保留會話的視頻錄製內容,以便審核或用作最關鍵資產或高度監管行業的證據。有多種規定,包括支付卡數據的PCI-DSS,特別需要此級別的審核。

監控和會話記錄可以通過基於網關和/或主機的技術來實現。基於主機確保不會繞過會話,也可以提供流程啟動和文件系統更改審核,這對於您最關鍵的資源來說是一種非常需要的技術。

如果您有安全部門,最好將此審計數據與現有的安全信息和事件管理(SIEM)系統或雲訪問安全代理(CASB)服務集成,以進行自動挖掘,從而可以識別風險活動並發出警報。

Audit Everything

Forprivileged sessions, it is of course best practice to audit everything. With adocumented record of all actions performed, audit logs not only can be used inforensic analysis to find exactly the issue, but also to attribute actionstaken to a specific user. Because these sessions are so critical it is alsobest practice to keep a video recording of the session that can be reviewed orused as evidence for your most critical assets or in highly regulatedindustries. There are multiple regulations including PCI-DSS for payment carddata that specifically requires this level of auditing.

Monitoringand session recording can be achieved through either a gateway- and/or host-basedtechnique. Host-based ensures that sessions cannot be bypassed, as well as toalso provide process launch and file system change auditing, which is a highlydesired technique for your most critical resources.

Ifyou have a security department, a good practice is to integrate this audit datawith your existing Security Information and Event Management (SIEM) system orCloud Access Security Broker (CASB) service for automated mining where riskyactivities can be identified and alerts raised.

2.6 自適應控制

零信任權限控制需要適應風險上下文。Gartner推動CARTA- 持續,適應,風險和信任評估- 這也是PrivilegedAccess絕對必需的。零信任特權意味著即使用戶輸入了正確的憑證,但請求來自潛在風險的位置,也需要更強的驗證才能允許訪問。現代機器學習算法現在用於仔細分析特權用戶的行為並識別「異常」或「非正常」(因此有風險)的活動並提醒或通知安全性。

自適應控制不僅意味著實時通知風險活動,而且還能夠通過切斷會話,增加額外監控或標記法醫跟進來積極響應事件。

機器學習使公司能夠在持續不斷的基礎上,通過數百萬個事件進行掃描,並在大海撈針中掃描該指針,這是手動取證所無法實現的。更有價值的是在線和實時執行基於機器學習的分析,從而能夠實施真正的自適應預防控制而不僅僅是事後檢測控制。

Adaptive Control

ZeroTrust Privilege controls need to be adaptive to the risk-context. Gartnerpromotes CARTA – Continuous, Adaptive, Risk and Trust Assessment – and it’sabsolutely required for Privileged Access too. Zero Trust Privilege meansknowing that even if the right credentials have been entered by a user, but therequest comes in from a potentially risky location, then a strongerverification is needed to permit access. Modern machine learning algorithms arenow used to carefully analyze a privileged user’s behavior and identify「anomalous」 or 「non-normal」 (and therefore risky) activities and alert ornotify security.

Adaptivecontrol means not only notifying of risky activity in real time, but also beingable to actively respond to incidents by cutting off sessions, addingadditional monitoring or flagging for forensic follow up.

Machinelearning allows companies to pore through millions of events and scan for thatneedle in the haystack on an ongoing and continuous basis, which would never beachievable by manual forensics. Even more valuable is performing machinelearning-based analytics inline and in real time and thus being able to enforcetruly adaptive preventive controls and not just after-the-fact detectivecontrols.

3. 結論

為了提供ZeroTrust,今天的特權訪問管理(PAM)解決方案不能僅僅依賴於快速離開共享帳戶。它們必須詳細介紹特權帳戶和會話管理以及權限提升和委派管理。但顯然這還不夠。為了充分驗證請求者是誰(或什麼),今天的雲就緒特權訪問管理(PAM)必須包括特權身份和訪問管理,多重身份驗證以及權限威脅分析。

傳統特權訪問管理(PAM)在服務昨天的威脅情景方面做得很好,但在現代企業IT領域,為了保護自己,公司,客戶和投資者,應採用零信任特權方法。

©2019Centrify公司版權所有。

Conclusion

Todeliver Zero Trust, today’s Privileged Access Management (PAM) solutions cannotrely on simply vaulting away shared accounts. They must cover, in detail, bothPrivileged Account and Session Management as well as Privilege Elevation andDelegation Management. But clearly that is not enough. To sufficiently verifywho (or what) a requester is, today’s cloud-ready Privileged Access Management(PAM) must include Privileged Identity and Access Management, Multi-FactorAuthentication as well as Privilege Threat Analytics.

LegacyPrivileged Access Management (PAM) did a great job of serving yesterday’sthreatscape, but in a modern enterprise IT world, to protect yourself, yourcompany, your customers, and your investors, a Zero Trust Privilege approachshould be applied.

©2019Centrify Corporation. All Rights Reserved.

—END—

免責說明:資料來自公開期刊媒體資料,文章只為學術新聞信息傳播,註明出處參考文獻可溯源。本公號不持有任何傾向性,亦不表示認可其觀點或其所述

中科院ZeroTrust零信任AI反腐系統效率太高被關閉(16k字)

(PDF公號發零信任AI反腐系統下載)

秦隴紀2010-2019©科學Sciences

Sciences220中科院ZeroTrust零信任AI反腐系統效率太高被關閉SP20190208FriQinDragon.docx

簡介:中科院ZeroTrust零信任AI反腐系統效率太高被關閉。作者:秦隴紀。素材:南華早報/知識簡化/數據簡化社區NC非商業授權/秦隴紀微信群聊公眾號,參考文獻附引文出處。下載:如需本文21k1010PDF資料,讚賞支持後,公號輸入欄發送關鍵字「零信任AI反腐系統」或「零信任特權ZTP」獲取連結;關注「科學Sciences」文章分類菜單。版權:科普文章僅供學習研究,公開資料©版權歸原作者,請勿用於商業非法目的。數據簡化社區保留相應版權,若有引文/譯註/出處不明或遺漏/版權問題等,請給公號留言或郵件諮詢QinDragon2010@qq.com。轉載:請寫明並保留作者、出處、時間等信息,如「此文出自:©科學Sciences,作者:秦隴紀,時間:20190504Sat©秦隴紀2010-2019匯譯編」等字樣。

科學Sciences」公眾科普分享

跋:科學傳入我國整整一百年過去了,還是沒有普及、被國人普遍接受。科學精神是假設和質疑,科學方法是實驗和測量,科學理論的本質是科學家用數學工具對自然社會做從出定性定量解釋。近卌百年,有些民族對自然社會的思考,最膚淺地就是盲信盲從情感型表達的模糊不清的簡單語言;而理性之人分析具體的現象,直到以數學等工具為主的科學思維。科學實驗、科學假說,均需工程技術支撐,理論和技術均豐富了科學之軀,切不可止步於語文工具之表象思維。更不可把科技當成語文來對待,拿書本文字代替實驗設計工程實踐。科學是璀璨的人類文明之一,但有其範圍並非萬能。科學Sciences公號不持有任何傾向性,只提供大家的學術觀點。感謝您的閱讀!《科學Sciences》倡導"理性之思想,自主之精神",專注於學者、學界、學術的發展進步,不定期向您推薦人類優秀學者及其文章。歡迎科學、工程、技術、教育、傳媒等業界專家投稿、加入數據簡化社區!歡迎大家分享、讚賞、支持科普~~

如需下載PDF請讚賞支持

相關焦點

  • 每日一詞:privilege(權利,特權)
    本期嚼字—privilege (權利,特權)privilege/5privilidV/n.特權,特別待遇,基本公民權力,特免vt.給與...特權,特免privilege的起源及演化.在1154年,(在古英語中記載的可能會更早一點,但是當時作為一個拉丁單詞)privilege從古法語privilege、拉丁語privilegium (
  • 零信任:不僅是對人類,更是對機器
    到目前為止,零信任已成為一種著名的網絡安全方法,用來防禦基於身份的入侵。正如身份定義安全聯盟(IDSA)的「零信任之路始於身份」白皮書中所舉例說明的那樣,零信任是指承認威脅參與者將進入組織的環境,因此,防禦必須牢記這一理念。
  • 特權帳號管理那些事
    一是特權帳號散落分布在業務系統、應用程式、資料庫、網絡設備、各類應用系統、作業系統中,只要你在企業內能看到的任何一個信息系統都至少有一個特權帳號。目之所及,耳之所聞,還有你看不到聽不到的系統都包含有特權帳號。二是特權帳號的持有人分布散,他可能是在數據中心科技運維人員,也可能是企業總部業務、後勤、人力等任何一個部門的人員,還有可能是偏遠子分公司的業務運營人員等等。
  • 騰訊安全發布《零信任解決方案白皮書》
    此次,作為零信任能力圖譜的延續,騰訊安全正式發布《零信任解決方案白皮書》,將核心能力聚合成解決方案、落地到關鍵組件,通過典型場景應用結合騰訊最佳實踐,幫助企業構建新一代零信任安全網絡架構提供幫助。騰訊基於ZTA架構模型,參考谷歌ByondCorp最佳實踐,結合自身十多年來的網絡安全管理實踐,形成了「騰訊零信任」的解決方案,於2016年在公司內部實踐。
  • 「零信任」安全體系架構和實踐
    可見,當涉及到大宗利益和公共利益的時候,往往是另一種機制在發揮作用:零信任機制。比如戰略情報、重大選舉、法律規章制訂、多重鑑權(權限審批)等,都是基於零信任體系的運行機制,其前提假設就是沒有人可以被天然信任。
  • 微軟福利:零信任模式下微軟推出免費在線的零信任評估工具
    何為零信任模型?據國外安全媒體報導,微軟於上周宣布了一種旨在幫助組織了解實施零信任安全模型過程的評估工具。微軟高級產品營銷經理Nupur Goyal稱本次推出的零信任評估工具是免費的,任何需要他的人都可以免費使用。
  • 持續開放零信任安全能力 騰訊敏捷零信任MFA有哪些技術優勢
    騰訊安全總經理程文杰、副總經理楊育斌攜騰訊敏捷零信產品出席2020雲安全聯盟大中華區大會(CSA),並對騰訊敏捷零信任及其核心能力進行解讀。  據楊育斌介紹,騰訊敏捷零信任遵循「SIM」三駕馬車技術架構,覆蓋雲端身份安全服務、雲端接入流量安全、雲端業務安全管理、雲端數據安全服務及持續信任管理五大安全能力,可及時發現、有效防禦雲管端安全風險。
  • 持續開放零信任安全能力,騰訊敏捷零信任MFA有哪些技術優勢?
    受2020年初疫情影響,企業移動辦公、遠程協作需求大增,傳統安全邊界逐漸瓦解,零信任安全市場激增。騰訊安全依託獨有的移動化敏捷多因素身份驗證(MFA)安全技術,加速完善敏捷零信任產品並獲得落地實踐。騰訊安全總經理程文杰、副總經理楊育斌攜騰訊敏捷零信產品出席2020雲安全聯盟大中華區大會(CSA),並對騰訊敏捷零信任及其核心能力進行解讀。
  • 零信任安全的4W1H
    訪問控制策略應該是動態的基於儘量多的數據源進行計算和評估。  簡而言之,零信任的核心思想就是:默認情況下不應該信任網絡內部和外部的任何人/設備/系統,需要基於認證和授權重構訪問控制的信任基礎。零信任對訪問控制進行了範式上的顛覆,引導安全體系架構從網絡中心化走向身份中心化,其本質訴求是以身份為中心進行訪問控制。
  • 2020中國零信任全景圖
    >聯盟從甲方視角針對國內零信任廠商、優秀的零信任實踐甲方及第三方等共計60多個樣本單位進行了問卷調查和訪談,基於這些數據編製成第一版零信任全景圖,並將每年持續更新。01.騰訊零信任方案方案介紹:騰訊安全依託於騰訊多年內網安全管理的經驗以及業界的最佳實踐,利用終端安全評估和管控、統一身份管理和授權、零信任網關以及動態授權評估等組件,構建了騰訊的零信任安全解決方案。
  • 當50餘家公司聞風而動,「零信任安全」會是下一個價值窪地嗎?
    不過需要提前強調的是,目前也有企業希望通過其他思路達成「零信任」目的,以下技術路線並不代表全部。1. 身份識別與訪問管理(IAM)身份識別與訪問管理(IAM)是網絡安全領域中的一個細分方向。從效果上來看,IAM產品可以定義和管理用戶的角色和訪問權限,即決定了誰可以訪問,如何進行訪問,訪問後可以執行哪些操作等。
  • 伯多祿特權
    (1)特權privilege此詞來自拉丁文,包括兩部份:privus個人的、特別的(one's own),及lex法律(law)。
  • 每日一詞privilege
    1、單詞釋義n.特權,優惠;v.享有特權,特許2、單詞助記=priv(private)+ I +leg(law)+ e-私人的法律-「特權」3、例句「Intellect is resented as a form of power or privilege,」 writes historian and professor Richard Hofstadter in Anti-Intellectualism in
  • 谷歌商業化BeyondCorp遠程訪問 進軍零信任市場
    谷歌正在上線一款商業化的零信任遠程訪問服務,可令居家辦公的員工無需藉助VPN,直接基於Web應用訪問企業內部。這款訂閱模式的服務稱為「BeyondCorp遠程訪問」,將會成為谷歌雲服務中的一個組件,每個用戶的月訂閱費用是6美元。
  • 安全管理者俱樂部沙龍丨 「零信任」還有哪些意想不到的應用場景?
    現在很多私募基金投資機構會自己開發一套交易系統,放到券商的環境裡面,和券商的交易系統對接。這套系統對於券商是不透明的,後者不知道它有多少安全漏洞,也不清楚私募基金投資機構通過自己的防火牆後進行了什麼操作。三是整體架構。券商的兩張大網之間雖然做了有效隔離,但還是存在大量數據交互:有的是接口調用,有的是設備、應用之間互相訪問,有時是用戶身份訪問設備或應用,這些都有可能導致安全隱患。
  • 騰訊安全發起安全管理者俱樂部沙龍,首場聚焦 「零信任」落地場景...
    企業只有了解零信任建設的能力目標,根據能力視圖、業務優先級規劃建設場景路徑,才能分場景、分階段完成零信任整體能力體系的建設。二組成果輸出零信任的應用場景分為三塊——端上的需求、系統側的需求和鏈路需要。
  • 騰訊主導確立全球首個零信任安全國際標準
    成為國際上首個零信任安全技術標準。此項標準對促進全球網絡安全產業健康發展,加快零信任技術和服務快速發展與普及具有重要深遠的意義。零信任安全,是以身份為中心,進行網絡動態訪問控制,其核心思想是不信任網絡內外部任何人/設備/系統,需要基於認證和授權重構訪問控制的信任基礎。
  • 白人特權存在嗎?如果有,是什麼?
    We don’t have the privilege of ignoring racism without consequence.【回答】在美利堅合眾國的自豪美國人(2004年至今)是的,白人特權是存在的。是的,這是一件大事。今天,很多美國人,尤其是白人,誤解了白人特權的真正含義。
  • 國內首個零信任產業標準工作組成立,騰訊iOA重磅升級
    」,覆蓋產、學、研、用四大領域,推動零信任系列團體標準的研究、研製與產業化落地,提高零信任技術的應用效率。同時,騰訊正式發布自研零信任安全管理系統iOA(簡稱騰訊iOA)5. 0 版本,為護航企業辦公安全提供更優質的標準化服務。
  • 零信任安全技術研討會在京舉辦 騰訊安全倡導生態聯動規範產業發展
    傳統邊界安全以網絡為中心、信任為基礎,採用一次認證的靜態策略;而零信任安全以數據為中心,默認不信任,採用持續評估、動態訪問控制的策略。零信任安全實踐「落地生花」,持續推動產業數位化升級自2010年零信任概念被提出以來,零信任安全的市場需求在這十年間迎來爆發式增長,國內外安全廠商各類概念產品紛紛湧現,並呈網絡安全發展主流之勢。據謝琴介紹,天融信科技集團提出的零信任網絡安全體系並非完全顛覆現有網絡安全技術體系,而是對現有體系能力的增強。