基于零信任的安全架构  被引量:18

Security Architecture based on Zero Trust

在线阅读下载全文

作  者:曾玲 刘星江[1] ZENG Ling;LIU Xing-jiang(No.30 Institute of CETC,Chengdu Sichuan 610041,China)

机构地区:[1]中国电子科技集团公司第三十研究所,四川成都610041

出  处:《通信技术》2020年第7期1750-1754,共5页Communications Technology

摘  要:随着高级威胁和内部风险的日益增强,云计算、大数据、移动互联的飞速发展,远程办公、异地分支的大量应用,网络边界越来越模糊,传统的网络安全架构已难以满足安全新需求。零信任网络打破了传统的认证即信任、边界防护、静态访问控制,以网络为中心等思维,建立起一套以资源为中心,以识别、认证、动态访问控制、授权、审计以及监测为链条,以最小化实时授权为核心,以多维信任算法为基础,认证达末端的动态安全架构。With the increasing of high-level threats and internal risks,the rapid development of cloud computing,big data,mobile internet,a large number of applications of remote offices and remote branches,the network boundary is more and more fuzzy,the traditional network security architecture has been difficult to meet the new security needs.Zero-trust network breaks the traditional authentication,ie,trust,border protection,static access control,and network-centric thinking.It establishes a set of dynamic security architecture with resource as the center,identification,authentication,dynamic access control,authorization,audit and monitoring as the chain,minimal real-time authorization as the core,multi-dimensional trust algorithm as the foundation,and authentication to the end.

关 键 词:边界防护 传统网络 零信任 动态访问 最小化授权 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象