Zero Trust Explained
- Security threats can be inside or outside your network.
- Every device and person accessing resources on your network must be authenticated and authorized.
- By default, no person or device is trusted.
How does Zero Trust work?
To enhance security in modern enterprises where users and devices are remote and threats are bypassing traditional perimeter defenses, it’s critical to have a rigorous security model that performs checks on a continuous basis. Before accessing the network, all devices and users should be identified and authenticated and given the least amount of access required, and then continuously monitored
Zero Trust requires the following key components:
- 全面的可见性 - 主动和被动发现提供了网络上所有用户和设备的全面可见性,这可以帮助您实施控件。
- 最少访问微型细分和控制 - 访问控制策略授予对设备或用户绝对必要的资源的访问权限,并将其从不需要的其他资源中进行分割。
- Continuous monitoring and enforcement – Ongoing monitoring of users and devices on the network greatly reduces risks related to threats and malware.
Aruba ESPenables Zero Trust best practices to provide a comprehensive set of capabilities that span visibility, control, and enforcement to address the requirements of a decentralized, IoT-driven network infrastructure.
为什么零信任呢?
Network security is increasingly challenging because of mobility, IoT, and telecommuting environments. Zero Trust allows you to increase visibility, control, and enforcement to address the security requirements of a decentralized, IoT-driven network infrastructure.
Benefits of Zero Trust
零信任有助于确保当今的移动性,物联网和家庭环境中的工作时代的网络安全。
- Limits exposure to security risks related to vulnerable IoT devices.
- Helps reduce the risk of advanced threats that bypass traditional perimeter security controls.
- Limits damage related to lateral movement by attackers and infected devices.
- 无论是谁或什么连接以及从哪里连接,采取更全面的方法。
- Applies best practices such as micro-segmentation for a “Least Access” approach.