零信任数据安全白皮书(2023).pdf

  1. 1、本文档共71页,可阅读全部内容。
  2. 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
(2023) - 1- 零信任产业标准工作组和云计算开源产业联盟零信任实验室 联合发布 引言 1. 数据安全面临严峻挑战·······································1 2.零信任的定义和应用场景····································3 2.1 零信任术语··················································3 2.2 零信任常见的应用场景概述·····································4 3.零信任应对数据安全之道····································5 3.1 零信任和数据安全的关系·······································5 3.2 零信任视角下的数据安全风险····································6 3.3 零信任应对数据安全风险的关键点································7 4.零信任应用于数据安全合规···································10 4.1 国外数据合规的现状··········································10 4.2 我国数据合规的现状··········································10 4.3 零信任数据安全在合规领域的应用场景····························10 5.零信任应用于数据安全攻防···································13 5.1 零信任理念用于数据安全访问控制·······························13 5.2 终端侧数据安全保护··········································13 5.3 数据传输通道安全保护········································15 5.4 敏感文件流转过程信任控制·····································16 5.5 业务访问信任控制············································16 5.6 服务端侧数据安全保护········································17 6.零信任数据安全应用需求场景···································19 6.1 金融证券数据安全管控场景···································19 -2 - 6.2 证券行业零信任远程安全接入场景·······························21 6.3 电网行业多网隔离防护场景·····································24 6.4 政务文档跨部门共享数据防泄密场景······························29 6.5 关键数据识别与保护场景·······································33 6.6 高科技行业零信任数据安全防护场景······························35 6.7 研发场景···················································36 6.8 工业互联网场景·············································40 6.9 远程办公场景···············································42 6.10企业数据服务API安全防护场景·································47 7. 结束语···········································

文档评论(0)

汀枫 + 关注
实名认证
内容提供者

机械工程师、监理工程师持证人

声明:本账号发布文档部分原创,部分来源于互联网和个人收集,仅用于技术分享交流,版权为原作者所有,如果侵犯了您的知识版权,请提出指正,将立即删除相关资料。留言回复如不及时,请加18651961930

领域认证该用户于2023年08月20日上传了机械工程师、监理工程师

1亿VIP精品文档

相关文档