- 1、本文档共71页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
(2023)
- 1-
零信任产业标准工作组和云计算开源产业联盟零信任实验室 联合发布
引言
1. 数据安全面临严峻挑战·······································1
2.零信任的定义和应用场景····································3
2.1 零信任术语··················································3
2.2 零信任常见的应用场景概述·····································4
3.零信任应对数据安全之道····································5
3.1 零信任和数据安全的关系·······································5
3.2 零信任视角下的数据安全风险····································6
3.3 零信任应对数据安全风险的关键点································7
4.零信任应用于数据安全合规···································10
4.1 国外数据合规的现状··········································10
4.2 我国数据合规的现状··········································10
4.3 零信任数据安全在合规领域的应用场景····························10
5.零信任应用于数据安全攻防···································13
5.1 零信任理念用于数据安全访问控制·······························13
5.2 终端侧数据安全保护··········································13
5.3 数据传输通道安全保护········································15
5.4 敏感文件流转过程信任控制·····································16
5.5 业务访问信任控制············································16
5.6 服务端侧数据安全保护········································17
6.零信任数据安全应用需求场景···································19
6.1 金融证券数据安全管控场景···································19
-2 -
6.2 证券行业零信任远程安全接入场景·······························21
6.3 电网行业多网隔离防护场景·····································24
6.4 政务文档跨部门共享数据防泄密场景······························29
6.5 关键数据识别与保护场景·······································33
6.6 高科技行业零信任数据安全防护场景······························35
6.7 研发场景···················································36
6.8 工业互联网场景·············································40
6.9 远程办公场景···············································42
6.10企业数据服务API安全防护场景·································47
7. 结束语···········································
文档评论(0)