
JSOC IT Embracing a Zero Trust Security Model
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
このコンテンツについて
JSOC IT advocates for the adoption of a zero trust security model in organizations, particularly in the context of a remote workforce and cloud computing. It emphasizes that traditional perimeter-based security strategies are no longer effective in this new landscape and proposes a "trust no one" approach, where all users, devices, and services are considered potentially hostile. The document then outlines the six pillars of a zero-trust security model, including user authentication, device monitoring, network segmentation, application security, automation, and analytics. It goes on to explain how Splunk's Data-to-Everything Platform can be used to implement a zero-trust strategy by providing continuous monitoring, visibility into service health and component relationships, and automation capabilities for policy enforcement and incident response. The document concludes by highlighting the importance of embracing a data-driven approach to security and leveraging the flexibility of Splunk's platform to connect disparate technologies and improve decision-making across the enterprise.