欢迎大家赞助一杯啤酒🍺 我们准备了下酒菜:Formal mathematics/Isabelle/ML, Formal verification/Coq/Agda, C++/Erlang/Lisp
Zero trust security model
来自开放百科 - 灰狐
(版本间的差异)
小 (→简介) |
小 (→链接) |
||
(未显示1个用户的6个中间版本) | |||
第17行: | 第17行: | ||
==项目== | ==项目== | ||
+ | *[https://github.com/pomerium/awesome-zero-trust Awesome Zero trust] [[文件:awesome.png]] | ||
+ | *[https://github.com/topics/zero-trust zero-trust Topics] | ||
+ | *[https://github.com/ukncsc/zero-trust-architecture Zero trust architecture design principles] | ||
+ | *[https://github.com/smallstep/cli Step CLI] A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc. | ||
+ | *[https://github.com/smallstep/certificates Step CA] online Certificate Authority (CA). | ||
+ | *[https://github.com/pritunl/pritunl-zero Zero trust system] | ||
+ | *[https://github.com/codenotary/immudb immudb] immutable database based on zero trust, SQL and Key-Value, tamperproof, data change history | ||
==文档== | ==文档== | ||
*[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf Zero Trust Architecture] | *[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf Zero Trust Architecture] | ||
*[http://blog.nsfocus.net/wp-content/uploads/2020/08/NIST-SP-800-207-Zero-Trust-Architecture-202008.pdf NIST标准《零信任架构》正式版(中文)] | *[http://blog.nsfocus.net/wp-content/uploads/2020/08/NIST-SP-800-207-Zero-Trust-Architecture-202008.pdf NIST标准《零信任架构》正式版(中文)] | ||
+ | |||
+ | ==书籍== | ||
+ | *《零信任网络:在不可信网络中构建安全系统》 | ||
==图集== | ==图集== | ||
第28行: | 第38行: | ||
==链接== | ==链接== | ||
+ | *[https://on2it.net/ ON2IT] – Zero Trust Innovators | IT security | ||
[[category:security]] | [[category:security]] | ||
[[category:identity]] | [[category:identity]] | ||
+ | [[category:Huihoo Foundation]] |
2022年4月22日 (五) 09:21的最后版本
您可以在Wikipedia上了解到此条目的英文信息 Zero trust security model Thanks, Wikipedia. |
Zero trust security model
目录 |
[编辑] 简介
zero trust security model (也称为 zero trust architecture, zero trust network architecture, ZTA, ZTNA)。
Zero Trust Architecture 是个重要的安全范式,企业客户也纷纷开始从远程办公和大数据安全防护场景中设计和部署零信任架构。
零信任将安全性从基于网络位置的默认信任转移到基于每个事务的信任评估上来。
实现 ZTA 的企业应该具有身份、凭证和访问管理(ICAM)以及资产管理系统。
[编辑] 功能
[编辑] 指南
[编辑] 项目
- Awesome Zero trust
- zero-trust Topics
- Zero trust architecture design principles
- Step CLI A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
- Step CA online Certificate Authority (CA).
- Zero trust system
- immudb immutable database based on zero trust, SQL and Key-Value, tamperproof, data change history
[编辑] 文档
[编辑] 书籍
- 《零信任网络:在不可信网络中构建安全系统》
[编辑] 图集
[编辑] 链接
- ON2IT – Zero Trust Innovators | IT security
分享您的观点