当前位置:网站首页>When we talk about zero trust, what are we talking about?
When we talk about zero trust, what are we talking about?
2022-06-24 05:24:00 【Tencent security】
It is a new way of thinking to deal with network security .
ZERO TRUST stay 2010 Year by year Forrester analysts John Kindervag Formally put forward .
Zero trust is its English literal translation .
Zero trust is not a product , It's the idea —— In the world of network security , Don't trust anyone 、 Any device 、 Any environment . Every step you take , Need to prove that you are you .
In network security , How different are the old and new ways of thinking ?
for instance :《 Journey to the west 》 in , When Wukong left, he would draw a shiny circle for Tang Monk , Only our own people can go in and out , The bad guys ( Monster ) be unable to come in , Tang Monk can do anything in the circle , But we can't go out of the circle . This is the traditional network security mode . It has boundaries , Its advantage is that good people are absolutely safe , The disadvantage is that good people are easy to be eaten by monsters once they leave the circle . And zero trust , More like a belt , When Wukong left , Tie it to Monk Tang and younger martial brothers , They can run, jump and dance freely , Monsters can't touch .
2010 Zero year trust was formally proposed , Why hasn't it been noticed in the past few years ?
There are probably two reasons :
1、 The cost is too high , Network security is the foundation of an enterprise , Change mode is the reconstruction from thinking to layout , Who will bear the costs and risks here ?
2、 The demand is not high , Everyone is an enterprise , Fixed office buildings, fixed employees , Isn't border network security fragrant ? Why should I change it ?
So why is it so hot in recent years ?
Because of the epidemic .
Employees in the enterprise can't stay in the circle , They have to work on the move 、 Telecommuting to solve work problems , thus , It creates a more open 、 Complex and uncertain network environment , Security risks increase . According to the Zscaler data display : Since the new epidemic , Attacks against remote office users have grown 85%. How to build a trusted network in such a network environment 、 Terminals and applications , For enterprise development , Is the top priority of the moment .
Zero trust has become the best option to solve the problem of enterprise remote office .
Zero trust is hot , The industry advertises itself as “ Zero trust ” Our products are mixed , Huge Numbers of , For a time, it is difficult for the customer to identify : You said you had zero trust , Why is it so different from the zero trust of his family ?
The reason is , It is because the development is too fast and the growth is barbaric , The scheme design of zero trust for different subjects 、 Technical realization 、 Test evaluation 、 There is a great cognitive difference in the actual deployment and other stages , Lack of industry consensus 、 Standards and technical specifications , This requires from policy to industry , And finally to the enterprise , Carry out a series of scenes and links with operability and mutual recognition .
First, let's look at policy , 2019 year , Ministry of industry and information technology issued 《 Guidance on promoting the development of network security industry 》, Zero trust security is included in the key network security technology that needs to be broken through .2020 year , Issued by the ministry of industry and information technology “ On carrying out pilot demonstration work for the application of network security technology ” notice , Zero trust is also listed as cutting-edge 、 innovative 、 Leading major network security technology concept .
The support of the policy has achieved good response in the market , The product system with zero trust as the core is being enriched , Safety manufacturer 、 Cloud service provider 、 Solution providers, etc , All around their own technological advantages , There are different zero trust solutions with different focus , Meet the needs of enterprise customers in different scenarios .
in addition , In terms of standard system construction , The standard process of zero trust is also advancing rapidly ,2020 year 6 month 24 Japan , Tencent security joint zero trust field 16 A number of authoritative industry, University, research and application institutions jointly established the first in China “ Zero trust industry standards working group ”. A year later , The size of the working group was expanded to 42 home , And completed the interconnection and mutual recognition between multiple products . At the same time , Tencent security led the preparation of China's first 《 Zero trust system specification 》 Official release , It has been published as a group standard by China Electronics Industry Standardization Technology Association . The group logo was widely spread and recognized by the industry after its release . This year, 7 The first batch of zero trust special certification in China released by the trusted cloud conference in June , The evaluation standard also refers to the technical idea of the group logo . Let the domestic zero trust development start “ According to the can depend on ” A new chapter in .
Actually , Long before the outbreak , Many types of enterprises have begun to pay attention to zero trust .
According to this year 5 Released on 《 The blue report on zero trust security in the digital age shows 》 Zero trust can meet the security needs of some common scenarios of enterprises , Including telecommuting 、 A hybrid cloud 、 Enterprise remote branch access 、 Third party access, etc . Zero trust can also meet the special security needs of different industries , Such as the Internet industry 、 Communication industry 、 Logistics industry 、 The energy industry 、 Real estate industry, etc .
In the logistics industry , A large number of terminal equipment and personnel mobility , Tens of thousands of employees need more detailed authorization and behavior identification according to their duties and authorities , And dynamically detect and evaluate the compliance status of terminal equipment , For example, is there any security software installed on the terminal ? Is there a high-risk vulnerability ? Whether the equipment baseline configuration meets the safety requirements, etc . The same thing , It is also applicable to car enterprises .
In the Internet industry , Tencent is the first enterprise in China to practice zero trust , So that employees can work safely anytime, anywhere, no matter where they are . During the epidemic, it can make 7 Million employees work online at the same time , It ensures the orderly development of the company's business .
This year, 5 month , On the zero trust development trend held in Shanghai , Ding Ke, vice president of Tencent, said in combination with Tencent's own practice :“ Zero trust and the operation of an enterprise 、 planning 、 Long term development is strongly correlated , And it is a process of continuous optimization . The core value of zero trust is that the tool deployment is light enough 、 The cost of operation and maintenance is low enough , Improve the efficiency of enterprise operation and development flexibly and adaptively .”
As a new safety thinking mode , Zero trust has more vitality in the development of the digital age , It can be customized for enterprises , It can also be integrated with the safety thinking of the past , Help enterprises find the optimal solution that is more suitable for their own safety development .
Reference reading :
边栏推荐
- Tencent cloud installs Kedao cloud - build an exclusive private cloud disk
- What is the third level domain name? How to choose a domain name agent
- Zero code implements one-to-one table relationship and cascading save of infinite primary and child tables
- How to apply for a domain name for free? What is the importance of domain names?
- What is the difference between a traditional data center and a cloud computing data center?
- [sharing of competition experience] Rank5 in goose Rose Square - hard search
- Lightweight toss plan 3, develop in the browser - build your own development bucket (Part 2)
- What is a domain name server? What are the types of domain name servers?
- What cloud native knowledge should programmers master?
- [Tencent cloud] enterprise micro marketing, private domain traffic value growth and operation efficiency improvement
猜你喜欢

How does win10 turn off f1~f12 shortcut keys?
Learning routes and materials for cloud native O & M engineers
Easy to understand JDBC tutorial - absolutely suitable for zero Foundation
What cloud native knowledge should programmers master?

Intensive learning and application of "glory of the king" to complete the application of 7 real worlds other than human players

Answer questions! This article explains the automated testing framework in software testing from beginning to end

How should we learn cloud native in 2022?
![[leetcode daily question] push domino](/img/81/1c31e97d9a245816514bcf47c92107.jpg)
[leetcode daily question] push domino

Hard core observation 553 AI needs to identify almost everyone in the world with hundreds of billions of photos
随机推荐
Build personal leanote cloud notebook with Tencent cloud lightweight application server
Detailed explanation of the process after the browser enters the domain name and web address
Zero code implements one-to-one table relationship and cascading save of infinite primary and child tables
Where to check the computer domain name and where to buy the domain name is more reliable
What is an ECS? ECS、BCC、CVM...
Bert series Roberta Albert erine detailed explanation and use learning notes
Where does the website domain name buy a normal domain name? What is the approximate price
How to register an overseas domain name what should be paid attention to when registering a domain name
What is the secondary domain name of the website? What is the relationship between the secondary domain name and the primary domain name?
How to check the Chinese domain name of the website and through what channels?
What is domain name filing? What is the role of domain name filing?
What is a network domain name? What is the role of a domain name for an enterprise
PTA 1046 stroke (15 points)
What is cloud server? How to access the ECS Homepage
[jest] summary of the use of automated test jest
What is a domain name address? What is the reason for using a domain name address?
How to register a first level domain name what is a first level domain name
Spirit breath development log (9)
What domain name does not need to be filed? What should be done for domain name filing
GDB debugging container and command saving