TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

What Is Zero Trust Architecture and Security?

4 点作者 CKMo将近 2 年前

2 条评论

austin-cheney将近 2 年前
This is my attempt to achieve Zero Trust in a way that greatly exceeds the Microsoft and US Army Zero Trust specifications:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;prettydiff&#x2F;share-file-systems&#x2F;blob&#x2F;master&#x2F;documentation&#x2F;decentralization.md">https:&#x2F;&#x2F;github.com&#x2F;prettydiff&#x2F;share-file-systems&#x2F;blob&#x2F;master...</a>
CKMo将近 2 年前
I’m a traditional network person. Is there a way to avoid zero trust?<p>It’s possible. Here’s a way to determine if the organization can ignore zero trust altogether:<p>- There is no shift to the cloud, now or in the future<p>- The supply chain is wholly owned by the organization or provided by vendors that allow for full auditing and verification<p>- All assets are self-hosted and managed by the organization<p>- All user devices are provided and strictly managed by the organization<p>- All users can be expected to connect from within a pre-determined physical location, not through a VPN<p>- All users are completely trustworthy at all times with no financial incentive to become compromised<p>- All users are well-trained in cybersecurity concepts and would never be negligent insiders<p>- All acquisitions and mergers are extremely audited for the above requirements, or assets are not co-mingled until the above requirements are met