课程: Applying the Azure Well-Architected Framework
免费学习该课程!
今天就开通帐号,24,700 门业界名师课程任您挑!
Zero Trust model
- [Narrator] Imagine your house is in a neighborhood where you can't be sure who is trustworthy. Instead of assuming everyone is friendly, you install locks on every door and window, and you verify the identity of anyone who wants to enter. This is the essence of the Zero Trust Model. Zero Trust is a security model that assumes breaches and verifies every request as if it came from an untrusted network. It limits access to only what's necessary, and continuously validates trust. In the cloud, we don't trust any request by default, even if it comes from within our network. Every access request is verified, as if it originates from an open network. To implement Zero Trust, we use several strategies. First, we enforce strong authentication methods, such as multi-factor authentication, or MFA, to ensure that users are who they claim to be. Think of MFA as having a key and a fingerprint scanner to enter your house. Both are required to gain access. Next, we use conditional access policies…