Abstract:
With the emergence of new IT technologies such as cloud computing, increasingly blurred network security boundaries, complex network access environment and huge network a...Show MoreMetadata
Abstract:
With the emergence of new IT technologies such as cloud computing, increasingly blurred network security boundaries, complex network access environment and huge network assets also bring new challenges to enterprise security: The east-west traffic is difficult to control, the network strategy of huge assets is difficult to maintain, the north-south traffic lacks perfect access, and access environment security is not related to the network policy. Traditional protection schemes based on fixed boundaries are beginning to fail. In this paper, a zero trust protection method based on network micro-segmentation, security gateway, and device environment perception is proposed.
Published in: ISCTT 2021; 6th International Conference on Information Science, Computer Technology and Transportation
Date of Conference: 26-28 November 2021
Date Added to IEEE Xplore: 22 March 2022
Print ISBN:978-3-8007-5727-5
Conference Location: Xishuangbanna, China