发行时间:2024.03.07
总页数:12
编辑:
harlan
摘要:
National Security Agency | Cybersecurity Information Sheet
Advancing Zero Trust Maturity Throughout the Network and Environment Pillar
Executive summary
After gaining access to an organization’s network, one of the most common techniques malicious cyber actors use is lateral movement through the network, gaining access to more sensitive data and critical systems. The Zero Trust network and environment pillar curtails adversarial lateral movement by employing controls and capabilities to log...