This cybersecurity information sheet provides recommendations for maturing data security and enforcing access to data at rest and in transit, ensuring that only those with authorization can access the data.
It further discusses how these capabilities integrate into a comprehensive Zero Trust framework, as described in Embracing a Zero Trust Security Model. Traditional security approaches have often relied on perimeter defenses alone to secure networks.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | National Security Agency (NSA) |
Published: | April 9, 2024 |
License: | Public Domain |