当前位置:网站首页>Thales security solutions: key steps to improve national network security
Thales security solutions: key steps to improve national network security
2022-07-19 07:31:00 【strut200805】
2021 year 5 month 12 How did the White House executive order issued on the th set a new 、 Strict government network security standards . From then on , Office of management and budget (OMB) Released a strategy , To help institutions implement these Standards , Especially those with zero trust with them (ZTA) Change relevant standards . The document requires agencies to 2024 Achieve the specific goal of zero trust by the end of the year . So , Institutions must decide how to use a centralized identity management system , Multifactor certification (MFA) And a reliable list of assets . then , They need to submit the implementation plan of these measures , And after the strategy takes effect 60 Create within days 2024 Budget estimates for the fiscal year .
However , It's not always that easy . Public sector institutions —— Especially state and local government agencies —— Sometimes there is a lack of technology or technical expertise to implement the above safety measures . Fortunately, , These organizations can take advantage of Thales New of the company “Cyber pack”.
Next we will explore how this type of solution works .
What is? Cyber pack?
Thales network package is a cloud based overall solution , Help organizations improve their network security posture through the following key points :
Find out - Quickly discover and classify data
Protect — Encrypt data at rest and in flight , No expensive impact on performance
control - Digital threats of isolation and layer access , Such as blackmail software attack
Thales The company designed Cyber Packs To help American companies prepare for executive orders . They enable institutions to find... Anywhere 、 Protect and control access to sensitive data . While doing all this work , They also integrate existing IT infrastructure , And provides the same level of security , Whether deployed locally or in the cloud . These capabilities are important for preventing intrusion 、 Minimize the impact of successful intrusion 、 Incident detection and response as well as relevant incident evidence collection are essential .
Cloud security
2021 year 5 The monthly executive order requires 3(c)(i) Regulations , organization “ A federal cloud security strategy should be developed , And provide corresponding guidance to the organization ”. To support this requirement , Network packages provide organizations IaaS and PaaS Cloud policy comes with encryption (BYOE) function . They are themed with encryption , Through file level encryption and fine-grained access control , Enable the organization to maintain control over keys and encryption , Achieve zero trust in the cloud . These solutions balance these specifications with additional features , Such as hsm That is, cloud key management of services 、 be used for Azure and SFDC Cloud key broker service , And meet the Standards , Include FIPS 140-2 Level 3、ISO 27001 and SOC Type 2.
Identify unclassified data
In subsequent executive orders , requirement 3(c)(iv) Regulations , Institutions within the scope “…… Priority should be given to identifying unclassified data that the agency considers to be the most sensitive under the greatest threat , And provide appropriate processing and storage solutions for these data .” The network package enables its own key in a variety of multi cloud deployments (BYOK) And for Google EKM Provide your own key (HYOK) To solve this instruction . It also includes AWS GovCloud and Azure U.S. Government.
MFA And encryption
In section of the executive order 3(d) In , The White House explained “…… Agencies should comply with the federal records act to the greatest extent .... Under the circumstances , Adopt multi factor authentication and encryption for data at rest and in transmission ”. Cyber pack It can help organizations scan sensitive data in their internal sites and cloud based environments ( Include structured 、 Unstructured and cloud object data storage ) To achieve this goal . then , They can repair data discovery from the same platform through encryption and access control , Use real end-to-end 、 Authenticate network encryption 、MFA、 Identity is service 、 Strategic management 、 risk assessment 、 Border protection 、 session management , And right ISO/IEC 27001、CSA STAR and SOC 2 And other compliance frameworks .
边栏推荐
- Pytorch learning diary (4)
- Hypothesis testing
- Xiaodi network security note information collection CDN bypass technology (7)
- Gnome installs the extension (version 40.1, openSUSE tumblefeed).
- M simulation of DQPSK modulation and demodulation technology based on MATLAB
- Classes and objects
- SSM integration
- Crawler foundation - Web page Foundation
- 小怿和你聊聊V2X测试系列之 如何实现C-V2X HIL测试(2022版)
- Review - 5703 Statistical Inference and Modeling
猜你喜欢

Network knowledge-02 physical layer

My world 1.12.2 Magic Baby (Fairy treasure dream) service opening tutorial

Xiaodi network security note information collection CDN bypass technology (7)

Network knowledge-04 network layer IPv6

Paper reading: deep residual shrink networks for fault diagnosis

【操作细则】如何实现TSN系统级测试?

ivew 穿梭框Transfer组件高亮显示操作值

IP103.53.125. XXX IP address segment details

网络知识-03 数据链路层-以太网

Review of 4246 Algorithms for Data Science
随机推荐
What role does 5g era server play in this?
一文带你了解SOA接口测试
Review of 4246 Algorithms for Data Science
网络知识-04 网络层-IPv4协议
4.IDEA的安装与使用
网络知识-05 传输层-TCP
WCDMA soft handoff performance matlab simulation m, comparing the average number of activation sets (MasN), activation set update rate (Asur) and call interruption probability (OP) three performance i
爬虫基础—多线程和多进程的基本原理
Crawler Basics - session and cookies
Download, configuration and basic use of C language compiler
Network knowledge-05 transport layer TCP
3D可视化入门基础:看渲染管线如何在GPU运作
Coursera deep learning notes
Minecraft integration package [gtnh] gray Technology: new vision server building tutorial
MySql
How to record enterprise or personal domain names
M simulation of DQPSK modulation and demodulation technology based on MATLAB
MySQL decompression installation steps (Windows)
Paper reading: deep residual shrink networks for fault diagnosis
Pytorch learning diary (II)