信息安全研究 ›› 2021, Vol. 7 ›› Issue (E1): 117-.

• 优秀论文 • 上一篇    下一篇

HiSec 零信任安全解决方案

薛人瑞1吴华佳2   

  1. 1(华为技术有限公司ICT产品与解决方案部杭州310051)
    2(华为技术有限公司ICT产品与解决方案部北京100095)
  • 出版日期:2022-04-20 发布日期:2022-04-22
  • 通讯作者: 薛人瑞 高级工程师.主要研究方向为零信任安全、等级保护、网络与信息安全. xuerenrui@huawei.com
  • 作者简介:薛人瑞 高级工程师.主要研究方向为零信任安全、等级保护、网络与信息安全. xuerenrui@huawei.com 吴华佳 高级工程师.主要研究方向为零信任安全、大数据安全、网络与信息安全. wuhuajia@huawei.com

HiSec Zero Trust Security Solution

  • Online:2022-04-20 Published:2022-04-22

摘要: 随着数字产业化和产业数字化的蓬勃发展,数据驱动的新型数字产业体系正在加速形成.产业数字化浪潮为企业开启了商业模式再造和产业转型升级的大门,又为企业带来了多方面严峻的安全挑战.企业迫切需要新一代的信息安全防护体系来为数字化转型保驾护航.零信任架构和指导模型已经获得了长足发展,并已成为一种主流的安全模型,日益受到更多政府机构以及企业客户的认可与重视.重点分析数字化转型带来的安全问题及华为零信任安全架构的特点,此外通过场景化实践介绍了方案特点,最后分享典型应用案例介绍零信任安全架构给用户带来的价值,诠释了零信任方案满足当下以及未来业务安全需求,为数字化转型构建可靠、坚实的保障.

关键词: 零信任, SDP, 持续验证, 动态授权, 全局防御

Abstract: With the vigorous development of digital industrialization and industrial digitization, the formation of a new datadriven digital industry system is accelerating. The wave of industrial digitization not only opens the door to business model reconstruction and industrial transformation and upgrading, but also brings many severe security challenges to enterprises. Enterprises urgently need a new generation of information security protection system to support digital transformation. The zerotrust architecture and guidance model have made significant progress to become a mainstream security model, which is gradually recognized and valued by an increasing number of government agencies and enterprise customers. This paper mainly analyzes the security problems brought by digital transformation and the characteristics of the zerotrust security architecture. In addition, it elaborates on the architecture characteristics through scenariospecific practices. Finally, it shares typical application cases, discusses the value of zero trust to users, and concludes that the zerotrust architecture can meet existing and future service security needs so as to provide a reliable and solid guarantee for digital transformation.

Key words: zero trust, SDP, continuous verification, dynamic authorization, global defense