Zero trust security model.: D97-1/10-008-2022E-PDF
"The traditional security model used by organizations to protect information systems focused on perimeter defense and implicitly trusted anyone inside the corporate network, therefore granting them access to resources. As more governments and enterprises undergo digital transformation, adopt cloud-based technologies, and embrace remote/hybrid work, the traditional perimeter-focused defenses are no longer sufficient to protect internal networks and data. This document provides information on Zero Trust (ZT) as a model to address the modern challenges of securing remote workers, protecting hybrid cloud environments, and defending against cyber security threats"--Page 1.
Permanent link to this Catalogue record:
publications.gc.ca/pub?id=9.916433&sl=0
| Department/Agency |
|
|---|---|
| Title | Zero trust security model. |
| Series title |
|
| Publication type | Monograph - View Master Record |
| Language | [English] |
| Other language editions | [French] |
| Format | Digital text |
| Electronic document | |
| Note(s) |
|
| Publishing information |
|
| Description | 1 online resource (2 pages) : illustrations. |
| ISBN | 9780660459189 |
| Catalogue number |
|
| Subject terms |
Request alternate formats
To request an alternate format of a publication, complete the Government of Canada Publications email form. Use the form’s “question or comment” field to specify the requested publication.Page details
- Date modified: