{"id":888,"date":"2022-01-26T14:44:00","date_gmt":"2022-01-26T06:44:00","guid":{"rendered":"https:\/\/www.comodo.tw\/?p=888"},"modified":"2024-08-21T06:28:10","modified_gmt":"2024-08-20T22:28:10","slug":"%e7%99%bd%e5%ae%ae%e8%a6%81%e6%b1%82%e7%be%8e%e5%9c%8b%e6%94%bf%e5%ba%9c%e4%bd%bf%e7%94%a8%e9%9b%b6%e4%bf%a1%e4%bb%bb%e5%ae%89%e5%85%a8%e6%a8%a1%e5%9e%8b","status":"publish","type":"post","link":"https:\/\/www.comodo.tw\/?p=888","title":{"rendered":"\u767d\u5bae\u8981\u6c42\u7f8e\u570b\u653f\u5e9c\u4f7f\u7528\u96f6\u4fe1\u4efb\u5b89\u5168\u6a21\u578b"},"content":{"rendered":"\n<p>\u767d\u5bae\u5e0c\u671b\u7f8e\u570b\u653f\u5e9c\u4f7f\u7528\u96f6\u4fe1\u4efb\u5b89\u5168\u6a21\u578b\u65b0\u767c\u5e03\u7684\u806f\u90a6\u6230\u7565\u5e0c\u671b\u7f8e\u570b\u653f\u5e9c\u5728\u672a\u4f86\u5169\u5e74\u5167\u63a1\u7528\u201c\u96f6\u4fe1\u4efb\u201d\u5b89\u5168\u6a21\u5f0f\uff0c\u4ee5\u62b5\u79a6\u7576\u524d\u7684\u5a01\u8105\u4e26\u52a0\u5f37\u806f\u90a6\u6a5f\u69cb\u7684\u7db2\u8def\u5b89\u5168\u9632\u79a6\u3002\u5099\u5fd8\u9304\u63d0\u51fa\u4e86\u806f\u90a6\u96f6\u4fe1\u4efb\u67b6\u69cb (ZTA) \u6230\u7565\uff0c\u8981\u6c42\u5404\u6a5f\u69cb\u5728 2024 \u8ca1\u5e74 (FY) \u7d50\u675f\u524d\u6eff\u8db3\u7279\u5b9a\u7684\u7db2\u8def\u5b89\u5168\u6a19\u6e96\u548c\u76ee\u6a19\uff0c\u4ee5\u52a0\u5f37\u653f\u5e9c\u5c0d\u65e5\u76ca\u8907\u96dc\u548c\u6301\u7e8c\u7684\u5a01\u8105\u6d3b\u52d5\u7684\u9632\u79a6\u3002\u65b0\u96f6\u4fe1\u4efb\u7b56\u7565\u7684\u95dc\u9375\u8981\u7d20\u5305\u62ec\u901a\u904e\u5f37\u5927\u7684\u591a\u56e0\u7d20\u8eab\u4efd\u9a57\u8b49\u6539\u9032\u7db2\u8def\u91e3\u9b5a\u9632\u79a6\u3001\u6574\u5408\u6a5f\u69cb\u8eab\u4efd\u7cfb\u7d71\u3001\u52a0\u5bc6\u6d41\u91cf\u548c\u5c07\u5167\u90e8\u7db2\u8def\u8996\u70ba\u4e0d\u53d7\u4fe1\u4efb\uff0c\u4ee5\u53ca\u52a0\u5f37\u61c9\u7528\u7a0b\u5e8f\u5b89\u5168\u6027\u4ee5\u66f4\u597d\u5730\u4fdd\u8b77\u6578\u64da\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2021\/05\/01\/hacking.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>\u4e00\u9805\u65b0\u767c\u5e03\u7684\u806f\u90a6\u6230\u7565\u5e0c\u671b\u7f8e\u570b\u653f\u5e9c\u5728\u672a\u4f86\u5169\u5e74\u5167\u63a1\u7528\u201c\u96f6\u4fe1\u4efb\u201d\u5b89\u5168\u6a21\u5f0f\uff0c\u4ee5\u62b5\u79a6\u7576\u524d\u7684\u5a01\u8105\u4e26\u52a0\u5f37\u806f\u90a6\u6a5f\u69cb\u7684\u7db2\u8def\u5b89\u5168\u9632\u79a6\u3002<\/p>\n\n\n\n<p>\u8a72\u6230\u7565\u4eca\u5929\u7531\u767d\u5bae\u7ba1\u7406\u548c\u9810\u7b97\u8fa6\u516c\u5ba4 (OMB) \u767c\u5e03\uff0c\u8a72\u8fa6\u516c\u5ba4\u8ca0\u8cac\u76e3\u7763\u7e3d\u7d71\u9858\u666f\u5728\u7f8e\u570b\u884c\u653f\u90e8\u9580\u7684\u5be6\u65bd\u3002<\/p>\n\n\n\n<p>\u4eca\u5929\u7684\u516c\u544a\u662f\u5728 2021 \u5e74 9 \u6708<a rel=\"noreferrer noopener\" href=\"https:\/\/www.whitehouse.gov\/omb\/briefing-room\/2021\/09\/07\/office-of-management-and-budget-releases-draft-federal-strategy-for-moving-the-u-s-government-towards-a-zero-trust-architecture\/\" target=\"_blank\">\u767c\u5e03\u7684\u521d\u6b65\u6230\u7565\u8349\u6848\u4e4b\u5f8c\u767c\u5e03\u7684\uff0c\u8a72\u8349\u6848\u662f\u7531<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/biden-issues-executive-order-to-increase-us-cybersecurity-defenses\/\" target=\"_blank\">\u7e3d\u7d71\u7684\u884c\u653f\u547d\u4ee4 (EO) 14028<\/a>\u63a8\u52d5\u7684\u3002<\/p>\n\n\n\n<p>\u8a72\u884c\u653f\u547d\u4ee4\u555f\u52d5\u4e86\u653f\u5e9c\u7bc4\u570d\u5167\u7684\u52aa\u529b\uff0c\u4ee5\u5411\u96f6\u4fe1\u4efb\u9077\u79fb\u4e26\u4f7f\u570b\u5bb6\u5c0d\u7db2\u8def\u653b\u64ca\u7684\u9632\u79a6\u73fe\u4ee3\u5316\u3002<\/p>\n\n\n\n<p>\u201c\u8a72\u5099\u5fd8\u9304\u63d0\u51fa\u4e86\u806f\u90a6\u96f6\u4fe1\u4efb\u67b6\u69cb (ZTA) \u6230\u7565\uff0c\u8981\u6c42\u5404\u6a5f\u69cb\u5728 2024 \u8ca1\u5e74 (FY) \u7d50\u675f\u524d\u6eff\u8db3\u7279\u5b9a\u7684\u7db2\u8def\u5b89\u5168\u6a19\u6e96\u548c\u76ee\u6a19\uff0c\u4ee5\u52a0\u5f37\u653f\u5e9c\u5c0d\u65e5\u76ca\u8907\u96dc\u548c\u6301\u7e8c\u7684\u5a01\u8105\u6d3b\u52d5\u7684\u9632\u79a6\uff0c\u201d OMB \u7684\u4ee3\u7406\u4e3b\u4efb Shalanda D. Young \u8aaa\u3002<\/p>\n\n\n\n<p>\u201c\u9019\u4e9b\u6d3b\u52d5\u91dd\u5c0d\u806f\u90a6\u6280\u8853\u57fa\u790e\u8a2d\u65bd\uff0c\u5a01\u8105\u516c\u5171\u5b89\u5168\u548c\u96b1\u79c1\uff0c\u640d\u5bb3\u7f8e\u570b\u7d93\u6fdf\uff0c\u524a\u5f31\u5c0d\u653f\u5e9c\u7684\u4fe1\u4efb\u3002\u201d<\/p>\n\n\n\n<p>\u65b0\u96f6\u4fe1\u4efb\u7b56\u7565\u7684\u95dc\u9375\u8981\u7d20\u5305\u62ec\u901a\u904e\u5f37\u5927\u7684\u591a\u56e0\u7d20\u8eab\u4efd\u9a57\u8b49\u6539\u9032\u7db2\u8def\u7d61\u91e3\u9b5a\u9632\u79a6\u3001\u6574\u5408\u6a5f\u69cb\u8eab\u4efd\u7cfb\u7d71\u3001\u52a0\u5bc6\u6d41\u91cf\u548c\u5c07\u5167\u90e8\u7db2\u8def\u8996\u70ba\u4e0d\u53d7\u4fe1\u4efb\uff0c\u4ee5\u53ca\u52a0\u5f37\u61c9\u7528\u7a0b\u5e8f\u5b89\u5168\u6027\u4ee5\u66f4\u597d\u5730\u4fdd\u8b77\u6578\u64da\u3002<\/p>\n\n\n\n<p>OMB \u7684\u65b0\u806f\u90a6\u96f6\u4fe1\u4efb\u6230\u7565\u9810\u8a08\u806f\u90a6\u653f\u5e9c\u5c07\uff1a<\/p>\n\n\n\n<ul><li>\u806f\u90a6\u5de5\u4f5c\u4eba\u54e1\u64c1\u6709\u4f01\u696d\u7ba1\u7406\u7684\u5e33\u6236\uff0c\u4f7f\u4ed6\u5011\u80fd\u5920\u8a2a\u554f\u5b8c\u6210\u5de5\u4f5c\u6240\u9700\u7684\u4e00\u5207\uff0c\u540c\u6642\u53ef\u9760\u5730\u4fdd\u8b77\u5176\u514d\u53d7\u91dd\u5c0d\u6027\u7684\u3001\u8907\u96dc\u7684\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u3002<\/li><li>\u806f\u90a6\u5de5\u4f5c\u4eba\u54e1\u7528\u4f86\u5b8c\u6210\u5de5\u4f5c\u7684\u8a2d\u5099\u6703\u53d7\u5230\u6301\u7e8c\u8ddf\u8e2a\u548c\u76e3\u63a7\uff0c\u4e26\u4e14\u5728\u6388\u4e88\u5c0d\u5167\u90e8\u8cc7\u6e90\u7684\u8a2a\u554f\u6b0a\u9650\u6642\u6703\u8003\u616e\u9019\u4e9b\u8a2d\u5099\u7684\u5b89\u5168\u72c0\u6cc1\u3002<\/li><li>\u4ee3\u7406\u7cfb\u7d71\u76f8\u4e92\u9694\u96e2\uff0c\u5b83\u5011\u4e4b\u9593\u548c\u5167\u90e8\u7684\u7db2\u8def\u6d41\u91cf\u88ab\u53ef\u9760\u5730\u52a0\u5bc6\u3002<\/li><li>\u4f01\u696d\u61c9\u7528\u7a0b\u5e8f\u7d93\u904e\u5167\u90e8\u548c\u5916\u90e8\u6e2c\u8a66\uff0c\u53ef\u4ee5\u901a\u904e Internet \u5b89\u5168\u5730\u63d0\u4f9b\u7d66\u54e1\u5de5\u3002<\/li><li>\u806f\u90a6\u5b89\u5168\u5718\u968a\u548c\u6578\u64da\u5718\u968a\u5171\u540c\u958b\u767c\u6578\u64da\u985e\u5225\u548c\u5b89\u5168\u898f\u5247\uff0c\u4ee5\u81ea\u52d5\u6aa2\u6e2c\u4e26\u6700\u7d42\u963b\u6b62\u5c0d\u654f\u611f\u4fe1\u606f\u7684\u672a\u7d93\u6388\u6b0a\u7684\u8a2a\u554f<\/li><\/ul>\n\n\n\n<p>\u5728\u7db2\u8def\u5b89\u5168\u516c\u53f8\u591a\u5e74\u4f86\u63a8\u52d5\u96f6\u4fe1\u4efb\u7db2\u8def\u6a21\u578b\u4e4b\u5f8c\uff0c\u653f\u5e9c\u8f49\u5411\u96f6\u4fe1\u4efb\u5b89\u5168\u539f\u5247\u3002<\/p>\n\n\n\n<p>\u9019\u7a2e\u5c0d\u73fe\u4ee3\u5b89\u5168\u539f\u5247\u7684\u6301\u7e8c\u63a8\u52d5\u6700\u7d42\u5c0e\u81f4<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nsa-microsoft-promote-a-zero-trust-approach-to-cybersecurity\/\" target=\"_blank\">NSA \u548c Microsoft<\/a>\u5728 2021 \u5e74 2 \u6708\u70ba\u5927\u578b\u4f01\u696d\u548c\u95dc\u9375\u7db2\u8def\uff08\u570b\u5bb6\u5b89\u5168\u7cfb\u7d71\u3001\u570b\u9632\u90e8\u3001\u570b\u9632\u5de5\u696d\u57fa\u5730\uff09\u63a8\u85a6\u9019\u7a2e\u5b89\u5168\u65b9\u6cd5\u3002<\/p>\n\n\n\n<p>\u96f6\u4fe1\u4efb\u662f\u4e00\u7a2e\u5b89\u5168\u65b9\u6cd5\uff0c\u5176\u4e2d\u672c\u5730\u8a2d\u5099\u548c\u9023\u63a5\u6c38\u9060\u4e0d\u53d7\u4fe1\u4efb\uff0c\u4e26\u4e14\u6bcf\u4e00\u6b65\u90fd\u9700\u8981\u9a57\u8b49\uff0c\u56e0\u70ba\u9632\u5fa1\u8005\u5047\u8a2d\u5165\u4fb5\u8005\u5df2\u7d93\u53ef\u4ee5\u8a2a\u554f\u7db2\u8def\u3002<\/p>\n\n\n\n<p>\u8a72\u5b89\u5168\u6a21\u578b\u7531 Forrester Research \u7684 John Kindervag \u65bc 2010 \u5e74\u5275\u5efa\uff0c\u5728<a href=\"https:\/\/googleblog.blogspot.com\/2010\/01\/new-approach-to-china.html\" target=\"_blank\" rel=\"noreferrer noopener\">Aurora \u884c\u52d5<\/a>\u671f\u9593\u5176\u90e8\u5206\u77e5\u8b58\u7522\u6b0a\u88ab\u76dc\u5f8c\uff0cGoogle \u65bc 2009 \u5e74\u5728\u4e00\u500b\u5167\u90e8\u9805\u76ee\uff08\u73fe\u7a31\u70ba<a href=\"https:\/\/cloud.google.com\/beyondcorp\" target=\"_blank\" rel=\"noreferrer noopener\">BeyondCorp<\/a>&nbsp;\uff09\u4e2d\u5be6\u65bd\u4e86\u5176\u90e8\u5206\u6982\u5ff5\u3002<a href=\"https:\/\/googleblog.blogspot.com\/2010\/01\/new-approach-to-china.html\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p>\u201c\u9762\u5c0d\u65e5\u76ca\u8907\u96dc\u7684\u7db2\u8def\u5a01\u8105\uff0c\u653f\u5e9c\u6b63\u5728\u63a1\u53d6\u679c\u65b7\u884c\u52d5\u4f86\u52a0\u5f37\u806f\u90a6\u653f\u5e9c\u7684\u7db2\u8def\u9632\u79a6\uff0c\u201d\u694a<a rel=\"noreferrer noopener\" href=\"https:\/\/www.whitehouse.gov\/omb\/briefing-room\/2022\/01\/26\/office-of-management-and-budget-releases-federal-strategy-to-move-the-u-s-government-towards-a-zero-trust-architecture\/\" target=\"_blank\">\u88dc\u5145\u9053<\/a>\u3002<\/p>\n\n\n\n<p>\u201c\u9019\u7a2e\u96f6\u4fe1\u4efb\u6230\u7565\u65e8\u5728\u78ba\u4fdd\u806f\u90a6\u653f\u5e9c\u4ee5\u8eab\u4f5c\u5247\uff0c\u5b83\u6a19\u8a8c\u8457\u6211\u5011\u52aa\u529b\u64ca\u9000\u90a3\u4e9b\u6703\u5c0d\u7f8e\u570b\u9020\u6210\u50b7\u5bb3\u7684\u4eba\u7684\u653b\u64ca\u7684\u53e6\u4e00\u500b\u95dc\u9375\u91cc\u7a0b\u7891\u3002\u201d<\/p>\n\n\n\n<p>\u65b0\u805e\u4f86\u6e90 :<\/p>\n\n\n\n<p> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/white-house-wants-us-govt-to-use-a-zero-trust-security-model\/?fbclid=IwAR2GhHkiSjHSaoGtlgM5CzGn3a-xQI0Yh-RvNBgjesq1YRHFIsqWfcO0gSI\">https:\/\/www.bleepingcomputer.com\/news\/security\/white-house-wants-us-govt-to-use-a-zero-trust-security-model\/?fbclid=IwAR2GhHkiSjHSaoGtlgM5CzGn3a-xQI0Yh-RvNBgjesq1YRHFIsqWfcO0gSI<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u767d\u5bae\u5e0c\u671b\u7f8e\u570b\u653f\u5e9c\u4f7f\u7528\u96f6\u4fe1\u4efb\u5b89\u5168\u6a21\u578b\u65b0\u767c\u5e03\u7684\u806f\u90a6\u6230\u7565\u5e0c\u671b\u7f8e\u570b\u653f\u5e9c\u5728\u672a\u4f86\u5169\u5e74\u5167\u63a1\u7528\u201c\u96f6\u4fe1\u4efb\u201d\u5b89\u5168\u6a21\u5f0f\uff0c\u4ee5\u62b5\u79a6\u7576\u524d\u7684<a href=\"https:\/\/www.comodo.tw\/?p=888\">[&#8230;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":1029,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/www.comodo.tw\/index.php?rest_route=\/wp\/v2\/posts\/888"}],"collection":[{"href":"https:\/\/www.comodo.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.comodo.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.comodo.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.comodo.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=888"}],"version-history":[{"count":2,"href":"https:\/\/www.comodo.tw\/index.php?rest_route=\/wp\/v2\/posts\/888\/revisions"}],"predecessor-version":[{"id":895,"href":"https:\/\/www.comodo.tw\/index.php?rest_route=\/wp\/v2\/posts\/888\/revisions\/895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.comodo.tw\/index.php?rest_route=\/wp\/v2\/media\/1029"}],"wp:attachment":[{"href":"https:\/\/www.comodo.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.comodo.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.comodo.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}