Shared Responsibility Model

  • 云计算

Perimeter-Based Model

Zero Trust Model

  • Authentication(MFA, IAM, SSO)
  • Data Encryption(at rest and in transmit)
  • No Implicit Trust(Never Trust, Always Verify)
  • Least Privilege Access
  • NetWork Segmentation