This paper explores three approaches for protecting cloud application data planes to prevent unauthorized access to the application and its data and to prevent unwanted data exfiltration. Through an exploration of various concrete security architectures, we focus on (1) Cloud Security Perimeters to provide a boundary around data and infrastructure in the cloud that provides a line of defense both to improper access to sensitive information and the exfiltration of that information, (2) Cloud Landing Points to provide a safe integration point between parts of your cloud applications and on-premises applications to communicate through, and (3) Zero Trust security architectures that are built on the principles of defense in depth and least-privilege access. Using these approaches together provides critical protection for services and applications as they transition from traditional on-premises network security to the Cloud security architectures, and then to potentially Zero Trust security architectures.
翻译:本文探讨了保护云应用数据机的三种方法,以防止未经授权访问应用软件及其数据,并防止不必要的数据泄漏。通过探索各种具体的安全架构,我们重点关注:(1) 云安全渗透器,围绕云中的数据和基础设施提供一个边界,为不适当地获取敏感信息和信息泄漏提供防御线;(2) 云着陆点,为你们云应用部分和用于通信的地基应用部分提供安全的一体化点;(3) 零信任安全架构,以深度防御和最少特权准入原则为基础;利用这些办法,为服务和应用提供至关重要的保护,因为这些服务和应用从传统的在地基网络安全过渡到云安全架构,然后向潜在的零信任安全架构过渡。