Corro'll (Kuh'rel) Driskell

63%
Flag icon
The architecture is based on four cornerstones: Trust Calculation. This unique element of the architecture handles user identity and access management, dynamically determining whether a user should be granted access to specific resources and, if so, what type of access should be granted. The calculation is based on factors such as the user’s client device and location, the type of resources requested, and the security controls that are available. Security Zones. The infrastructure is divided into multiple security zones that provide different levels of protection. These range from trusted ...more
This highlight has been truncated due to consecutive passage length restrictions.
Managing Risk and Information Security: Protect to Enable
Rate this book
Clear rating