Corro'll (Kuh'rel) Driskell

62%
Flag icon
This makes it difficult to effectively restrict access using traditional security controls such as firewalls, which rely on fixed locations of systems and a more static nature of the data. We need much more granular and dynamic controls that are linked to the resources themselves rather than just their network location.
Managing Risk and Information Security: Protect to Enable
Rate this book
Clear rating