Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Toward a Zero Trust Architecture - Japanese Translation
Toward a Zero Trust Architecture - Japanese Translation

Toward a Zero Trust Architecture - Japanese Translation

Release Date: 02/10/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

企業の利害関係者は、リアルタイムシステムの複雑化、新たなサイバーセキュリティポリ
シーの必要性、そしてセキュアにシステムを運用するために欠かせない力強い文化的サポート
といった課題を考慮する必要があります。ゼロトラストのような新たなテクノロジーソリューショ
ンやアプローチは、バイデン大統領の大統領令14028 Improving the Nation’s Cybersecurity
で定められた義務を果たすために不可欠です。本稿では、新たに登場した豊富で多様なソリューション
の意味と、ゼロトラストアーキテクチャ(ZTA)を最終的に実現するための組織の能力に対する課題につ
いて検討しています。また、企業のリーダーとセキュリティ担当者がそれぞれの環境にゼロトラストを
導入することを促進するために、業界が主要なステークホルダーグループ間のコラボレーションを強化
する方法についても提言しています。

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural support that is required to securely operate systems in a complex and hybrid world. Emerging technology solutions and approaches such as Zero Trust are critical to meeting the mandates in President Biden’s Executive Order on Improving the Nation’s Cybersecurity. The implications of an emerging, rich and diverse solutions landscape and the challenges to an organization’s ability to ultimately deliver a Zero Trust Architecture (ZTA) are explored in this paper. Recommendations on how industry can improve collaboration among key stakeholder groups is discussed to accelerate both enterprise leaders and security practitioners’ adoption of Zero Trust into their environments.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust
Zero Trust Guiding Principles
Zero Trust Guiding Principles
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Published: 04/18/2024
Protocols are Passé. APIs are Key for Effective Zero Trust Implementation.
Protocols are Passé. APIs are Key for Effective Zero Trust Implemen...
Published: 04/12/2024
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Published: 04/08/2024
10 Essential Identity and Access Management (IAM) Terms
10 Essential Identity and Access Management (IAM) Terms
Published: 03/30/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training