Cloud 101CircleEventsBlog

Download Publication

Toward a Zero Trust Architecture - Japanese Translation
Toward a Zero Trust Architecture - Japanese Translation

Toward a Zero Trust Architecture - Japanese Translation

Release Date: 02/10/2022

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

企業の利害関係者は、リアルタイムシステムの複雑化、新たなサイバーセキュリティポリ
シーの必要性、そしてセキュアにシステムを運用するために欠かせない力強い文化的サポート
といった課題を考慮する必要があります。ゼロトラストのような新たなテクノロジーソリューショ
ンやアプローチは、バイデン大統領の大統領令14028 Improving the Nation’s Cybersecurity
で定められた義務を果たすために不可欠です。本稿では、新たに登場した豊富で多様なソリューション
の意味と、ゼロトラストアーキテクチャ(ZTA)を最終的に実現するための組織の能力に対する課題につ
いて検討しています。また、企業のリーダーとセキュリティ担当者がそれぞれの環境にゼロトラストを
導入することを促進するために、業界が主要なステークホルダーグループ間のコラボレーションを強化
する方法についても提言しています。

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural support that is required to securely operate systems in a complex and hybrid world. Emerging technology solutions and approaches such as Zero Trust are critical to meeting the mandates in President Biden’s Executive Order on Improving the Nation’s Cybersecurity. The implications of an emerging, rich and diverse solutions landscape and the challenges to an organization’s ability to ultimately deliver a Zero Trust Architecture (ZTA) are explored in this paper. Recommendations on how industry can improve collaboration among key stakeholder groups is discussed to accelerate both enterprise leaders and security practitioners’ adoption of Zero Trust into their environments.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
Zero Trust Guidance for Critical Infrastructure
Zero Trust Guidance for Critical Infrastructure
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
Published: 12/03/2024
A Wednesday in the Life of a Threat Hunter
A Wednesday in the Life of a Threat Hunter
Published: 11/27/2024
Bringing the Security vs. Usability Pendulum to a Stop
Bringing the Security vs. Usability Pendulum to a Stop
Published: 11/26/2024
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
CSA Community Spotlight: Addressing Emerging Security Challenges wi...
Published: 11/18/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training