How would zero trust prevent a Log4Shell attack?

To avoid the consequences of vulnerabilities such as Log4Shell, we must control how resources can be accessed, how they can access other resources, and how these access rules can be enforced on the network using the least privilege principle and other principles of zero trust. Daily Newsletter – E-mail sent every business day with a recap of the last 24 hours Weekly Newsletter – E-mail sent every Monday with a recap of the last 7 days (IN)SECURE Magazine – E-mail sent when a new issue is released I have read and agree to the terms & conditions Subscribe Leave this field empty if you’re human:

Read full article on Help Net Security

 


Date:

Categorie(s):

Tag(s):