Главная
Study mode:
on
1
Intro
2
Joke
3
The problem
4
How does it work
5
Trust Model
6
Trust Level
7
Breaking Glass
8
Variable Authentication
9
Requirements
10
Highly granular
11
Lots of dimensions
12
Trust
13
Why
14
Separate source and target
15
Define application access level
16
Define trust levels
17
Use big buckets
18
What have we gotten
19
My phone
20
Security definitions
21
Authentication
22
Session Lifetime
23
Application List
24
Unmanaged Device
25
Future Work
26
Percentage
27
Conclusions
28
Validation
29
Security
30
Emergency Access
31
Emergency Session
32
Security Operation Center
33
Deadlocks
34
Disaster Recovery
35
More papers
Description:
Explore a comprehensive conference talk on implementing granular trust in cybersecurity systems. Delve into the intricacies of trust models, trust levels, and variable authentication. Learn about breaking glass scenarios, highly granular access control, and the importance of separating source and target. Discover how to define application access levels, trust levels, and use big buckets for effective implementation. Examine real-world examples, including mobile device security and unmanaged device scenarios. Gain insights into future work, including percentage-based trust, emergency access protocols, and disaster recovery strategies. Understand the challenges and solutions in validating security measures, handling deadlocks, and managing security operations centers.

Granular Trust - Making It Work

WEareTROOPERS
Add to list