{"id":97978,"date":"2019-04-04T23:42:03","date_gmt":"2019-04-05T06:42:03","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=97978"},"modified":"2019-04-04T23:42:03","modified_gmt":"2019-04-05T06:42:03","slug":"cloud-security-transformed-evident-redlock-tw","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/04\/cloud-security-transformed-evident-redlock-tw\/?lang=zh-hant","title":{"rendered":"\u96f2\u7aef\u5b89\u5168\u5df2\u5b8c\u6210\u8f49\u578b \u2013 Evident \u548c RedLock"},"content":{"rendered":"<p>\u6211\u5011\u5c07\u5169\u500b\u958b\u5275\u6027\u7522\u54c1 Evident \u548c RedLock \u7d50\u5408\u70ba\u4e00\u500b\u8d85\u7d1a\u7522\u54c1\uff0c\u70ba\u591a\u96f2\u7aef\u74b0\u5883 (\u5305\u62ec AWS\u3001Azure \u548c Google Cloud) \u63d0\u4f9b\u4e00\u6d41\u7684\u5408\u898f\u6027\u548c\u5b89\u5168\u6027\u3002Palo Alto Networks \u662f\u76ee\u524d\u552f\u4e00\u4e00\u5bb6\u900f\u904e\u55ae\u4e00\u7684\u7d71\u4e00\u5316\u7522\u54c1\u63d0\u4f9b\u5168\u9762\u53ef\u8996\u6027\u3001\u8a2d\u5b9a\u76e3\u63a7\u3001\u6301\u7e8c\u5408\u898f\u6027\u78ba\u4fdd\u548c\u5a01\u8105\u5075\u6e2c\u4ee5\u53ca\u81ea\u52d5\u88dc\u6551\u7684\u5ee0\u5546\u3002<\/p>\n<p><strong>\u96f2\u7aef\u5b89\u5168\u5206\u6790\u548c\u5408\u898f\u6027\u7684\u4e92\u88dc\u6027<\/strong><\/p>\n<p>\u9ad8\u5ea6\u5206\u6563\u7684\u96f2\u7aef\u74b0\u5883\u5e36\u4f86\u4e86\u65b0\u7684\u696d\u52d9\u548c\u5b89\u5168\u6311\u6230\uff1a<\/p>\n<ul>\n<li>\u7dad\u6301\u5c0d\u5206\u6563\u578b\u591a\u96f2\u7aef\u74b0\u5883\u7684\u53ef\u8996\u6027\u548c\u63a7\u5236\u3002<\/li>\n<li>\u5728\u61c9\u7528\u4e0d\u65b7\u8b8a\u5316\u548c\u79fb\u52d5\u6642\u7ba1\u7406\u5408\u898f\u6027 (\u6cd5\u898f\u548c\u5b89\u5168\u6027) \u7684\u8907\u96dc\u6027\u3002<\/li>\n<li>\u78ba\u4fdd\u5b89\u5168\u6536\u96c6\u3001\u5132\u5b58\u8207\u5171\u4eab\u654f\u611f\u6578\u64da\u3002<\/li>\n<li>\u8b93 SecOps \u5718\u968a\u5feb\u901f\u56de\u61c9\u5a01\u8105\u4e26\u5075\u6e2c\u7570\u5e38\u884c\u70ba\u3002<\/li>\n<\/ul>\n<p>\u6211\u5011\u610f\u8b58\u5230\uff0c\u8b93\u516c\u6709\u96f2\u80fd\u5920\u6210\u529f\u62b5\u79a6\u7db2\u8def\u653b\u64ca\u7684\u552f\u4e00\u65b9\u5f0f\u662f\u5c07<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/03\/cloud-compliance\/\">\u96f2\u7aef\u5408\u898f\u6027\u9818\u5c0e\u8005<\/a><\/u> Evident \u548c<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/10\/time-bring-together-cloud-compliance-security-analytics\/\">\u5b89\u5168\u5206\u6790\u8207\u5a01\u8105\u5075\u6e2c\u9818\u5c0e\u8005<\/a><\/u> Redlock \u7d71\u6574\u5728\u4e00\u8d77\u3002<\/p>\n<p><strong>\u900f\u904e\u6574\u5408\u6539\u5584\u5b89\u5168\u6027\u6210\u679c<\/strong><\/p>\n<p>RedLock \u7d50\u5408\u898f\u5247\u578b\u5b89\u5168\u6027\u6700\u4f73\u5be6\u52d9\u548c\u4e00\u6d41\u7684\u6a5f\u5668\u5b78\u7fd2\u4f86\u63a2\u7d22\u96f2\u7aef\u8cc7\u6e90\u548c\u654f\u611f\u6578\u64da\uff0c\u5f9e\u800c\u6d88\u9664 AWS\u3001Azure \u548c GCP \u7684\u5b89\u5168\u76f2\u9ede\u3002\u9084\u6703\u5075\u6e2c\u9ad8\u98a8\u96aa\u8a2d\u5b9a\u4e26\u627e\u51fa\u7db2\u8def\u5a01\u8105\u3001\u53ef\u7591\u7684\u4f7f\u7528\u8005\u884c\u70ba\u3001\u60e1\u610f\u8edf\u9ad4\u3001\u6578\u64da\u6d29\u6f0f\u8207\u4e3b\u6a5f\u5f31\u9ede\u3002\u5c07 Evident \u7684\u5408\u898f\u6027\u529f\u80fd\u8207 RedLock \u7d71\u6574\u5728\u4e00\u8d77\u53ef\u8b93\u5ba2\u6236\u8f15\u9b06\u9a57\u8b49\u6cd5\u898f\u8207\u7522\u696d\u5408\u898f\u6027\u72c0\u614b\u3002\u53ea\u8981\u55ae\u6b21\u9ede\u9078\uff0cRedLock \u4f7f\u7528\u8005\u5c31\u53ef\u4ee5\u91dd\u5c0d CIS\u3001NIST\u3001PCI\u3001HIPAA\u3001GDPR\u3001ISO\u3001SOC 2 \u7b49\u7b49\u7522\u751f\u6709\u5229\u65bc\u5be9\u6838\u4e14\u53ef\u81ea\u8a02\u7684\u5831\u544a\u3002<\/p>\n<p><strong>\u9019\u53ea\u662f\u7b2c\u4e00\u6b65<\/strong><\/p>\n<p>\u6211\u5011\u900f\u904e\u66f4\u5ee3\u6cdb\u7684 Palo Alto Networks Security Operating Platform \u63d0\u4f9b\u5275\u65b0\u3001\u696d\u754c\u9818\u5148\u7684\u5b89\u5168\u529f\u80fd\u548c\u6574\u5408\u80fd\u529b\uff0c\u6301\u7e8c\u52a0\u5f37\u6211\u5011\u7684\u96f2\u7aef\u5b89\u5168\u5e73\u53f0\uff0c\u5f9e\u800c\u5728\u6574\u500b\u7d44\u7e54 IT \u67b6\u69cb\u4e2d\u5be6\u73fe\u4e00\u81f4\u7684\u5b89\u5168\u4fdd\u8b77\u3002<\/p>\n<p>\u6210\u70ba Palo Alto Networks \u5ba2\u6236\u975e\u5e38\u4ee4\u4eba\u671f\u5f85\u3002\u4f46\u8acb\u4e0d\u8981\u53ea\u807d\u6211\u5011\u7684\u7247\u9762\u4e4b\u8a00\uff0c\u89aa\u8eab\u9ad4\u9a57\u624d\u662f\u4f7f Palo Alto Networks \u6210\u70ba\u516c\u6709\u96f2\u5b89\u5168\u9818\u57df\u9818\u5c0e\u8005\u7684\u539f\u56e0\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6211\u5011\u5c07\u5169\u500b\u958b\u5275\u6027\u7522\u54c1 Evident \u548c RedLock \u7d50\u5408\u70ba\u4e00\u500b\u8d85\u7d1a\u7522\u54c1\uff0c\u70ba\u591a\u96f2\u7aef\u74b0\u5883 (\u5305\u62ec AWS\u3001Azure \u548c Google Cloud) \u63d0\u4f9b\u4e00\u6d41\u7684\u5408\u898f\u6027\u548c\u5b89\u5168\u6027\u3002Palo Alto Networks \u662f\u76ee\u524d\u552f\u4e00\u4e00\u5bb6\u900f\u904e\u55ae\u4e00\u7684\u7d71\u4e00\u5316\u7522\u54c1\u63d0\u4f9b\u5168\u9762\u53ef\u8996\u6027\u3001\u8a2d\u5b9a\u76e3\u63a7\u3001\u6301\u7e8c\u5408\u898f\u6027\u78ba\u4fdd\u548c\u5a01\u8105\u5075\u6e2c\u4ee5\u53ca\u81ea\u52d5\u88dc\u6551\u7684\u5ee0\u5546\u3002 \u96f2\u7aef\u5b89\u5168\u5206\u6790\u548c\u5408\u898f\u6027\u7684\u4e92\u88dc\u6027 \u9ad8\u5ea6\u5206\u6563\u7684\u96f2\u7aef\u74b0\u5883\u5e36\u4f86\u4e86\u65b0\u7684\u696d\u52d9\u548c\u5b89\u5168\u6311\u6230\uff1a \u7dad\u6301\u5c0d\u5206\u6563\u578b\u591a\u96f2\u7aef\u74b0\u5883\u7684\u53ef\u8996\u6027\u548c\u63a7\u5236\u3002 \u5728\u61c9\u7528\u4e0d\u65b7\u8b8a\u5316\u548c\u79fb\u52d5\u6642\u7ba1\u7406\u5408\u898f\u6027 (\u6cd5\u898f\u548c\u5b89\u5168\u6027) \u7684\u8907\u96dc\u6027\u3002 \u78ba\u4fdd\u5b89\u5168\u6536\u96c6\u3001\u5132\u5b58\u8207\u5171\u4eab\u654f\u611f\u6578\u64da\u3002 \u8b93 SecOps \u5718\u968a\u5feb\u901f\u56de\u61c9\u5a01\u8105\u4e26\u5075\u6e2c\u7570\u5e38\u884c\u70ba\u3002 \u6211\u5011\u610f\u8b58\u5230\uff0c\u8b93\u516c\u6709\u96f2\u80fd\u5920\u6210\u529f\u62b5\u79a6\u7db2\u8def\u653b\u64ca\u7684\u552f\u4e00\u65b9\u5f0f\u662f\u5c07\u96f2\u7aef\u5408\u898f\u6027\u9818\u5c0e\u8005 Evident \u548c\u5b89\u5168\u5206\u6790\u8207\u5a01\u8105\u5075\u6e2c\u9818\u5c0e\u8005 Redlock \u7d71\u6574\u5728\u4e00\u8d77\u3002 \u900f\u904e\u6574\u5408\u6539\u5584\u5b89\u5168\u6027\u6210\u679c RedLock \u7d50\u5408\u898f\u5247\u578b\u5b89\u5168\u6027\u6700\u4f73\u5be6\u52d9\u548c\u4e00\u6d41\u7684\u6a5f\u5668\u5b78\u7fd2\u4f86\u63a2\u7d22\u96f2\u7aef\u8cc7\u6e90\u548c\u654f\u611f\u6578\u64da\uff0c\u5f9e\u800c\u6d88\u9664 &hellip;<\/p>\n","protected":false},"author":631,"featured_media":96980,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3543],"tags":[],"coauthors":[6733],"class_list":["post-97978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3543"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/corp-blog-cloud-600x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/631"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=97978"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97978\/revisions"}],"predecessor-version":[{"id":97992,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/97978\/revisions\/97992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/96980"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=97978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=97978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=97978"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=97978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}