{"id":98129,"date":"2019-04-08T00:01:49","date_gmt":"2019-04-08T07:01:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=98129"},"modified":"2019-04-08T00:01:49","modified_gmt":"2019-04-08T07:01:49","slug":"cloud-security-transformed-evident-redlock-cn","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/04\/cloud-security-transformed-evident-redlock-cn\/?lang=zh-hans","title":{"rendered":"\u8f6c\u578b\u7684\u4e91\u5b89\u5168 - Evident \u548c RedLock"},"content":{"rendered":"<p>\u6211\u4eec\u5c06\u4e24\u4e2a\u5f00\u521b\u6027\u4ea7\u54c1 Evident \u548c RedLock \u5408\u5e76\u6210\u4e86\u4e00\u6b3e\u8d85\u7ea7\u4ea7\u54c1\uff0c\u7528\u4e8e\u4e3a AWS \u548c Azure \u7b49\u591a\u4e91\u73af\u5883\u63d0\u4f9b\u4e00\u6d41\u7684\u5408\u89c4\u6027\u548c\u5b89\u5168\u6027\u3002Palo Alto Networks \u73b0\u5728\u662f\u552f\u4e00\u4e00\u5bb6\u80fd\u591f\u901a\u8fc7\u5355\u4e2a\u7edf\u4e00\u4ea7\u54c1\u63d0\u4f9b\u5168\u9762\u7684\u53ef\u89c6\u6027\u3001\u914d\u7f6e\u76d1\u63a7\u3001\u786e\u4fdd\u6301\u7eed\u7684\u5408\u89c4\u6027\u4ee5\u53ca\u5177\u6709\u81ea\u52a8\u4fee\u590d\u529f\u80fd\u7684\u5a01\u80c1\u68c0\u6d4b\u7684\u4f9b\u5e94\u5546\u3002<\/p>\n<p><strong>\u4e91\u5b89\u5168\u5206\u6790\u53ca\u5408\u89c4\u6027\u7684\u4e92\u8865\u6027<\/strong><\/p>\n<p>\u9ad8\u5ea6\u788e\u7247\u5316\u7684\u4e91\u73af\u5883\u5e26\u6765\u4e86\u65b0\u7684\u4e1a\u52a1\u548c\u5b89\u5168\u6311\u6218\uff1a<\/p>\n<ul>\n<li>\u4fdd\u6301\u5bf9\u5206\u6563\u5f0f\u591a\u4e91\u73af\u5883\u7684\u53ef\u89c6\u6027\u548c\u63a7\u5236\u3002<\/li>\n<li>\u5f53\u5e94\u7528\u4e0d\u65ad\u53d8\u5316\u548c\u79fb\u52a8\u65f6\uff0c\u7ba1\u7406\u5408\u89c4\u6027\uff08\u76d1\u7ba1\u548c\u5b89\u5168\uff09\u7684\u590d\u6742\u6027\u3002<\/li>\n<li>\u786e\u4fdd\u5b89\u5168\u5730\u6536\u96c6\u3001\u5b58\u50a8\u548c\u5171\u4eab\u654f\u611f\u6570\u636e\u3002<\/li>\n<li>\u4f7f SecOps \u56e2\u961f\u80fd\u591f\u5feb\u901f\u54cd\u5e94\u5a01\u80c1\u5e76\u68c0\u6d4b\u5f02\u5e38\u884c\u4e3a\u3002<\/li>\n<\/ul>\n<p>\u6211\u4eec\u610f\u8bc6\u5230\uff0c\u8981\u5728\u516c\u6709\u4e91\u4e2d\u63a8\u8fdb\u963b\u6b62\u7f51\u7edc\u653b\u51fb\u5f97\u901e\u7684\u552f\u4e00\u65b9\u6cd5\u662f\u7ed3\u5408\u4f7f\u7528\u4ee5\u4e0b\u4e24\u79cd\u4ea7\u54c1\uff1a<u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/03\/cloud-compliance\/\">\u4e91\u5408\u89c4\u6027\u7684\u9886\u5bfc\u8005<\/a><\/u> Evident \u548c <u><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/10\/time-bring-together-cloud-compliance-security-analytics\/\">\u5b89\u5168\u5206\u6790\u53ca\u5a01\u80c1\u68c0\u6d4b\u7684\u9886\u5bfc\u8005<\/a><\/u> Redlock\u3002<\/p>\n<p><strong>\u901a\u8fc7\u96c6\u6210\u83b7\u5f97\u66f4\u4f18\u8d28\u7684\u5b89\u5168\u6210\u679c<\/strong><\/p>\n<p>RedLock \u901a\u8fc7\u7ed3\u5408\u4f7f\u7528\u57fa\u4e8e\u89c4\u5219\u7684\u5b89\u5168\u6700\u4f73\u5b9e\u8df5\u548c\u4e00\u6d41\u7684\u673a\u5668\u5b66\u4e60\u53d1\u73b0\u4e91\u8d44\u6e90\u548c\u654f\u611f\u6570\u636e\uff0c\u4ece\u800c\u6d88\u9664 AWS \u548c Azure \u7684\u5b89\u5168\u76f2\u70b9\u3002\u8be5\u4ea7\u54c1\u53ef\u4ee5\u68c0\u6d4b\u98ce\u9669\u914d\u7f6e\uff0c\u5e76\u8bc6\u522b\u7f51\u7edc\u5a01\u80c1\u3001\u53ef\u7591\u7528\u6237\u884c\u4e3a\u3001\u6076\u610f\u8f6f\u4ef6\u3001\u6570\u636e\u6cc4\u6f0f\u548c\u4e3b\u673a\u6f0f\u6d1e\u3002\u901a\u8fc7\u5c06 Evident \u7684\u5408\u89c4\u6027\u529f\u80fd\u4e0e RedLock \u8fdb\u884c\u7edf\u4e00\uff0c\u5ba2\u6237\u53ef\u4ee5\u8f7b\u677e\u9a8c\u8bc1\u6cd5\u89c4\u548c\u884c\u4e1a\u5408\u89c4\u6027\u72b6\u51b5\u3002\u53ea\u9700\u8f7b\u70b9\u4e00\u4e0b\u9f20\u6807\uff0cRedLock \u7528\u6237\u5373\u53ef\u9762\u5411 CIS\u3001NIST\u3001PCI\u3001HIPAA\u3001GDPR\u3001ISO\u3001SOC 2 \u53ca\u66f4\u591a\u6cd5\u89c4\u751f\u6210\u4fbf\u4e8e\u5ba1\u6838\u3001\u53ef\u4ee5\u5b9a\u5236\u7684\u62a5\u544a\u3002<\/p>\n<p><strong>\u5b89\u5168\u65c5\u7a0b\u624d\u521a\u521a\u5f00\u542f<\/strong><\/p>\n<p>\u6211\u4eec\u5c06\u5728\u66f4\u5e7f\u6cdb\u7684 Palo Alto Networks \u5b89\u5168\u64cd\u4f5c\u5e73\u53f0\u4e0a\uff0c\u901a\u8fc7\u521b\u65b0\u3001\u9886\u5148\u7684\u5b89\u5168\u529f\u80fd\u548c\u96c6\u6210\u6765\u6301\u7eed\u589e\u5f3a\u4e91\u5b89\u5168\u5e73\u53f0\uff0c\u4ece\u800c\u5728\u6574\u4e2a\u7ec4\u7ec7 IT \u67b6\u6784\u4e2d\u5b9e\u73b0\u4e00\u81f4\u7684\u5b89\u5168\u4fdd\u62a4\u3002<\/p>\n<p>\u6210\u4e3a Palo Alto Networks \u7684\u5ba2\u6237\u597d\u5904\u591a\u591a\u3002\u4e8b\u5b9e\u80dc\u4e8e\u96c4\u8fa9\uff0c\u901a\u8fc7\u4eb2\u8eab\u4f53\u9a8c\u4e86\u89e3 Palo Alto Networks \u4e3a\u4ec0\u4e48\u4f1a\u6210\u4e3a\u516c\u6709\u4e91\u5b89\u5168\u7684\u9886\u5bfc\u8005\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6211\u4eec\u5c06\u4e24\u4e2a\u5f00\u521b\u6027\u4ea7\u54c1 Evident \u548c RedLock \u5408\u5e76\u6210\u4e86\u4e00\u6b3e\u8d85\u7ea7\u4ea7\u54c1\uff0c\u7528\u4e8e\u4e3a AWS \u548c Azure \u7b49\u591a\u4e91\u73af\u5883\u63d0\u4f9b\u4e00\u6d41\u7684\u5408\u89c4\u6027\u548c\u5b89\u5168\u6027\u3002Palo Alto Networks \u73b0\u5728\u662f\u552f\u4e00\u4e00\u5bb6\u80fd\u591f\u901a\u8fc7\u5355\u4e2a\u7edf\u4e00\u4ea7\u54c1\u63d0\u4f9b\u5168\u9762\u7684\u53ef\u89c6\u6027\u3001\u914d\u7f6e\u76d1\u63a7\u3001\u786e\u4fdd\u6301\u7eed\u7684\u5408\u89c4\u6027\u4ee5\u53ca\u5177\u6709\u81ea\u52a8\u4fee\u590d\u529f\u80fd\u7684\u5a01\u80c1\u68c0\u6d4b\u7684\u4f9b\u5e94\u5546\u3002 \u4e91\u5b89\u5168\u5206\u6790\u53ca\u5408\u89c4\u6027\u7684\u4e92\u8865\u6027 \u9ad8\u5ea6\u788e\u7247\u5316\u7684\u4e91\u73af\u5883\u5e26\u6765\u4e86\u65b0\u7684\u4e1a\u52a1\u548c\u5b89\u5168\u6311\u6218\uff1a \u4fdd\u6301\u5bf9\u5206\u6563\u5f0f\u591a\u4e91\u73af\u5883\u7684\u53ef\u89c6\u6027\u548c\u63a7\u5236\u3002 \u5f53\u5e94\u7528\u4e0d\u65ad\u53d8\u5316\u548c\u79fb\u52a8\u65f6\uff0c\u7ba1\u7406\u5408\u89c4\u6027\uff08\u76d1\u7ba1\u548c\u5b89\u5168\uff09\u7684\u590d\u6742\u6027\u3002 \u786e\u4fdd\u5b89\u5168\u5730\u6536\u96c6\u3001\u5b58\u50a8\u548c\u5171\u4eab\u654f\u611f\u6570\u636e\u3002 \u4f7f SecOps \u56e2\u961f\u80fd\u591f\u5feb\u901f\u54cd\u5e94\u5a01\u80c1\u5e76\u68c0\u6d4b\u5f02\u5e38\u884c\u4e3a\u3002 \u6211\u4eec\u610f\u8bc6\u5230\uff0c\u8981\u5728\u516c\u6709\u4e91\u4e2d\u63a8\u8fdb\u963b\u6b62\u7f51\u7edc\u653b\u51fb\u5f97\u901e\u7684\u552f\u4e00\u65b9\u6cd5\u662f\u7ed3\u5408\u4f7f\u7528\u4ee5\u4e0b\u4e24\u79cd\u4ea7\u54c1\uff1a\u4e91\u5408\u89c4\u6027\u7684\u9886\u5bfc\u8005 Evident \u548c \u5b89\u5168\u5206\u6790\u53ca\u5a01\u80c1\u68c0\u6d4b\u7684\u9886\u5bfc\u8005 Redlock\u3002 \u901a\u8fc7\u96c6\u6210\u83b7\u5f97\u66f4\u4f18\u8d28\u7684\u5b89\u5168\u6210\u679c RedLock \u901a\u8fc7\u7ed3\u5408\u4f7f\u7528\u57fa\u4e8e\u89c4\u5219\u7684\u5b89\u5168\u6700\u4f73\u5b9e\u8df5\u548c\u4e00\u6d41\u7684\u673a\u5668\u5b66\u4e60\u53d1\u73b0\u4e91\u8d44\u6e90\u548c\u654f\u611f\u6570\u636e\uff0c\u4ece\u800c\u6d88\u9664 AWS \u548c Azure \u7684\u5b89\u5168\u76f2\u70b9\u3002\u8be5\u4ea7\u54c1\u53ef\u4ee5\u68c0\u6d4b\u98ce\u9669\u914d\u7f6e\uff0c\u5e76\u8bc6\u522b\u7f51\u7edc\u5a01\u80c1\u3001\u53ef\u7591\u7528\u6237\u884c\u4e3a\u3001\u6076\u610f\u8f6f\u4ef6\u3001\u6570\u636e\u6cc4\u6f0f\u548c\u4e3b\u673a\u6f0f\u6d1e\u3002\u901a\u8fc7\u5c06 &hellip;<\/p>\n","protected":false},"author":631,"featured_media":96979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3540],"tags":[],"coauthors":[6733],"class_list":["post-98129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3540"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/02\/corp-blog-cloud-600x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/631"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=98129"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98129\/revisions"}],"predecessor-version":[{"id":98130,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98129\/revisions\/98130"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/96979"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=98129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=98129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=98129"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=98129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}