![]() a dashboard displayed in a public space). corporate financials) or far less sensitive data (e.g. These systems tend to evaluate a device based on a single set of criteria, regardless of whether devices require access to highly sensitive data (e.g.These systems don’t easily allow for nuanced access based on shifting security posture.non-standard issue devices, older platforms required for testing, BYOD, etc.). Not all devices need the same level of security hardening (e.g.However, there are a number of challenges with this setup: It’s typically a lightweight process and many off-the-shelf products exist to implement flows that adhere to this principle. At predefined intervals, clients prove they can be trusted and a new certificate is issued. With such a system, any device with a valid certificate can be trusted. Google used this approach initially as it dramatically simplified device trust. In a traditional client certificate system, certificates are only given to trusted devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |