백서
제로 트러스트 세계에서 지속적 CIS 평가
With the move to remote working, rapid adoption of the cloud, increased use of mobile devices and IoT devices, and more, the attack surface of every organization has expanded. With this increased complexity and proliferation of new devices and attack vectors, people have become a bigger vulnerability than ever before. In this paper, we will discuss how the CIS Controls relate to the Zero Trust tenets, and how Tenable’s solutions help make important decisions regarding who, and what can access mission-critical networks and assets.
- Compliance
- Tenable One
- Tenable Identity Exposure
- Tenable Vulnerability Management
- Tenable Security Center