Sydeco Update 02

Homomorphic encryption against SST ©, Secure System of Transmission We therefore highly recommend protecting the industrial network within the company or institution by means of the uni-directional firewall ARCHANGEL OW© or ARCHANGEL© as the case may be and, within the same network, to protect each connection between installations by means Read more…

Greeting

“Cyber Crime Affects not only The Macroeconomy and global security, but all of us as well.” Patrick HOUYOUX President – Director Indeed, according to a former annual report of the White House economic advisers to the President of the United States, the Internet and the large-scale piracy that it carries Read more…

Code of Conduts

Code of Conduct In regard to maintain a Good Corporate Governance,Code of Conduct applies to the Board ofCommissioners, Directors, and all employees of PTSYDECO in all levels of the organization. Regulationsand Code of Conduct are binding and must be trulyunderstood and observed by all levels in order tosupport the implementation Read more…

error: Content is protected !!

*

Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned)” (1.9.3.1 Architecture Description, Department of Defense (DOD) of the United States of America, Zero Trust Reference Architecture, Version 1.0, February 2021 Prepared by the Joint Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team).

 

**
Micro segmentation - This is the practice of creating logical network zones to isolate segments. These segments are secured by enabling granular access control, whereby users, applications, workloads, and devices are segmented based on logical attributes. This also provides an advantage over traditional perimeter security, as the smaller segments present a reduced attack surface (for malicious personas). In a Zero Trust Architecture, security settings can be applied to different types of traffic, creating policies that limit network and application flows between workloads to those that are explicitly permitted. Segmentation Gateways and API access decision points can limit access on a per identity basis to explicitly allowed API invocations, with allowance granularity down to the "verb" level” (ibid, p. 16).
**
Micro segmentation - This is the practice of creating logical network zones to isolate segments. These segments are secured by enabling granular access control, whereby users, applications, workloads, and devices are segmented based on logical attributes. This also provides an advantage over traditional perimeter security, as the smaller segments present a reduced attack surface (for malicious personas). In a Zero Trust Architecture, security settings can be applied to different types of traffic, creating policies that limit network and application flows between workloads to those that are explicitly permitted. Segmentation Gateways and API access decision points can limit access on a per identity basis to explicitly allowed API invocations, with allowance granularity down to the "verb" level” (ibid, p. 16).