CN116032798A - Automatic testing method and device for zero-trust identity authorization - Google Patents

Automatic testing method and device for zero-trust identity authorization Download PDF

Info

Publication number
CN116032798A
CN116032798A CN202211692074.7A CN202211692074A CN116032798A CN 116032798 A CN116032798 A CN 116032798A CN 202211692074 A CN202211692074 A CN 202211692074A CN 116032798 A CN116032798 A CN 116032798A
Authority
CN
China
Prior art keywords
zero
trust
client
zero trust
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211692074.7A
Other languages
Chinese (zh)
Inventor
许金旺
方宏昊
韩志松
洪钧煌
王鑫渊
杨有为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Cloud Technology Co Ltd
Original Assignee
Tianyi Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Cloud Technology Co Ltd filed Critical Tianyi Cloud Technology Co Ltd
Priority to CN202211692074.7A priority Critical patent/CN116032798A/en
Publication of CN116032798A publication Critical patent/CN116032798A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to an automatic test method and device for zero trust identity authorization, and belongs to the technical field of computers. The method comprises the following steps: through an automation program, role configuration and accessible resource management of a zero trust user are realized by a standardized format file, and a zero trust control center is called through an interface form, so that dynamic effective loading of zero trust access is realized; the testing client accesses the authorized resource of the zero trust network, and realizes the back source request test through the concurrent script; and judging the zero trust network establishment and authorization conditions according to the statistic information of the request sent by the client and the connection establishment conditions, and generating a test report. The method realizes the detection of the connectivity of the zero trust network through an automatic program, can greatly improve the test efficiency, and can solve the problem of link connection of the zero trust client, the edge, the center and the intranet penetrator.

Description

Automatic testing method and device for zero-trust identity authorization
Technical Field
The invention belongs to the technical field of computers, and particularly relates to an automatic test method and device for zero-trust identity authorization.
Background
Zero trust is a technology for providing safe access to complex environments such as cross-regional, multi-node, hybrid cloud and the like of enterprise network application, and aims to reasonably access and control the dynamically-changed environments of enterprises so as to achieve the aims of reducing the operation cost of the enterprises, improving the business safety of the enterprises, improving the business convenience and the like. The zero-trust identity authorization is a method for granting single access rights by carrying out identity verification and resource rights identification on each user logging in the zero-trust network.
At present, the user identity access resource permission test aiming at zero trust needs to log in an application platform each time to carry out identity configuration, and the packet capturing verification of the actual access network connectivity needs to be carried out at the back end of each network source station aiming at the accessible back end test, so that the overall steps are complex, and the system test verification is not facilitated. Under the background of solving unified management of different cloud networks and private networks of enterprises, the zero-trust product needs to perform back source configuration management on different networks, and in a conventional zero-trust test scene, a great deal of time is often spent on detecting and testing authority of each network device.
Disclosure of Invention
The invention aims to overcome the defects and shortcomings of the prior art, and provides an automatic testing method and device for zero trust identity authorization, which can detect zero trust network connectivity through an automatic program, greatly improve testing efficiency and solve the problem of link connection of a zero trust client, an edge, a center and an intranet penetrator.
According to one aspect of the present invention there is provided an automated test method for zero trust identity authorization, the method comprising the steps of:
s1: through an automation program, role configuration and accessible resource management of a zero trust user are realized by a standardized format file, and a zero trust control center is called through an interface form, so that dynamic effective loading of zero trust access is realized;
s2: the testing client accesses the authorized resource of the zero trust network, and realizes the back source request test through the concurrent script;
s3: and judging the zero trust network establishment and authorization conditions according to the statistic information of the request sent by the client and the connection establishment conditions, and generating a test report.
Preferably, the role configuration and accessible resource management of the zero trust user by the automation program in the standardized format file comprises:
and configuring a zero trust control center, deploying an automatic test server program in the zero trust control center, automatically generating an authorized user, generating a user role according to configuration, generating network access rights according to the associated user role, and calling a zero trust control center interface to realize automatic loading of control center user authorization information by a zero trust edge machine.
Preferably, the role configuration and accessible resource management of the zero trust user by the automation program in the standardized format file comprises:
the method comprises the steps that a client is configured, the client is connected with a server program, login user account configuration information is obtained, the zero-trust client program is pulled up through a command, and a login user account is dynamically configured according to a server test case, so that the client environment has zero-trust network access authority; and the client calls the test script to realize the availability detection of the network resource authority.
Preferably, the role configuration and accessible resource management of the zero trust user by the automation program in the standardized format file comprises:
the method comprises the steps of configuring a zero trust edge server, wherein the zero trust edge server is provided with a log acquisition program, realizing log aggregation acquisition according to a designated field, and collecting conditions of users, access resources and grant rights; and setting an analysis field through an instruction format, counting user access logs in real time, collecting and reporting to a server after aggregation.
Preferably, the method for implementing the back source request test through the concurrent script includes:
the user organization authorization and the single user authorization are tested, and the testing is based on resources of different back source protocols, including IP, domain name, port and network segment.
According to another aspect of the present invention, there is also provided an automated test equipment for zero trust identity authorization, the equipment comprising:
the configuration module is used for realizing role configuration and accessible resource management of the zero trust user through an automation program in a standardized format file, and realizing dynamic effective loading of zero trust access by calling the zero trust control center in an interface form;
the testing module is used for testing the access of the client to the authorized resources of the zero trust network and realizing the test of the source return request through the concurrent script;
and the reporting module is used for judging the zero trust network establishment and authorization conditions according to the statistical information of the request sent by the client and the connection establishment conditions and generating a test report.
Preferably, the configuration module realizes role configuration and accessible resource management of the zero-trust user through an automation program in a standardized format file, and the method comprises the following steps:
and configuring a zero trust control center, deploying an automatic test server program in the zero trust control center, automatically generating an authorized user, generating a user role according to configuration, generating network access rights according to the associated user role, and calling a zero trust control center interface to realize automatic loading of control center user authorization information by a zero trust edge machine.
Preferably, the configuration module realizes role configuration and accessible resource management of the zero-trust user through an automation program in a standardized format file, and the method comprises the following steps:
the method comprises the steps that a client is configured, the client is connected with a server program, login user account configuration information is obtained, the zero-trust client program is pulled up through a command, and a login user account is dynamically configured according to a server test case, so that the client environment has zero-trust network access authority; and the client calls the test script to realize the availability detection of the network resource authority.
Preferably, the configuration module realizes role configuration and accessible resource management of the zero-trust user through an automation program in a standardized format file, and the method comprises the following steps:
the method comprises the steps of configuring a zero trust edge server, wherein the zero trust edge server is provided with a log acquisition program, realizing log aggregation acquisition according to a designated field, and collecting conditions of users, access resources and grant rights; and setting an analysis field through an instruction format, counting user access logs in real time, collecting and reporting to a server after aggregation.
Preferably, the testing module tests the client for the access of the authorized resource of the zero trust network, and the realization of the back source request test through the concurrent script comprises the following steps:
the user organization authorization and the single user authorization are tested, and the testing is based on resources of different back source protocols, including IP, domain name, port and network segment.
The beneficial effects are that: the invention realizes the detection of zero trust network connectivity through an automatic program, and realizes the rapid creation of users and the configuration of the authority of the users to different network sources through the configuration of automatic scripts aiming at the scene that the different network partitions are difficult to be tested manually item by item. And collecting the converged client and the zero trust edge log through the automatic test server, realizing data normalization management, counting the passing number of request tests, automatically generating a current zero trust network authorization access report, and meeting the scenes of quick test and regression verification of the zero trust products. Compared with the traditional zero trust authorization test, the invention can greatly improve the test efficiency, reduce the problem of manually verifying the zero trust network, and solve the problem of link connection of the zero trust client, the edge, the center and the intranet penetrator.
Features and advantages of the present invention will become apparent by reference to the following drawings and detailed description of embodiments of the invention.
Drawings
FIG. 1 is a flow chart of an automated test method for zero trust identity authorization;
FIG. 2 is a topology diagram of automated testing for zero trust identity authorization;
FIG. 3 is a schematic diagram of an automated test equipment for zero trust identity authorization.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
FIG. 1 is a flow chart of an automated test method for zero trust identity authorization. As shown in fig. 1, the present invention provides an automated test method for zero trust identity authorization, the method comprising the steps of:
s1: through an automation program, role configuration and accessible resource management of a zero trust user are realized by a standardized format file, and a zero trust control center is called through an interface form, so that dynamic effective loading of zero trust access is realized;
s2: the testing client accesses the authorized resource of the zero trust network, and realizes the back source request test through the concurrent script;
s3: and judging the zero trust network establishment and authorization conditions according to the statistic information of the request sent by the client and the connection establishment conditions, and generating a test report.
Specifically, referring to fig. 2, in this embodiment, interaction and data transmission between a server and a client are implemented using go language, and a source station uses web services belonging to different networks. Different test cases of the server side are used for achieving the purpose of rapidly verifying authorized access of different isolated network segments aiming at different user roles, and high-efficiency network connectivity verification and network authorized access are met.
According to the embodiment, the detection of the zero trust network connectivity is realized through an automatic program, the testing efficiency can be greatly improved, and the problem of link connection of the zero trust client, the edge, the center and the intranet penetrator can be solved.
Preferably, the role configuration and accessible resource management of the zero trust user by the automation program in the standardized format file comprises:
and configuring a zero trust control center, deploying an automatic test server program in the zero trust control center, automatically generating an authorized user, generating a user role according to configuration, generating network access rights according to the associated user role, and calling a zero trust control center interface to realize automatic loading of control center user authorization information by a zero trust edge machine.
Specifically, an automatic test server program is deployed in the center through an automatic program, a use case is configured according to information such as users, organization architecture, roles and the like, resources are configured according to domain names and protocols, automatic generation of authorized users, user roles and associated user roles are generated according to configuration, network access rights are generated, and a zero trust control center interface is called to realize automatic loading of control center user authorization information by a zero trust edge machine, so that the aim of rapidly validating rights is fulfilled; the user authorization test mode is not limited to role authorization, and can realize user organization authorization and single user authorization test in an extension mode, wherein the user resource access authorization comprises web site authorization, I P resource authorization, port access authorization and the like.
Preferably, the role configuration and accessible resource management of the zero trust user by the automation program in the standardized format file comprises:
the method comprises the steps that a client is configured, the client is connected with a server program, login user account configuration information is obtained, the zero-trust client program is pulled up through a command, and a login user account is dynamically configured according to a server test case, so that the client environment has zero-trust network access authority; and the client calls the test script to realize the availability detection of the network resource authority.
Specifically, the client is connected with the server program to acquire configuration information of the login user account, the zero-trust client program is pulled up through a command, the webkit automation framework is called, the login user account is dynamically configured according to the server test case, and the client environment has zero-trust network access authority. And calling the test script by the client according to the prefabricated access resource script, and detecting the network resource authority availability.
Preferably, the role configuration and accessible resource management of the zero trust user by the automation program in the standardized format file comprises:
the method comprises the steps of configuring a zero trust edge server, wherein the zero trust edge server is provided with a log acquisition program, realizing log aggregation acquisition according to a designated field, and collecting conditions of users, access resources and grant rights; and setting an analysis field through an instruction format, counting user access logs in real time, collecting and reporting to a server after aggregation.
Specifically, the zero trust edge server installs a log collection program, and according to the appointed field, the log collection is realized, and the conditions of users, access resources and grant permission are collected. And setting an analysis field comprising a user name, a role name, an access resource and an authorization condition through an instruction format, counting user access logs in real time, collecting and reporting to a server after aggregation.
The server acquires the request statistics and connection establishment conditions of the client, comprehensively acquires user access information by the edge, judges the zero trust network establishment and authorization conditions, and generates a test report.
Preferably, the method for implementing the back source request test through the concurrent script includes:
the user organization authorizations and the single user authorizations are tested based on resources of different back source protocols including I P, domain name, port, network segment.
Specifically, the user authorization test mode is not limited to role authorization, and user organization authorization and single user authorization test can be realized through an extension mode. Through automated test scripts, the system can be used for testing not only the zero-trust access strategy based on identity, but also the authorization strategy based on ABAC (architecture based architecture), and resources based on different back source protocols, including, but not limited to I P, domain names, ports and network segments.
According to the embodiment, the detection of zero trust network connectivity is realized through an automatic program, aiming at the scene that different network partitions are difficult to manually test item by item, the quick creation of users is realized through configuration of automatic scripts, and the authority configuration of the users to different network sources is configured. And collecting the converged client and the zero trust edge log through the automatic test server, realizing data normalization management, counting the passing number of request tests, automatically generating a current zero trust network authorization access report, and meeting the scenes of quick test and regression verification of the zero trust products. The embodiment not only can verify and test the authorized execution condition of the zero trust product user, but also can verify the usability condition of each network of the zero trust under the condition that the authorization passes, and judge the health and the fault switching capability of other components of the zero trust; compared with the traditional zero trust authorization test, the test efficiency can be greatly improved, the problem of manually verifying the zero trust network is reduced, and the problem of link connection of the zero trust client, the edge, the center and the intranet penetrator is solved.
Example 2
FIG. 3 is a schematic diagram of an automated test equipment for zero trust identity authorization. As shown in fig. 3, the present embodiment provides an automated testing apparatus for zero trust identity authorization, the apparatus comprising:
the configuration module 301 is configured to implement role configuration and accessible resource management for the zero trust user through an automation program in a standardized format file, and invoke a zero trust control center through an interface form to implement dynamic effective loading of zero trust access;
the testing module 302 is configured to test access of the client to an authorized resource of the zero trust network, and implement a back source request test through a concurrent script;
and the reporting module 303 is configured to determine the zero trust network establishment and authorization condition according to the statistics information and the connection establishment condition of the client sending request, and generate a test report.
Preferably, the configuration module 301 implements role configuration and accessible resource management for the zero trust user through an automation program in a standardized format file, including:
and configuring a zero trust control center, deploying an automatic test server program in the zero trust control center, automatically generating an authorized user, generating a user role according to configuration, generating network access rights according to the associated user role, and calling a zero trust control center interface to realize automatic loading of control center user authorization information by a zero trust edge machine.
Preferably, the configuration module 301 implements role configuration and accessible resource management for the zero trust user through an automation program in a standardized format file, including:
the method comprises the steps that a client is configured, the client is connected with a server program, login user account configuration information is obtained, the zero-trust client program is pulled up through a command, and a login user account is dynamically configured according to a server test case, so that the client environment has zero-trust network access authority; and the client calls the test script to realize the availability detection of the network resource authority.
Preferably, the configuration module 301 implements role configuration and accessible resource management for the zero trust user through an automation program in a standardized format file, including:
the method comprises the steps of configuring a zero trust edge server, wherein the zero trust edge server is provided with a log acquisition program, realizing log aggregation acquisition according to a designated field, and collecting conditions of users, access resources and grant rights; and setting an analysis field through an instruction format, counting user access logs in real time, collecting and reporting to a server after aggregation.
Preferably, the testing module 302 tests the client for authorized resource access to the zero trust network, and implementing the back source request test through the concurrent script includes:
the user organization authorizations and the single user authorizations are tested based on resources of different back source protocols including I P, domain name, port, network segment.
The specific implementation process of the functions implemented by each module in this embodiment 2 is the same as that in embodiment 1, and will not be described here again.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structural changes made by the specification and drawings of the present invention or direct/indirect application in other related technical fields are included in the scope of the present invention.

Claims (10)

1. An automated test method for zero trust identity authorization, the method comprising the steps of:
s1: through an automation program, role configuration and accessible resource management of a zero trust user are realized by a standardized format file, and a zero trust control center is called through an interface form, so that dynamic effective loading of zero trust access is realized;
s2: the testing client accesses the authorized resource of the zero trust network, and realizes the back source request test through the concurrent script;
s3: and judging the zero trust network establishment and authorization conditions according to the statistic information of the request sent by the client and the connection establishment conditions, and generating a test report.
2. The method of claim 1, wherein said implementing role configuration and accessible resource management for zero-trust users in standardized format files by an automation program comprises:
and configuring a zero trust control center, deploying an automatic test server program in the zero trust control center, automatically generating an authorized user, generating a user role according to configuration, generating network access rights according to the associated user role, and calling a zero trust control center interface to realize automatic loading of control center user authorization information by a zero trust edge machine.
3. The method of claim 2, wherein said implementing role configuration and accessible resource management for zero-trust users in standardized format files by an automation program comprises:
the method comprises the steps that a client is configured, the client is connected with a server program, login user account configuration information is obtained, the zero-trust client program is pulled up through a command, and a login user account is dynamically configured according to a server test case, so that the client environment has zero-trust network access authority; and the client calls the test script to realize the availability detection of the network resource authority.
4. The method of claim 3, wherein said implementing role configuration and accessible resource management for zero-trust users in standardized format files by an automation program comprises:
the method comprises the steps of configuring a zero trust edge server, wherein the zero trust edge server is provided with a log acquisition program, realizing log aggregation acquisition according to a designated field, and collecting conditions of users, access resources and grant rights; and setting an analysis field through an instruction format, counting user access logs in real time, collecting and reporting to a server after aggregation.
5. The method of claim 4, wherein the testing client's authorized resource access to the zero trust network, implementing the back-source request test via the concurrent script comprises:
the user organization authorization and the single user authorization are tested, and the testing is based on resources of different back source protocols, including IP, domain name, port and network segment.
6. An automated test equipment for zero trust identity authorization, the equipment comprising:
the configuration module is used for realizing role configuration and accessible resource management of the zero trust user through an automation program in a standardized format file, and realizing dynamic effective loading of zero trust access by calling the zero trust control center in an interface form;
the testing module is used for testing the access of the client to the authorized resources of the zero trust network and realizing the test of the source return request through the concurrent script;
and the reporting module is used for judging the zero trust network establishment and authorization conditions according to the statistical information of the request sent by the client and the connection establishment conditions and generating a test report.
7. The apparatus of claim 6, wherein the configuration module to implement role configuration and accessible resource management for zero-trust users in standardized format files via an automation program comprises:
and configuring a zero trust control center, deploying an automatic test server program in the zero trust control center, automatically generating an authorized user, generating a user role according to configuration, generating network access rights according to the associated user role, and calling a zero trust control center interface to realize automatic loading of control center user authorization information by a zero trust edge machine.
8. The apparatus of claim 7, wherein the configuration module to implement role configuration and accessible resource management for zero-trust users in standardized format files via an automation program comprises:
the method comprises the steps that a client is configured, the client is connected with a server program, login user account configuration information is obtained, the zero-trust client program is pulled up through a command, and a login user account is dynamically configured according to a server test case, so that the client environment has zero-trust network access authority; and the client calls the test script to realize the availability detection of the network resource authority.
9. The apparatus of claim 8, wherein the configuration module to implement role configuration and accessible resource management for zero-trust users in standardized format files via an automation program comprises:
the method comprises the steps of configuring a zero trust edge server, wherein the zero trust edge server is provided with a log acquisition program, realizing log aggregation acquisition according to a designated field, and collecting conditions of users, access resources and grant rights; and setting an analysis field through an instruction format, counting user access logs in real time, collecting and reporting to a server after aggregation.
10. The apparatus of claim 9, wherein the test module to test the client for authorized resource access to the zero trust network, the implementing the back source request test via the concurrent script comprises:
the user organization authorization and the single user authorization are tested, and the testing is based on resources of different back source protocols, including IP, domain name, port and network segment.
CN202211692074.7A 2022-12-28 2022-12-28 Automatic testing method and device for zero-trust identity authorization Pending CN116032798A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211692074.7A CN116032798A (en) 2022-12-28 2022-12-28 Automatic testing method and device for zero-trust identity authorization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211692074.7A CN116032798A (en) 2022-12-28 2022-12-28 Automatic testing method and device for zero-trust identity authorization

Publications (1)

Publication Number Publication Date
CN116032798A true CN116032798A (en) 2023-04-28

Family

ID=86080674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211692074.7A Pending CN116032798A (en) 2022-12-28 2022-12-28 Automatic testing method and device for zero-trust identity authorization

Country Status (1)

Country Link
CN (1) CN116032798A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468825A (en) * 2014-12-26 2015-03-25 湖南华凯文化创意股份有限公司 Remote authorization method and system
CN107450515A (en) * 2017-07-31 2017-12-08 北京新能源汽车股份有限公司 Automatic testing method and device for fault diagnosis
CN110442524A (en) * 2019-08-09 2019-11-12 中国建设银行股份有限公司 It is a kind of for have Certificate Authority web service interface test method and device
WO2020147369A1 (en) * 2019-01-18 2020-07-23 华为技术有限公司 Natural language processing method, training method, and data processing device
US20200336508A1 (en) * 2020-07-04 2020-10-22 Kumar Srivastava Method and system to stitch cybersecurity, measure network cyber health, generate business and network risks, enable realtime zero trust verifications, and recommend ordered, predictive risk mitigations
CN112134866A (en) * 2020-09-15 2020-12-25 腾讯科技(深圳)有限公司 Service access control method, device, system and computer readable storage medium
CN113225333A (en) * 2021-05-06 2021-08-06 西安电子科技大学 Network resource access control method under zero trust
CN113992402A (en) * 2021-10-27 2022-01-28 北京房江湖科技有限公司 Access control method, system and medium based on zero trust strategy
CN113992328A (en) * 2021-10-27 2022-01-28 北京房江湖科技有限公司 Zero trust transport layer flow authentication method, device and storage medium
CN114513786A (en) * 2022-04-19 2022-05-17 国网天津市电力公司电力科学研究院 5G feeder automation access control method, device and medium based on zero trust
CN114615328A (en) * 2022-01-26 2022-06-10 北京美亚柏科网络安全科技有限公司 Safety access control system and method
US11394740B1 (en) * 2021-02-01 2022-07-19 TechSlayers LLC Systems and methods for improved network vulnerability scanning and reporting
US20220272117A1 (en) * 2021-02-23 2022-08-25 Sophos Limited Cloud management of connectivity for edge networking devices
CN115189897A (en) * 2021-03-23 2022-10-14 腾讯科技(深圳)有限公司 Access processing method and device for zero trust network, electronic equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468825A (en) * 2014-12-26 2015-03-25 湖南华凯文化创意股份有限公司 Remote authorization method and system
CN107450515A (en) * 2017-07-31 2017-12-08 北京新能源汽车股份有限公司 Automatic testing method and device for fault diagnosis
WO2020147369A1 (en) * 2019-01-18 2020-07-23 华为技术有限公司 Natural language processing method, training method, and data processing device
CN110442524A (en) * 2019-08-09 2019-11-12 中国建设银行股份有限公司 It is a kind of for have Certificate Authority web service interface test method and device
US20200336508A1 (en) * 2020-07-04 2020-10-22 Kumar Srivastava Method and system to stitch cybersecurity, measure network cyber health, generate business and network risks, enable realtime zero trust verifications, and recommend ordered, predictive risk mitigations
CN112134866A (en) * 2020-09-15 2020-12-25 腾讯科技(深圳)有限公司 Service access control method, device, system and computer readable storage medium
US11394740B1 (en) * 2021-02-01 2022-07-19 TechSlayers LLC Systems and methods for improved network vulnerability scanning and reporting
US20220272117A1 (en) * 2021-02-23 2022-08-25 Sophos Limited Cloud management of connectivity for edge networking devices
CN115189897A (en) * 2021-03-23 2022-10-14 腾讯科技(深圳)有限公司 Access processing method and device for zero trust network, electronic equipment and storage medium
CN113225333A (en) * 2021-05-06 2021-08-06 西安电子科技大学 Network resource access control method under zero trust
CN113992328A (en) * 2021-10-27 2022-01-28 北京房江湖科技有限公司 Zero trust transport layer flow authentication method, device and storage medium
CN113992402A (en) * 2021-10-27 2022-01-28 北京房江湖科技有限公司 Access control method, system and medium based on zero trust strategy
CN114615328A (en) * 2022-01-26 2022-06-10 北京美亚柏科网络安全科技有限公司 Safety access control system and method
CN114513786A (en) * 2022-04-19 2022-05-17 国网天津市电力公司电力科学研究院 5G feeder automation access control method, device and medium based on zero trust

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
余海;郭庆;房利国;: "零信任体系技术研究", 通信技术, no. 08, 10 August 2020 (2020-08-10) *
谢振华;王公浩;邢钰;: "面向信号的机载超短波电台自动测试***的开发", 仪器仪表用户, no. 01, 8 February 2006 (2006-02-08) *

Similar Documents

Publication Publication Date Title
US20210326451A1 (en) Automated security assessment of business-critical systems and applications
CN109325351B (en) Security hole automatic verification system based on public testing platform
CN110636131B (en) Internet of things testing system based on cloud technology
CN111181727A (en) Open API full life cycle management method based on micro service
CN103532795B (en) A kind of monitoring system and method detecting WEB service system availability
CN111130922A (en) Airborne information safety automatic test method and test platform
CN104751056A (en) Vulnerability verification system and method based on attack library
CN107566218B (en) Flow auditing method suitable for cloud environment
CN113946451A (en) Micro-service calling method, device, system and computer equipment
CN105404580A (en) Distributed pressure test system and method
CN107634871B (en) Connectivity test method, device and system
CN112052607A (en) Intelligent penetration testing method and device for power grid equipment and system
He et al. Fingerprinting mainstream IoT platforms using traffic analysis
CN114039899B (en) Method for realizing network performance test of WEB product based on Fiddler tool
CN113965355B (en) Illegal IP (Internet protocol) intra-provincial network plugging method and device based on SOC (system on chip)
CN116032798A (en) Automatic testing method and device for zero-trust identity authorization
CN114598500B (en) Security service providing method, platform, electronic device, medium and program
Antunes et al. A monitoring and testing framework for critical off-the-shelf applications and services
Berriri et al. Towards Model based Testing for Software Defined Networks.
CN111385253B (en) Vulnerability detection system for network security of power distribution automation system
CN111522740A (en) Web server timeout analysis system and analysis method based on natural number group
CN110674036A (en) Cross-platform cooperative function interface test system based on CSG II system
CN114697085B (en) Missing scan test system in web application security test and implementation method
CN114143048B (en) Method, device and storage medium for managing safety resources
Mushi et al. Designing for proactive network configuration analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination