草案1中1201行,增加【Shadow IT presents a special problem in that these resources are enterprise-owned but not managed like other resources. Certain ZTA approaches (mainly network-based) may even cause shadow IT components to become unusable as they may not be known and included in network access...
302 Network Security Separate Subnet for Connecting to Different Security Domains NET-03.8 03.13.01.b 303 Network Security Data Flow Enforcement – Access Control Lists (ACLs) NET-04 3.1.3 3.1.3[a]3.1.3[b]3.1.3[c]3.1.3[d]3.1.3[e] 03.01.0303.13.01.a03.13.01.c A.03.01.03[02]...