Define the Initial User-to-Data-Center Traffic Security Policy
Define who can use which data center applications on
which servers and other devices.
Defining the initial best practice security policy for
user traffic flowing to the data center begins the process of developing
a data center application allow list. The ultimate goal is to use
positive security enforcement to protect your data center with a
Zero Trust architecture by explicitly controlling who can access
the data center, which data center applications they can access,
and what resources they can access inside the data center. When
you finish developing your best practice security policy, no unknown
users should be able to access the data center and no unknown applications
or resources should reside in the data center.