Define the Initial User-to-Data-Center Traffic Security Policy

Define who can use which data center applications on which servers and other devices.
Defining the initial best practice security policy for user traffic flowing to the data center begins the process of developing a data center application whitelist. The ultimate goal is to use positive security enforcement to protect your data center with a Zero Trust architecture by explicitly controlling who can access the data center, which data center applications they can access, and what resources they can access inside the data center. When you finish developing your best practice security policy, no unknown users should be able to access the data center and no unknown applications or resources should reside in the data center.

Related Documentation