* [Blog](https://www.paloaltonetworks.com.au/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com.au/blog/corporate/) * [Products and Services](https://www.paloaltonetworks.com.au/blog/category/products-and-services-zh-hans/?lang=zh-hans) * ZTNA 1.0 怎样违反了最低权限原则... # ZTNA 1.0 怎样违反了最低权限原则 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2022%2F06%2Fztna-1-0-violates-principle-of-least-privilege%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=ZTNA+1.0+%E6%80%8E%E6%A0%B7%E8%BF%9D%E5%8F%8D%E4%BA%86%E6%9C%80%E4%BD%8E%E6%9D%83%E9%99%90%E5%8E%9F%E5%88%99&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2022%2F06%2Fztna-1-0-violates-principle-of-least-privilege%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com.au%2Fblog%2F2022%2F06%2Fztna-1-0-violates-principle-of-least-privilege%2F%3Flang%3Dzh-hans&title=ZTNA+1.0+%E6%80%8E%E6%A0%B7%E8%BF%9D%E5%8F%8D%E4%BA%86%E6%9C%80%E4%BD%8E%E6%9D%83%E9%99%90%E5%8E%9F%E5%88%99&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com.au/blog/2022/06/ztna-1-0-violates-principle-of-least-privilege/?lang=zh-hans&ts=markdown) \[\](mailto:?subject=ZTNA 1.0 怎样违反了最低权限原则) Link copied By [Kumar Ramachandran](https://www.paloaltonetworks.com/blog/author/kumar-ramachandran/?lang=zh-hans&ts=markdown "Posts by Kumar Ramachandran") Jun 09, 2022 1 minutes [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hans/?lang=zh-hans&ts=markdown) This post is also available in: [English (英语)](https://www.paloaltonetworks.com.au/blog/2022/05/ztna-1-0-violates-principle-of-least-privilege/ "切换到 英语(English)") [繁體中文 (繁体中文)](https://www.paloaltonetworks.com.au/blog/2022/06/ztna-1-0-violates-principle-of-least-privilege/?lang=zh-hant "切换到 繁体中文(繁體中文)") [日本語 (日语)](https://www.paloaltonetworks.com.au/blog/2022/06/ztna-1-0-violates-principle-of-least-privilege/?lang=ja "切换到 日语(日本語)") [한국어 (韩语)](https://www.paloaltonetworks.com.au/blog/2022/06/ztna-1-0-violates-principle-of-least-privilege/?lang=ko "切换到 韩语(한국어)") # 利用 ZTNA 2.0 的精细访问控制降低风险 *这是"ZTNA Straight Talk"五篇系列文章中的第一篇,我们将详细介绍 ZTNA 2.0 的五个原则,ZTNA 2.0 是用于确保访问安全的新标准。* 零信任的概念是指消除网络和数字交易中的所有默认信任,被普遍认为是当今保护企业安全的最佳方法。然而,正如 [Nir Zuk 最近所说](https://www.paloaltonetworks.com/blog/2022/05/the-world-needs-ztna-2-0-for-todays-hybrid-workforce/),现有的零信任网络访问解决方案有五个将企业安全置于风险之中的惊人漏洞: 1) 违反了最低权限原则。 2) 采用"允许并忽略"模式。 3) 不进行安全检查。 4) 数据保护不力。 5) 仅保护企业的应用子集。 本文将主要解释第一个漏洞,探讨 ZTNA 1.0 怎样违反了最低权限原则。 最低权限原则是一个信息安全概念,规定了*应向用户或实体授予办公所需的最低限度的访问权限*。这一原则的逻辑是,如果出现问题,将访问权限限制在最低限度可减少暴露风险。 最低权限原则是零信任态势的基础,ZTNA 1.0 提供商通常称其为解决方案的"内置"工具。然而,ZTNA 1.0 的架构漏洞导致这些提供商远远无法落实这一概念。 ## ZTNA 1.0 违反了最低权限原则(与 VPN 不相上下)。 在探讨 ZTNA 1.0 的问题之前,首先需要提到远程访问 VPN。长期以来,VPN 一直用以远程访问企业网络。这种方法会广泛授予整个网络的访问权限,实在不尽理想,但由于没有实用的替代办法,业界只能一直使用这一方法,因为只有少量用户偶尔会使用这种方法,这些用户连接之后就会"获得信任"。然而,向混合办公模式的快速转变和现代威胁的复杂性(尤其是涉及横向移动的攻击)最终导致传统 VPN 过时。 ZTNA 旨在通过限制用户仅访问所需特定应用而非整个网络来解决 VPN 最大的挑战之一。然而,供应商实施 ZTNA 1.0 解决方案的方式基本上是将应用转换为 IP(或 FQDN)和端口号等第 3 层或第 4 层的网络结构。这一局限性要求管理员在编写访问控制策略时只能使用泛泛的说辞,最终授予了远远超出预期的访问权限。 应用组件使用静态 IP 地址和端口号的传统应用可以使用 IP/端口来识别应用。然而,如今几乎每个企业都使用提供多种功能的云原生应用,每个功能均通过单独的 URL 或更高级的概念提供。同样,业务应用通常使用动态 IP 和端口、服务器发起的连接以及创建基于 IP 和端口的静态访问控制策略的其他场景。 ## 现代应用的访问控制 正如上文所述,最低权限原则指尽量为用户提供办公所需的最少权限。为了应对 SaaS 应用和其他使用动态 IP 和端口的现代应用,ZTNA 1.0 解决方案要求您授予大量 IP 和端口的访问权限,以便访问控制(和应用)正常运作。这显然违反了最低权限原则,因为它在您的网络中创建了一个可被攻击者或恶意软件利用的巨大漏洞。 借助 [ZTNA 2.0](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-2-0),无论应用使用的是什么 IP 和端口,系统皆可利用 App-ID 在所有协议和端口中动态识别应用和应用中的特定功能。因此,管理员无需考虑网络架构,并实现了非常精细的访问控制,最终实施了名副其实的最低权限访问。 ## 使用服务器发起的连接的应用无法与 ZTNA 1.0 完美配合 需要在服务器和客户端之间建立连接的应用也无法与 ZTNA 1.0 解决方案完美协作。这类应用包括任务关键应用,如更新和补丁管理解决方案、设备管理应用和帮助台应用。许多供应商已经实施了 ZTNA 1.0,但该解决方案仅在您的用户发起此类连接时才起作用,而对于应用或服务器发起的连接根本不起作用。我们发现许多客户尝试实施 ZTNA 1.0 解决方案,但最终被迫保留其传统 VPN 解决方案,而 VPN 的用途却是解决这一新用例的问题! [Prisma Access](https://www.paloaltonetworks.com/sase/access) 等 ZTNA 2.0 解决方案允许使用 App-ID 定义应用访问策略以进行双向访问控制,还可以轻松为所有类型的应用启用最低权限访问,包括使用服务器发起的连接的应用。 ## 针对私有应用的子应用控制 许多私有应用缺乏大多数现代 SaaS 应用中的内置精细访问控制功能。ZTNA 1.0 解决方案仅根据 IP 地址和端口号来识别应用,仅授予用户应用访问权限查看数据而不可上传或下载数据这样的简单操作是无法实现的。而在利用 App-ID 架构识别应用和子应用的 ZTNA 2.0 解决方案中,可轻松在子应用级别提供此类精细控制(即指定应用的访问权限,但限制上传/下载)。 ## 有效实施最低权限需要 ZTNA 2.0 的精细控制功能。 如今,应用和用户无处不在,采用最低权限原则对于有效实施零信任及降低企业风险而言至关重要。如前所述,ZTNA 2.0 支持对所有类型的应用进行精细访问控制,独立于 IP 地址和端口号等网络架构。这是在确保访问安全并最终摆脱传统远程访问 VPN 方面的重大飞跃。 [请于 6 月 15 日和 16 日参加我们的](https://start.paloaltonetworks.com/zero-trust-with-zero-exceptions)特别活动,活动期间我们将讨论利用 ZTNA 2.0 保障混合劳动力安全的创新和最佳实践。请继续关注下周的 Palo Alto Networks 博客,我将在其中介绍 ZTNA 2.0 的第二个原则。 *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hans/?lang=zh-hans&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hans/?lang=zh-hans&ts=markdown) [#### Palo Alto Networks 以量子安全与多云防护引领未来](https://www.paloaltonetworks.com.au/blog/2025/09/paves-way-for-quantum-ready-security/?lang=zh-hans) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hans/?lang=zh-hans&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hans/?lang=zh-hans&ts=markdown) [#### 从根本上简化网络安全](https://www.paloaltonetworks.com.au/blog/2024/11/ai-copilot-simplified-security/?lang=zh-hans) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hans/?lang=zh-hans&ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-zh-hans/?lang=zh-hans&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hans/?lang=zh-hans&ts=markdown) [#### Forrester 将 Palo Alto Networks 评为攻击面管理的领导者](https://www.paloaltonetworks.com.au/blog/2024/10/forrester-names-palo-alto-networks-a-leader-in-attack-surface-management/?lang=zh-hans) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hans/?lang=zh-hans&ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles-zh-hans/?lang=zh-hans&ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events-zh-hans/?lang=zh-hans&ts=markdown), [Product Features](https://www.paloaltonetworks.com/blog/security-operations/category/product-features-zh-hans/?lang=zh-hans&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hans/?lang=zh-hans&ts=markdown) [#### Forrester 将 Palo Alto Networks 评为 XDR 领域的领导者](https://www.paloaltonetworks.com.au/blog/2024/07/forrester-names-palo-alto-networks-a-leader-in-xdr/?lang=zh-hans) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hans/?lang=zh-hans&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hans/?lang=zh-hans&ts=markdown) [#### 测试防火墙性能和灵活性的极限](https://www.paloaltonetworks.com.au/blog/2023/12/firewall-performance-and-flexibility/?lang=zh-hans) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement-zh-hans/?lang=zh-hans&ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services-zh-hans/?lang=zh-hans&ts=markdown) [#### Prisma Cloud:达尔文版本首次引入代码到云智能](https://www.paloaltonetworks.com.au/blog/2023/12/announcing-innovations-cnapp-prisma-cloud/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com.au/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language