Configures Microsoft Entra ID (Azure AD) conditional access policies for zero-trust access control, covering signal-based design, device compliance, risk-based auth, named locations, session controls, and NIST SP 1800-35 integration.
npx claudepluginhub killvxk/cybersecurity-skills-zhThis skill uses the workspace's default tool permissions.
为零信任访问控制配置 Microsoft Entra ID(Azure AD)条件访问策略,涵盖基于信号的策略设计、设备合规要求、基于风险的认证、命名位置、会话控制以及与 NIST SP 1800-35 零信任架构的集成。
Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control, including signal-based design, device compliance, risk-based authentication, named locations, and session controls.
Configures Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control, covering signal-based design, device compliance, risk-based authentication, and NIST integration.
Guides Zero Trust architecture implementation in AWS, Azure, GCP per NIST SP 800-207 and BeyondCorp principles: identity access control, micro-segmentation, continuous verification, device assessment, IAP deployment. Useful for eliminating VPNs, multi-cloud segmentation, compliance.
Share bugs, ideas, or general feedback.
为零信任访问控制配置 Microsoft Entra ID(Azure AD)条件访问策略,涵盖基于信号的策略设计、设备合规要求、基于风险的认证、命名位置、会话控制以及与 NIST SP 1800-35 零信任架构的集成。
| 控制项 | NIST 800-53 | 描述 |
|---|---|---|
| 账户管理 | AC-2 | 生命周期管理 |
| 访问执行 | AC-3 | 基于策略的访问控制 |
| 最小权限 | AC-6 | 最小必要权限 |
| 审计日志 | AU-3 | 认证和访问事件 |
| 身份识别 | IA-2 | 用户和服务识别 |