ZeroTrust-FileAccess-Control-Example 5.5.1.1

dotnet add package ZeroTrust-FileAccess-Control-Example --version 5.5.1.1
                    
NuGet\Install-Package ZeroTrust-FileAccess-Control-Example -Version 5.5.1.1
                    
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="ZeroTrust-FileAccess-Control-Example" Version="5.5.1.1" />
                    
For projects that support PackageReference, copy this XML node into the project file to reference the package.
<PackageVersion Include="ZeroTrust-FileAccess-Control-Example" Version="5.5.1.1" />
                    
Directory.Packages.props
<PackageReference Include="ZeroTrust-FileAccess-Control-Example" />
                    
Project file
For projects that support Central Package Management (CPM), copy this XML node into the solution Directory.Packages.props file to version the package.
paket add ZeroTrust-FileAccess-Control-Example --version 5.5.1.1
                    
#r "nuget: ZeroTrust-FileAccess-Control-Example, 5.5.1.1"
                    
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
#addin nuget:?package=ZeroTrust-FileAccess-Control-Example&version=5.5.1.1
                    
Install ZeroTrust-FileAccess-Control-Example as a Cake Addin
#tool nuget:?package=ZeroTrust-FileAccess-Control-Example&version=5.5.1.1
                    
Install ZeroTrust-FileAccess-Control-Example as a Cake Tool

Zero Trust File Access Control Demo

Download Zero Trust File Access Control C# Example

Why Zero Trust

Instead of assuming everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.” Every access request is fully authenticated, authorized, and encrypted before granting access. Zero trust adoption can offer organizations the following benefits:

  1. protection of sensitive data.
  2. securing digital transformation.
  3. lower breach risk and detection time.
  4. close security gaps and minimize risk of lateral movement.
  5. better control in cloud environments.

Zero Trust Architecture

Instead of assuming everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.” Every access request is fully authenticated, authorized, and encrypted before granting access. Zero Trust Architecture

Implement Zero trust file access control with EaseFilter

EaseFilter File Control Filter Driver allows you to control the file I/O operations with the filter rule configuration by setting the whitelist and blacklist processes or users, you can allow or block the specific file I/O operation to the specific process or user, you can control who can read your file, allow or block the file modification, prevent your important file from being deleted, renamed.

To implement the Zero Trust file access control , you can setup the filter rule with the default least privilege access rights, by default all the processes or users don’t have privilege to access the files inside this filter rule, it is zero trust to all processes and users. You can setup the whitelist for the filter rule, to add the specific access rights to specific processes or users, so the processes or users who are in the whitelist can have the specific access rights to the files.

EaseFilter Encryption Filter Driver(EEFD) allows you to encrypt file automatically and transparently, combine with the File Control Filter Driver and Process Filter Driver, you can implement the Zero Trust File Access Control with encryption enabled, it can enhance the file security. By default all files will be encrypted automatically, all processes or users can't read the encrypted files, they will get the raw encrypted data. You can authorize the processes or users to access these encrypted files.

How to run ZeroTrustDemo.exe?

Usage: ZeroTrustDemo folderNameMask processName e

options:

folderNameMask --setup the zero trust folder, i.e. c:\zerotrust\*"

processName --authorized the process name to access the files, i.e. notepad.exe

e or null --if it is e, it will enable the encryption for zero trust folder.

Example1:

ZeroTrustDemo c:\zerotrust* notepade.exe e

All files in folder c:\zerotrust will be encrypted by default, no process can't read the encrypted files except the process "notepad.exe"

Example2:

ZeroTrustDemo c:\zerotrust* notepade.exe

No process can access the files in folder c:\zerotrust except the process "notepad.exe"

EaseFilter File System Filter Driver SDK Reference

Product Name Description
Cloud File System SDK EaseFilter Cloud File System SDK Introduction.
CloudTier Storage Tiering SDK EaseFilter Storage Tiering Filter Driver SDK Introduction.
File Monitor SDK EaseFilter File Monitor Filter Driver SDK Introduction.
File Control SDK EaseFilter File Control Filter Driver SDK Introduction.
File Encryption SDK EaseFilter Transparent File Encryption Filter Driver SDK Introduction.
Registry Filter SDK EaseFilter Registry Filter Driver SDK Introduction.
Process Filter SDK EaseFilter Process Filter Driver SDK Introduction.
EaseFilter SDK Programming EaseFilter Filter Driver SDK Programming.

EaseFilter SDK Sample Projects

Sample Project Description
CloudTier Storage Tiering Demo A HSM File System Filter Driver Demo.
CloudTier S3 Tiering Demo CloudTier S3 Intelligent Tiering Demo.
Cloud File DR S3 Demo Cloud File DR S3 Demo.
Amazon S3 File Explorer Demo Amazon S3 File Explorer Demo.
Auto File DRM Encryption Auto file encryption with DRM data embedded.
Transparent File Encrypt Transparent on access file encryption.
Secure File Sharing with DRM Secure encrypted file sharing with digital rights management.
File Monitor Example Monitor file system I/O in real time, tracking file changes.
File Protector Example Prevent sensitive files from being accessed by unauthorized users or processes.
FolderLocker Example Lock file automatically in a FolderLocker.
Process Monitor Monitor the process creation and termination, block unauthorized process running.
Registry Monitor Monitor the Registry activities, block the modification of the Registry keys.
Secure Sandbox Example A secure sandbox example, block the processes accessing the files out of the box.
FileSystemWatcher Example File system watcher, logging the file I/O events.
ZeroTrust Example Zero trust file access control with encryption feature.

Filter Driver Reference

Support

If you have questions or need help, please contact support@easefilter.com

Home | Solution | Download | Demos | Blog | Programming

There are no supported framework assets in this package.

Learn more about Target Frameworks and .NET Standard.

This package has no dependencies.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
5.5.1.1 89 2/22/2025

Implement the Zero Trust File Access Control with encryption enabled, it can enhance the file security. By default all files will be encrypted automatically, all processes or users can't read the encrypted files, they will get the raw encrypted data. You can authorize the processes or users to access these encrypted files.