Information Security 6 min read

Overview of JD.com's Five‑Element Zero Trust Security Framework

This whitepaper outlines JD.com's practical zero‑trust security approach, detailing a five‑element framework that includes asset digitization, asset identity, diversified security checkpoints, a strategy center, and a zero‑trust cockpit, to help digital enterprises strengthen security, reduce costs, and meet regulatory requirements.

JD Tech
JD Tech
JD Tech
Overview of JD.com's Five‑Element Zero Trust Security Framework

This whitepaper presents JD.com's practical experience with zero‑trust security, aiming to provide digital enterprises with reference material for building security capabilities, lowering deployment costs, enhancing data governance, and complying with national security laws and regulations.

Amid rapid information technology and digital transformation, data has become a critical production factor, prompting strong policy focus such as the Data Security Law, Cybersecurity Law, and Personal Information Protection Law. JD leverages its supply‑chain‑based digital business to improve security and support high‑quality economic development.

Traditional perimeter‑based security can no longer address rising supply‑chain risks and sophisticated attack‑defense dynamics, making zero‑trust strategies a more effective choice for modern enterprises.

JD's zero‑trust system expands the classic three elements—identity, security checkpoints, and continuous access control—by adding two new dimensions: asset digitization and a zero‑trust cockpit, forming a five‑element framework.

The five core components are: 1. Asset Digitization: JD builds an advanced unknown‑asset detection system to discover and eliminate blind spots beyond traditional asset inventories. 2. Asset Identity: Extends identity to data and all assets, assigning unique identifiers and enabling fine‑grained permission control. 3. Diversified Security Checkpoints: Deploys checkpoints throughout the request chain, reducing attack surface and providing precise defense. 4. Strategy Center: Supports multiple access‑control models (ABAC, RBAC, PBAC, OBAC, TBAC) for dynamic, continuous authentication. 5. Zero‑Trust Cockpit: Offers asset risk quantification and security‑investment ROI models to help enterprises assess and plan security initiatives.

The whitepaper serves as a practical guide for the industry, showcasing how JD's zero‑trust implementation can aid enterprises in measuring security posture, closing gaps, and safeguarding data and systems.

Original whitepaper link: JD Zero Trust Security Construction Practice Whitepaper

digital transformationinformation securityzero-trustJD.comsecurity framework
JD Tech
Written by

JD Tech

Official JD technology sharing platform. All the cutting‑edge JD tech, innovative insights, and open‑source solutions you’re looking for, all in one place.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.