Browse > Article
http://dx.doi.org/10.6109/jkiice.2021.25.12.1898

Zero Trust-Based Security System Building Process  

Ko, Min-Hyuck (Department of Computer Engineering, Catholic University of Pusan)
Lee, Daesung (Department of Computer Engineering, Catholic University of Pusan)
Abstract
Recently, the need to be wary of internal access such as internal access as well as external attackers' access to work has increased due to network expansion, cloud infrastructure expansion, and changes in working patterns due to COVID-19 situations. For this reason, a new network security model called Zero Trust is drawing attention. Zero Trust has a key principle that a trusted network does not exist, and in order to be allowed access, it must be authenticated first, and data resources can only be accessed by authenticated users and authenticated devices. In this paper, we will explain these zero trust and zero trust architectures and examine new security application strategies applicable to various companies using zero trust and the process of building a new security system based on the zero trust architecture model.
Keywords
Zero trust; Security model; Zero trust architecture; Zero trust strategy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 What is a Zero Trust Architecture [Internet]. Available: https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture.
2 S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero Trust Architecture, NIST Special Publication 800-207, 2020.
3 Evolving Zero Trust : How real-world deployments and attacks are shaping the future of Zero Trust strategies [Internet]. Available: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWJJdT.
4 What Zero Trust Architecture Is and How to Achieve It [Internet]. Available: https://www.illumio.com/cybersecurity101/zero-trust.
5 S. Y. Kim, K. H. Jeong, Y. N. Hwang, and D. H. Nyang, "Abnormal Behavior Detection for Zero Trust Security Model Using Deep Learning," Korea Information Processing Society Collection of academic papers, vol. 28, no. 1, pp. 132-135, 2021.
6 Zero Trust Introduction Acceleration-Microsoft's report [Internet]. Available: https://blog.naver.com/cspark14/222453433114.
7 R. Vanickis, P. Jacob, S. Dehghanzadeh, and B. Lee, Access Control Policy Enforcement for Zero-Trust-Networking, 2018 29th Irish Signals and Systems Conference (ISSC), pp. 1-6, 2018. doi: 10.1109/ISSC.2018.8585365.   DOI
8 J. Y Chun, Zero trust basis of network security strategy, IDG Summary AKAMAI MEGAZONE, 2021.
9 A. Kerman, O. Borchert, S. Rose, and A. Tan, Implementing a zero trust architecture, The MITRE Corporation, Tech. Rep, 2020.
10 M. J. Hwang, Microsoft Zero Trust Network Strategy and Implementation Plan, Microsoft Cyber Security Solutions Group, 2020.
11 What is Zero Trust? [Internet]. Available: https://www.vmware.com/kr/topics/glossary/content/zero-trust.html.