Browse > Article
http://dx.doi.org/10.33778/kcsa.2022.22.3.003

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles  

DA-IN Lee (티앤디 시큐리티)
Hoo-Ki Lee (건양대학교/사이버보안학과)
Publication Information
Abstract
With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.
Keywords
Zero Trust; COVID-19; NIST; technology;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Daesung Lee, "A Study on Strategies for Applying Zero Trust", Catholic University of Pusan, p.387-396, 2021.
2 Sung-Hwa Han, Hoo-Ki Lee. "Real-Time File Access Event Collection Methodology for Zero Trust Environment", Journal of the Korea Institute of Information and Communication Engineering, vol.25, no.10, 2021.
3 Min-Hyuck Ko, Daesung Lee, "Zero Trust-Based Security System Building Process", Journal of the Korea Institute of Information and Communication Engineering, vol.25, no.12, 2021.
4 Kindervag John, "Build security into your network's dna: The zero trust network architecture.", for Security & Risk Professionals, 2010.
5 Daesung Lee, "A Study on Zero Trust Building Process", Catholic University of Pusan, 2021.
6 Hyun-jin Lee, Kyung-hoSon, "A Study on a Smart City Supply Chain Security Model Based on Zero-Trust", Journal of The Korea Institute of Information Security & Cryptology, vol.32, no.1, 2022.
7 Scott Rose, Oliver Borchert, Stu Mitchel,l Sean Connelly, "NIST Special Publication 800-207 Zero Trust Architecture", National Institute of Standards and Technology, 2020.
8 NSTAC, "Zero Trust and Trusted Identity Management report", 2021.
9 Semin Kim, Sunghyuck Hong, "Design of Multi-Step Authentication Method using Blockchain",Jeonju National University of Education.Baekseok University, 2021.
10 Seon-A Lee, Beomseok Kim, Hyein Lee, Wonhyung Park, "An Enhancement of The Enterprise Security for Access Control based on Zero Trust", Journal of the Korea Institute of Information and Communication Engineering, vol.26, no.2, 2022.
11 Hoo-k Lee, Cultureinfomation issuereport(2022-06), 2022