• Title/Summary/Keyword: 제로 트러스트 전략

Search Result 10, Processing Time 0.026 seconds

Zero Trust-Based Security System Building Process (제로 트러스트 기반 보안체계 구축 프로세스)

  • Ko, Min-Hyuck;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1898-1903
    • /
    • 2021
  • Recently, the need to be wary of internal access such as internal access as well as external attackers' access to work has increased due to network expansion, cloud infrastructure expansion, and changes in working patterns due to COVID-19 situations. For this reason, a new network security model called Zero Trust is drawing attention. Zero Trust has a key principle that a trusted network does not exist, and in order to be allowed access, it must be authenticated first, and data resources can only be accessed by authenticated users and authenticated devices. In this paper, we will explain these zero trust and zero trust architectures and examine new security application strategies applicable to various companies using zero trust and the process of building a new security system based on the zero trust architecture model.

A Study on Strategies for Applying Zero Trust (제로 트러스트 적용 전략에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.461-463
    • /
    • 2021
  • With the recent increase in remote access due to network expansion, cloud infrastructure expansion, and telecommuting, the need to be vigilant not only from external access but also from internal access is increasing. Because of this, a new network security model called zero trust is attracting attention. In this paper, we will briefly introduce the concept of zero trust and examine strategies for applying zero trust according to various business environments.

  • PDF

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

A Study of Security Threats and Zero Trust based Countermeasures in Smart Cities (스마트시티 보안 위협 분석 및 제로트러스트 기반 대응 전략 연구)

  • ChanYoung Kang;Sokjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.174-175
    • /
    • 2023
  • 21세기가 도래함에 따라 새로운 도시의 형태인 스마트시티는 다양한 기기들이 네트워크 상에 서로 연결되어 이용자에게 편리함을 제공한다. 하지만 사이버 공격 기법 또한 고도화되고 있다. 많은 IoT 기기들이 상호작용함에 따라 사이버 공격을 당하면 도시 전체가 피해를 입을 수 있다. 이에 따라 본 논문에서는 스마트시티에서 일어날 수 있는 보안 사고에 대해 분석하고 이를 대응하기 위한 제로트러스트 도입 전략에 대해 연구하고자 한다.

A Study on the Establishment of Information Security Management System Based on Zero Trust Architecture (제로 트러스트 아키텍처 기반의 정보보호 관리체계 구축에 대한 연구)

  • Lee, Jin Yong;cho, wonbae;Jang, Hyoung Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.210-212
    • /
    • 2022
  • 4차 산업혁명의 시대적 요구에 따라 스마트워크, 원격진료, 메타버스 등 원격 접속 기반의 사회 인프라 환경이 확산되고 있으며, 코로나19는 이와 같은 원격접속 환경을 가속화하였다. 원격 접속 환경에서는 공간, 시간, 단말 등의 제약으로부터 비교적 자유롭게 기업 내부의 중요 자원 및 서비스를 이용할 수 있기 때문에 노동 생산성을 증대시킨다는 이점은 있으나, 충분히 검증받지 않은 작업 환경이기 때문에 보안적 측면에서는 문제를 야기시킬 수 있다. 또한 전통적인 정보보호 관리체계에서는 원격접속 환경은 허용하지 않거나 최소화한다는 기본 사상을 바탕으로 설계되어 있기 정보보호 전략적 한계가 존재한다. 본 논문에서는 이와 같은 정보보호 전략적 한계를 개선하기 위해 제로 트러스트 아키텍처 기반의 정보보호 관리체계 구축에 대한 방안을 제언한다.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.

A Study on Zero Trust Building Process (제로 트러스트 구축 프로세스에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.464-466
    • /
    • 2021
  • Currently, most companies have security solutions such as firewalls or WAF (Web Application Firewall) for web services, cloud systems, and data centers. Recently, as the need for remote access increases, the task of overcoming the security vulnerabilities of remote access control is becoming more important. In this paper, the concept of the network security model from the perspective of zero trust and the strategy and security system using it will be reviewed.

  • PDF

Strategies of Large Park Development and Management through Governance - Case Studies of The Presidio and Sydney Harbour National Park - (거버넌스를 통한 대형 도시공원의 조성 및 운영관리 전략 - 프레시디오 공원과 시드니 하버 국립공원 사례를 중심으로 -)

  • Sim, Joo-Young;Zoh, Kyung-Jin
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.6
    • /
    • pp.60-72
    • /
    • 2016
  • This study aims to suggest strategies of development and management for large parks by examining experimental cases of park governance models related to a shift away from public administration. The shifts towards governance as well as public-private partnership in city parks have involved the need for new public management. This study has analyzed two exemplary cases of Presidio Park and Sydney Harbour National Park in the aspects of planning process and management strategies, as the results derived the meaning and effect of park governance management and is also an essential prerequisite for the achievement of the model. There are six dimensions of research frames--namely policy, governance, partnership, finances and funds, design and maintenance-management, and evaluation-monitoring-taken as the basis for this study. Through the analysis, several key characteristics of these cases were elicited. First, the park planning process must be consistent in carrying a policy from planning to implementation, and furthermore, an independent operation body which can properly authorize an execution and uphold its responsibility from the public could serve in adaptable park services. Second, it has been suggested to build various partnerships with PAs and NGOs, private corporations, community groups, and academic institutes that allow it to expand the diversity of the park activities. Third, there has been experimental exploration to achieve a financially self-sufficient model by establishing internal revenue models and hence allow the reduction of reliance on public finances. The result of this type of park management would allow for improving park quality and make the park space a vital part of the local economy. Fourth, the strategies for a local community's participation are needed to allow the community to become a producer as well as a consumer. This study shows that the direction and significance of the park governance model regarding the fact that the plans sought by the two parks are extending the layout of public-centered discussion to the private sector and the third non-governmental sector including to the local community group. This shows both implications and limitations, such as the risk of privatization through non-governmental activities at the park or the violation of essential functions as a public good due to a profit-generating management policy for securing financial self-sufficiency. At the current point in which plans are under way for the development and management of large parks, a park governance model requires continuous study and expansion of discussion in the future.