Research on Telecommuting Security Solution Based on Zero Trust Architecture

被引:0
|
作者
Kou, Wanli [1 ]
Zhou, Huaizhe [1 ]
Du, Jia [1 ]
机构
[1] Natl Univ Def Technol, Test Ctr, Xian, Peoples R China
关键词
Zero trust; Telecommuting; Dynamic access control; Software defined perimeter;
D O I
10.1007/978-981-99-9247-8_9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments. Solving security issues such as telecommuting based on Zero Trust architecture become a focus of attention. The core of a Zero Trust architecture is "continuous verification, never trust", which means that by default, both internal and external personnel, terminals, and businesses are considered untrustworthy, and their access to the network and business resources will be continuously verified and evaluated. The paper first expounds the historical evolution, basic characteristics, and key technologies of Zero Trust, and then proposes a telecommuting security solution based on Zero Trust architecture. The solution can effectively solve problems such as identity trustworthiness discrimination, device trustworthiness discrimination and behavior trustworthiness discrimination, to achieve secure and reliable business access for telecommuting workers and intelligent terminals. The solution has reference significance for further optimization and implementation of Zero Trust framework in relevant application scenarios.
引用
收藏
页码:82 / 89
页数:8
相关论文
共 50 条
  • [1] Zero Trust Security in the Mist Architecture
    Uehara, Minoru
    COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2021, 2021, 278 : 185 - 194
  • [2] Zero Trust-Based Mobile Network Security Architecture
    Liu, Yiliang
    Su, Zhou
    Peng, Haixia
    Xiang, Yushan
    Wang, Wei
    Li, Ruidong
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (02) : 82 - 88
  • [3] Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
    Xu, Mingyang
    Guo, Junli
    Yuan, Haoyu
    Yang, Xinyu
    ELECTRONICS, 2023, 12 (04)
  • [4] Research on Medical Security System Based on Zero Trust
    Wang, Zhiqiang
    Yu, Xinyue
    Xue, Peiyang
    Qu, Yunhan
    Ju, Lei
    SENSORS, 2023, 23 (07)
  • [5] Trust Score-based Zero Trust Architecture for Advanced Metering Infrastructure Security
    Bhattarai, Hrishav
    Kulkarni, Akshay
    Niamat, Mohammed
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 334 - 339
  • [6] Power IoT security protection architecture based on zero trust framework
    Zhang Xiaojian
    Chen Liandong
    Jie, Fan
    Wang Xiangqun
    Wang Qi
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 166 - 170
  • [7] Zero Trust Architecture for 6G Security
    Chen, Xu
    Feng, Wei
    Ge, Ning
    Zhang, Yan
    IEEE NETWORK, 2024, 38 (04): : 224 - 232
  • [8] Security System Design and Verification for Zero Trust Architecture
    Lee, Sangdo
    Huh, Jun-Ho
    Woo, Hanchul
    ELECTRONICS, 2025, 14 (04):
  • [9] Security Mechanisms used in Systems based on Zero Trust Architecture: A Systematic Mapping
    Manzano, Carlos
    Marquez, Gaston
    Astudillo, Hernan
    2024 L LATIN AMERICAN COMPUTER CONFERENCE, CLEI 2024, 2024,
  • [10] On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse
    AlShehhi, Fatema
    Otoum, Safa
    2023 INTERNATIONAL CONFERENCE ON INTELLIGENT METAVERSE TECHNOLOGIES & APPLICATIONS, IMETA, 2023, : 30 - 37