Stages of reengineering the information system of the enterprise within the framework of zero trust technology

Бесплатный доступ

The development of enterprise information systems is associated with the need to support remote work of employees. The reasons may be of a different nature. Under these conditions, it is quite difficult to provide enterprise perimeter protection based on the existing perimeter protection paradigm. Currently, protection systems based on zero trust architecture are being actively developed and implemented. The article analyzes the features of the implementation of this technology in an enterprise that uses a traditional information security system based on the use of VPN technologies and firewalls. The main steps are considered that will allow, if necessary, a phased transition to a zero-trust architecture.

Еще

Information security, enterprise information system, zero trust model, zero trust architecture

Короткий адрес: https://sciup.org/148327120

IDR: 148327120   |   DOI: 10.18137/RNU.V9187.23.03.P.136

Статья научная