Stages of reengineering the information system of the enterprise within the framework of zero trust technology
Автор: Valeev S.S., Kondratyeva N.V., Guzairov M.B., Melnikov A.V.
Рубрика: Информатика и вычислительная техника
Статья в выпуске: 3, 2023 года.
Бесплатный доступ
The development of enterprise information systems is associated with the need to support remote work of employees. The reasons may be of a different nature. Under these conditions, it is quite difficult to provide enterprise perimeter protection based on the existing perimeter protection paradigm. Currently, protection systems based on zero trust architecture are being actively developed and implemented. The article analyzes the features of the implementation of this technology in an enterprise that uses a traditional information security system based on the use of VPN technologies and firewalls. The main steps are considered that will allow, if necessary, a phased transition to a zero-trust architecture.
Information security, enterprise information system, zero trust model, zero trust architecture
Короткий адрес: https://sciup.org/148327120
IDR: 148327120 | DOI: 10.18137/RNU.V9187.23.03.P.136