基于零信任的移动办公身份认证及访问控制技术  被引量:1

Mobile Office Identity Authentication and Access Control Technology Based on Zero Trust

在线阅读下载全文

作  者:曾勇 马睿 汪超 王营杰 夏海斌 虞江 ZENG Yong;MA Rui;WANG Chao;WANG Yingjie;XIA Haibin;YU Jiang(CETC Cyberspace Security Technology Co.,Ltd.,Chengdu Sichuan 610041,China;The PLA Joint Logistic Support Force,Wuhan Hubei 430010,China;Unit 93501 of PLA,Beijing 100061,China)

机构地区:[1]中国电科网络安全科技股份有限公司,四川成都610041 [2]中国人民解放军联勤保障部队,湖北武汉430010 [3]中国人民解放军93501部队,北京100061

出  处:《通信技术》2023年第7期882-888,共7页Communications Technology

摘  要:传统的办公系统以系统为中心,网络划分为内网和外网,用户分为内部用户和外部用户,通常在内、外网边界构建隔离认证区进行认证与控制,保障网络通信和办公业务访问安全。但随着移动办公、云计算等技术的广泛采用,应用方式向移动化转变,用户向外延伸,数据向云上迁移,导致网络、用户再无内、外之分,以网络边界防护的安全架构已不再适用。以用户为中心、先认证后连接、动态授权和加密传输的零信任网络架构,可有效解决现有办公系统的安全防护短板。Existing office systems are system-centric.Networks are divided into intranets and extranets,and users are divided into internal users and external users.Usually,isolated authentication zones are built at the boundaries of the intranets and extranets for authentication and control to ensure the security of network communication and office business access.However,with the widespread adoption of mobile office,cloud computing and other technologies,the application mode begins to shift to mobility,the user to the outside,the data to the cloud migration,resulting in the networks,the users are no longer have internal or external distinction,and the security architecture that realizes protection at the network boundary is no longer applicable.The zero trust network architecture with user-centricity,authentication before connection,dynamic authorization and encrypted transmission can effectively solve the security protection shortfalls of the existing office system.

关 键 词:零信任 边界防护 身份认证 动态授权 访问控制策略 

分 类 号:TN918.8[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象