信息安全研究 ›› 2020, Vol. 6 ›› Issue (4): 289-295.

• 远程办公安全专题 • 上一篇    下一篇

基于零信任的远程办公系统安全模型研究与实现

魏小强   

  1. 北京奇虎360科技有限公司未来网络安全研究院天枢智库
  • 收稿日期:2020-04-06 出版日期:2020-04-03 发布日期:2020-04-06
  • 通讯作者: 魏小强
  • 作者简介:魏小强, 1972. 硕士学位。目前供职于360公司未来网络研究院。高级研究员。智库安全研究部负责人。主要研究领域:云安全,零信任,5G安全,勒索病毒等。联系方式:weixq2020@163.com

Research and Implementation of Security Model of Telecommuting System Based on Zero Trust

  • Received:2020-04-06 Online:2020-04-03 Published:2020-04-06

摘要: 远程办公因其众多的优点而成为一种潮流为大众所接受, 然而也带来了诸多网络安全问题.伴随新技术的不断出现、网络环境的日趋演进、自带设备(BYOD)的普及和不断出现的网络安全事件使得远程办公面临的安全风险大增.因为传统的网络边界防御模型不再能满足今天网络安全的需求,零信任被越来越多的人认可并成为新的安全模型.零信任模型最早是由Forrester的专家提出来的,该安全模型不再把网络分为信任区和非信任区,零信任模型不是一个简单的网络架构,而是一套方法论.基于对零信任网络模型的理解,结合具体的网络安全实例对比分析了零信任模型与传统安全模型的区别,主要是为了发现一个系统的方法来指导企业解决远程办公的安全问题,旨在给准备实施零信任战略的企业提供一些参考.

关键词: 远程办公, 自带设备, 零信任, 网络安全, 网络威胁, 多因素认证, 远程访问

Abstract: Telecommuting has become very popular and been widely accepted because of its various advantages. However, it brings numbers of serious problems related to network security. With the continuous emergence of new technologies, the gradual evolution of the network environment, the popularity of BYOD and the ever-increasing network security incidents, the security risks faced by telecommuting have greatly increased. Since the traditional network boundary defense model can no longer meet the needs of network security today, the Zero Trust Network is being recognized as a new security model by more and more people. The term zero trust was first used by a Forrester's expert when describing a new security model in which networks were no longer split into trusted and untrusted zones. ZTA is not a single network architecture, it is a methodology. Based on the understanding of the Zero Trust Network model, this paper compares it with the traditional perimeter model using an analysis of a real case, aiming to find a systematic approach to guide enterprises to solve telecommuting security problems. Addressing to provide some references for the companies preparing to implement this strategy.

Key words: telecommuting, BYOD, zero trust, cybersecurity, cyberthreat, multi-factor authentication, remote access