信息安全研究 ›› 2020, Vol. 6 ›› Issue (11): 0-0.

• 学术论文 •    

零信任安全模型解析及应用研究

王斯梁,冯暄,蔡友保,陈翼   

  1. 四川省计算机研究院
  • 收稿日期:2020-11-08 出版日期:2020-11-09 发布日期:2020-11-11
  • 通讯作者: 王斯梁

Application Research of Zero Trust Architecture

  • Received:2020-11-08 Online:2020-11-09 Published:2020-11-11

摘要: 云计算、大数据和移动互联网的快速发展,带来日趋开放和动态的网络边界,快速增长的用户群体,灵活的移动办公模式导致内网边界也日趋复杂与模糊,使得基于边界的传统安全防护体系逐渐失效,无法阻止内部人攻击和外部的APT攻击。零信任安全模型通过建立以用户身份为中心,用户、终端设备、访问行为为信任决策要素的新安全架构,对来自企业内外部的所有访问进行信任评估和动态访问控制,减小网络攻击面,实现保护企业数据资源的目标。本文对零信任理论模型进行了解析,提出了模型的应用思路、实现框架和实现机制,给出了移动互联网、云计算和大数据等应用场景中的可行解决方案,最后还总结了零信任模型在实际应用中的改进措施。

关键词: 零信任安全模型, 信任评估, 访问控制, 身份认证, 解决方案

Abstract: With the rapid development of technologies of cloud computing, big data and mobile internet, it brings the increasingly open and complex network boundaries and also with fast changing user groups. The flexible mobile office mode leads to the increasingly complex and fuzzy inner network boundary, which made the traditional safety protection system based on boundary gradually fail. It also could unable to prevent insider attacks and external APT attacks. Zero trust architecture focuses on identity, and also users, clients and behaviors as subset. Trust assessment and dynamic access control for all access from inside and outside the enterprise are implemented, which could reduce attack area and realize the objection of protection of the resource data. This paper analyzes the theoretical model of zero trust architecture. The application idea, implementation framework and mechanism of the model are proposed. The feasible solutions of mobile Internet, cloud computing and big data are given in the paper. Finally, the improvement measures of zero trust model in practical application are summarized.

Key words: zero trust architecture, trust evaluation, access control, identity authentication, solutions