제로트러스트 기반의 원격 근무 환경을 구축하기 위한 보안요구사항 분석 연구

Vol. 34, No. 1, pp. 83-102, 2월. 2024
https://doi.org/10.13089/JKIISC.2024.34.1.83, Full Text:
Keywords: Zero Trust, Cloud system, Remote Work System, Openstack, Threat modeling
Abstract

Recently, as the use of the cloud increases year by year and remote work within the enterprise has become one of the new types of work, the security of the cloud-based remote work environment has become important. The introduction of zero trust is required due to the limitations of the existing perimeter security model that assumes that everything in the internal network is safe. Accordingly, NIST and DoD published standards related to zero trust architecture, but the security requirements of that standard describe only logical architecture at the abstract level. Therefore, this paper intends to present more detailed security requirements compared to NIST and DoD standards by performing threat modeling for OpenStack clouds. After that, this research team performed a security analysis of commercial cloud services to verify the requirements. As a result of the security analysis, we identified security requirements that each cloud service was not satisfied with. We proposed potential threats and countermeasures for cloud services with zero trust, which aims to help build a secure zero trust-based remote working environment.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김해나, 김승주, 김예준, "A Study on the Security Requirements Analysis to Build a Zero Trust-Based Remote Work Environment," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 1, pp. 83-102, 2024. DOI: https://doi.org/10.13089/JKIISC.2024.34.1.83.

[ACM Style]
김해나, 김승주, and 김예준. 2024. A Study on the Security Requirements Analysis to Build a Zero Trust-Based Remote Work Environment. Journal of The Korea Institute of Information Security and Cryptology, 34, 1, (2024), 83-102. DOI: https://doi.org/10.13089/JKIISC.2024.34.1.83.