A Study on the Application of Zero Trust Security Model in the Financial Sector

Jae Kwon Bae
{"title":"A Study on the Application of Zero Trust Security Model in the Financial Sector","authors":"Jae Kwon Bae","doi":"10.38115/asgba.2023.20.5.179","DOIUrl":null,"url":null,"abstract":"The changed hybrid work environment such as the expansion of cloud computing technology and the increase in telecommuting due to the coronavirus infection (COVID-19), has brought about new security problems. The traditional perimeter security model has limitations in protecting various devices and environments because it is difficult to clearly distinguish network boundaries. The Zero Trust model, which has been proposed as an alternative security strategy to overcome this, is based on the premise that there is no trust in the assets and actors that are connected components when configuring corporate infrastructure and workflow. The financial sector is actively seeking to introduce the zero trust security model as a means of strengthening security. Demand for responding to advanced cyber-security threats, strengthening security policies, and applicability and necessity of a zero trust security model in the financial sector has expanded. This study proposed the components of a zero trust security model to be applied to the financial world based on financial governance and zero trust principles, components of the maturity model, and the results of expert interviews. The zero trust security model in the financial sector consists of four layers and eight detailed steps: perimeter security layer, authority definition layer, behavior detection layer, and internal control layer. This zero trust security model for the financial sector is expected to provide guidelines for key elements and construction steps to be considered when introducing zero trust in the financial sector.","PeriodicalId":497662,"journal":{"name":"글로벌경영학회지","volume":"44 5-6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"글로벌경영학회지","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.38115/asgba.2023.20.5.179","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The changed hybrid work environment such as the expansion of cloud computing technology and the increase in telecommuting due to the coronavirus infection (COVID-19), has brought about new security problems. The traditional perimeter security model has limitations in protecting various devices and environments because it is difficult to clearly distinguish network boundaries. The Zero Trust model, which has been proposed as an alternative security strategy to overcome this, is based on the premise that there is no trust in the assets and actors that are connected components when configuring corporate infrastructure and workflow. The financial sector is actively seeking to introduce the zero trust security model as a means of strengthening security. Demand for responding to advanced cyber-security threats, strengthening security policies, and applicability and necessity of a zero trust security model in the financial sector has expanded. This study proposed the components of a zero trust security model to be applied to the financial world based on financial governance and zero trust principles, components of the maturity model, and the results of expert interviews. The zero trust security model in the financial sector consists of four layers and eight detailed steps: perimeter security layer, authority definition layer, behavior detection layer, and internal control layer. This zero trust security model for the financial sector is expected to provide guidelines for key elements and construction steps to be considered when introducing zero trust in the financial sector.
零信任安全模型在金融领域的应用研究
云计算技术的发展和新型冠状病毒感染(COVID-19)导致的远程办公增加等混合工作环境的变化带来了新的安全问题。传统的周界安全模型由于难以清晰区分网络边界,在保护各种设备和环境方面存在局限性。零信任模型被提议作为一种替代的安全策略来克服这个问题,它是基于这样一个前提,即在配置公司基础设施和工作流时,对连接组件的资产和参与者没有信任。金融界正在积极寻求引进零信任安全模式,作为加强安全性的手段。应对先进网络安全威胁、加强安全政策、零信任安全模式在金融领域的适用性和必要性等方面的需求不断扩大。本研究基于金融治理和零信任原则、成熟度模型的组成部分以及专家访谈的结果,提出了适用于金融世界的零信任安全模型的组成部分。金融领域的零信任安全模型包括外围安全层、权限定义层、行为检测层和内部控制层四层八个详细步骤。这一金融领域零信任安全模型有望为在金融领域引入零信任时需要考虑的关键要素和建设步骤提供指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信