Zero Trust Architecture for Cloud Security
Authors/Creators
Description
The burgeoning landscape of cloud computing necessitates a reevaluation of traditional security models. Previously, the concept of a trusted network perimeter formed the bedrock of security, granting unfettered access to resources once inside the perimeter. However, the cloud-centric world demands a more robust approach. Zero Trust Architecture (ZTA) emerges as a compelling security framework, upholding the principle of “never trust, always verify." This paper delves into the core tenets of ZTA, exploring its advantages for cloud security and outlining practical considerations for implementation. By embracing ZTA principles and leveraging appropriate security tools, organizations can significantly bolster their cloud security posture and mitigate the ever-present threat of cyberattacks.
Files
JSAER2018-05-04-466-468.pdf
Files
(153.5 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:588df8e899297c15d265ee3377583f0d
|
153.5 kB | Preview Download |
Additional details
References
- [1]. Membangun Keamanan Cloud yang Lebih Baik dengan Zero Trust: https://www.paloaltonetworks.com/zero-trust
- [2]. Panduan Keamanan Zero Trust untuk Arsitektur Cloud Microsoft: https://www.microsoft.com/en-us/security/business/zero-trust
- [3]. Panduan Keamanan Siber untuk Kendaraan Otonom: https://www.cisa.gov/resources-tools/resources/autonomous-ground-vehicle-security-guide
- [4]. Keamanan Siber: Pendekatan Zero Trust: https://www.zscaler.com/resources/security-terms-glossary/what-is-zero-trust
- [5]. Gartner: Pendekatan Zero Trust – Masa Depan Keamanan Cloud: https://www.gartner.com/reviews/market/zero-trust-network-access
- [6]. Cloud Security Alliance (CSA): https://cloudsecurityalliance.org/research/guidance
- [7]. Memperkuat Keamanan Awan Hibrida dengan Zero Trust: https://www.forrester.com/zero-trust/
- [8]. Zero Trust: Pendekatan Baru untuk Keamanan Jaringan: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-193.pdf