Closed Access
Refine
Year of publication
- 2022 (1)
Document type
- Bachelor Thesis (1)
Language
- English (1) (remove)
Has full text
- Yes (1)
Is part of the Bibliography
- No (1)
Keywords
- Computer science (1)
- Computer security (1)
- Open source (1)
Course of studies
- AIN - Allgemeine Informatik (1) (remove)
Cybersecurity threads are a huge problem for all sizes of businesses. The traditional way of protecting valuable resources in the IT-Industry is a perimeter based security strategy. To ensure proper access rights for resources, firewalls, and other network-based inspection tools were used. The current move to the cloud undermines classic security strategies by blurring borders. The Zero Trust approach does not rely on edges and borders to ensure network security. Instead, all connections have to be verified and authenticated individually. In this thesis, a zero trust security model in a heterogeneous open source environment was verified. The three main observations were:
A zero trust architecture is possible, but the implementation is difficult. Half of the issues discovered must be covered by organisational measures. The tools available to cover technical measures are not developed enough. This is expected to change in the near future, as varoius companies already identified this issue.