2019
DOI: 10.1007/978-3-030-22263-5_34
|View full text |Cite
|
Sign up to set email alerts
|

Secure Kubernetes Networking Design Based on Zero Trust Model: A Case Study of Financial Service Enterprise in Indonesia

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…In the IIoT environment based on the ZTM model, it is crucial to ensure the design and implementation of secure access control technology. This framework aims to leverage the concept of ZTM model to achieve comprehensive, dynamic and sustainable secure access management [30]. The core design point of the framework is to build a powerful and flexible authentication system, covering multi-factor authentication, including biometrics, smart cards, etc.…”
Section: Design Of Secure Access Control Frameworkmentioning
confidence: 99%
“…In the IIoT environment based on the ZTM model, it is crucial to ensure the design and implementation of secure access control technology. This framework aims to leverage the concept of ZTM model to achieve comprehensive, dynamic and sustainable secure access management [30]. The core design point of the framework is to build a powerful and flexible authentication system, covering multi-factor authentication, including biometrics, smart cards, etc.…”
Section: Design Of Secure Access Control Frameworkmentioning
confidence: 99%
“…Indeed, those papers that do exist in the crossover between container security and ZTA are focused primarily on implementing the traditional Zero Trust Networking approach to containers rather than abstracting the rules of ZTA into a more comprehensive framework to consider and govern the entire surface area of a container deployment, or more specifically as it relates to this paper, the surface area of a Docker container deployment. (Surantha 2020) provides arguments for the use of ZTA from a technical standpoint in securing a container deployment, without evolving the concept of ZTA beyond the network. (de Weeve 2020) provides a more indepth look at technical details, strategy and considerations when using ZTA with containers and identifies ZTA as more than purely a technical concept, but a security approach.…”
Section: Related Workmentioning
confidence: 99%
“…To validate the proposed design, a lab simulation was deployed to explore the ability of the design to fulfill the enterprises' requirements. This paper is an extended version of the work of [16].…”
Section: Introductionmentioning
confidence: 99%