This site uses cookies. By continuing to use this site you agree to our use of cookies. To find out more, see our Privacy and Cookies policy.
Paper The following article is Open access

An Implementation Method of Zero-trust Architecture

, , , and

Published under licence by IOP Publishing Ltd
, , Citation Tao Chuan et al 2020 J. Phys.: Conf. Ser. 1651 012010 DOI 10.1088/1742-6596/1651/1/012010

1742-6596/1651/1/012010

Abstract

With the development of the Internet, the company network architecture is also undergoing profound changes, and the boundaries between the original internal network and external network are becoming increasingly blurred with the emergence of cloud services. More and more company businesses are deployed on the cloud server, which increases the risk of data exchange between the cloud server and the intranet. An implementation method of zero-trust architecture is proposed in this paper to apply to this scenario. The method can ensure safe and reliable data exchange when the external application server accesses the internal network, effectively protect network communication and business access while not affecting the original internal network protection measures, and make the company network safer and controllable.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.