《计算机应用》唯一官方网站 ›› 0, Vol. ›› Issue (): 88-94.DOI: 10.11772/j.issn.1001-9081.2023111617

• 网络空间安全 • 上一篇    下一篇

零信任网络安全:从理论到实践

方智阳(), 方玏彦, 杨湘   

  1. 四川大学 网络空间安全学院,成都 610065
  • 收稿日期:2023-11-22 修回日期:2024-05-17 接受日期:2024-05-24 发布日期:2025-01-24 出版日期:2024-12-31
  • 通讯作者: 方智阳
  • 作者简介:方智阳(1986—),男,浙江永康人,副教授,博士,主要研究方向:恶意代码检测与对抗
    方玏彦(2003—),湖北武汉人,主要研究方向:网络空间安全
    杨湘(2004—),女,四川达州人,主要研究方向:网络空间安全。
  • 基金资助:
    国家自然科学基金资助项目(U2133208);四川省青年科技创新研究团队项目(2022JDTD0014);四川省重点研发项目(2023YFG0290)

Zero trust network security: from theory to practice

Zhiyang FANG(), Leyan FANG, Xiang YANG   

  1. School of Cyber Science and Engineering,Sichuan University,Chengdu Sichuan 610065,China
  • Received:2023-11-22 Revised:2024-05-17 Accepted:2024-05-24 Online:2025-01-24 Published:2024-12-31
  • Contact: Zhiyang FANG

摘要:

零信任(ZT)是一种新兴的网络安全理念,旨在改变传统的“信任但验证”模式,从而在网络中实现更严格的访问控制和安全防御。ZT架构基于一个基本前提,即不信任任何用户、设备或网络,要求在每次访问时都验证用户身份,并对访问请求进行细粒度的授权控制。首先,阐述ZT的概念及核心原则。其次,介绍ZT架构的主要应用场景及其主要组成部分,以及这些架构的工作原理。同时,比较分析现有的ZT架构,从而为掌握ZT理念的具体实现方式并构建ZT架构提供重要的借鉴和参考。最后,总结ZT架构的局限性,从而为优化ZT的应用提供思路。

关键词: 零信任, 身份认证, 权限检验, BeyondCorp, VMware NSX, SDP, 7层零信任方案

Abstract:

As an emerging cybersecurity concept, Zero Trust (ZT) aims at changing the traditional “trust but verify” mode to achieve stricter access control and security defense in networks. The ZT architectures are based on the fundamental premise of not trusting any user, device, or network, and requiring user identity verification and fine-grained authorization control for every access request. First, an elaboration on the concept and core principles of ZT was carried out. Then, the main application scenarios and components of the ZT architectures were introduced, as well as the working principles of these architectures. At the same time, the existing ZT architectures were compared and analyzed, for understanding the specific implementation methods of the ZT concept and providing valuable references for constructing ZT architectures. Finally, the limitations of the ZT architectures were summarized, thereby providing directions for optimizing the application of ZT.

Key words: Zero Trust (ZT), authentication, permission verification, BeyondCorp, VMware NSX, Software-Defined Perimeter (SDP), 7-layer zero-trust scheme

中图分类号: