Affiliation:
1. Department of Convergence Security, Kangwon National University, Chuncheon-si 24341, Republic of Korea
Abstract
The rapid expansion of remote work following the COVID-19 pandemic has necessitated the development of more robust and secure endpoint device security solutions. Companies have begun to adopt the zero trust security concept as an alternative to traditional network boundary security measures, which requires that every device and user be considered untrustworthy until proven otherwise. Despite the potential benefits of implementing zero trust, the stringent security measures can inadvertently lead to low availability by denying access to legitimate users or limiting their ability to access necessary resources. To address this challenge, we propose a risk-scoring algorithm that balances confidentiality and availability by evaluating the user’s impact on resources. Our contributions include (1) summarizing the limitations of existing risk scoring systems in companies that implement zero trust, (2) proposing a dynamic importance metric that measures the importance of resources accessible to users within zero trust systems, and (3) introducing a risk-scoring algorithm that employs the dynamic importance metric to enhance both security and availability in zero trust environments. By incorporating the dynamic importance metric, our proposed algorithm provides a more accurate representation of risk, leading to better security decisions and improved resource availability for legitimate users. This proposal aims to help organizations achieve a more balanced approach to endpoint device security, addressing the unique challenges posed by the increasing prevalence of remote work.
Funder
Insitute of Information & Communications Technology Planning & Evaluation
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference26 articles.
1. An affordance perspective of team collaboration and enforced working from home during COVID-19;Waizenegger;Eur. J. Inf. Syst.,2020
2. Working from home before, during and after the Covid-19 pandemic: Implications for workers and organisations;Green;N. Z. J. Employ. Relations,2020
3. Cloud-based zero trust access control policy: An approach to support work-from-home driven by COVID-19 pandemic;Mandal;New Gener. Comput.,2021
4. Kindervag, J., and Balaouras, S. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Res., 3.
5. Rose, S., Borchert, O., Mitchell, S., and Connelly, S. (2020). Zero Trust Architecture, Technical Report.