Paper
2 March 2023 Security in remote access, based on zero trust model concepts and SSH authentication with signed certificates
Author Affiliations +
Proceedings Volume 12493, Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI; 124932T (2023) https://doi.org/10.1117/12.2643058
Event: Advanced Topics in Optoelectronics, Microelectronics and Nanotechnologies 2022, 2022, Constanta, Romania
Abstract
This paper aims to resume the information on the various ways in which security can be achieved when it comes to accessing external resources from the outside through company devices or personal devices. When planning security policies, it is essential to start with the idea that anything outside is exposed to the risk of infection. We will analyze the Zero Trust model and other security concepts in order to use them for remote access. The model has been designed to adapt to the modern needs of the workforce and employers, including remote work in terms of maximum cyber security, minimizing the risk of resource exploitation (people, devices, applications or data). In order to make the transition to such a model, this paper will implement and test a solution for remote management of resources (applications, servers), which implements some of the principles of Zero Trust architectures, starting from the classic version SSH (Secure Shell) access. The solution involves accessing, securing and authorizing a secure virtual machine via SSH, and then securing access to production resources. The technical mechanism by which these operations are performed presupposes that after authentication on the buffer machine a user certificate is automatically requested which will be signed by a certification authority. This certificate contains the group to which the operator belongs so that, by presenting this certificate, it is allowed to authenticate, authorize and audit access to the resources that will be managed by the user in that session.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Cristina-Raluca Iță, Rodica-Claudia Constantinescu, Alexandru Vlădescu, and Bogdan Alexandrescu "Security in remote access, based on zero trust model concepts and SSH authentication with signed certificates", Proc. SPIE 12493, Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI, 124932T (2 March 2023); https://doi.org/10.1117/12.2643058
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Network security

Information security

Data storage

Networks

Back to Top