{"id":2422,"date":"2019-09-18T07:00:21","date_gmt":"2019-09-18T14:00:21","guid":{"rendered":"https:\/\/www.microsoft.com\/lv-lv\/2019\/09\/18\/why-banks-adopt-modern-cybersecurity-zero-trust-model\/"},"modified":"2022-06-28T11:15:03","modified_gmt":"2022-06-28T18:15:03","slug":"why-banks-adopt-modern-cybersecurity-zero-trust-model","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/lv-lv\/microsoft-365\/blog\/2019\/09\/18\/why-banks-adopt-modern-cybersecurity-zero-trust-model\/","title":{"rendered":"K\u0101p\u0113c bankas ievie\u0161 m\u016bsdien\u012bgu pieeju kiberdro\u0161\u012bbai \u2014 nulles uzticam\u012bbas modeli"},"content":{"rendered":"

Daudzas bankas \u0161odien joproj\u0101m pa\u013caujas uz “pils un gr\u0101vja” pieeju, kas tiek d\u0113v\u0113ta ar\u012b par “perimetra dro\u0161\u012bbu”, lai aizsarg\u0101tu datus pret \u013caunpr\u0101t\u012bgiem uzbrukumiem. T\u0101pat k\u0101 viduslaiku pilis, kas ir aizsarg\u0101tas ar akmens sien\u0101m, gr\u0101vjiem un v\u0101rtiem, bankas, kas izmanto perimetra dro\u0161\u012bbu, daudz iegulda, lai stiprin\u0101tu to t\u012bkla perimetrus ar ugunsm\u016briem, starpniekserveriem, ur\u0137uslazdiem un citiem ielau\u0161an\u0101s nov\u0113r\u0161anas r\u012bkiem. Perimetra dro\u0161\u012bba aizsarg\u0101 ieejas un izejas punktus t\u012bkl\u0101, verific\u0113jot to lietot\u0101ju datu paketes un identit\u0101ti, kas iek\u013c\u016bst un iziet no organiz\u0101cijas t\u012bkla, un p\u0113c tam pie\u0146em, ka aktivit\u0101te aizsarg\u0101taj\u0101 perimetr\u0101 ir relat\u012bvi dro\u0161a.<\/p>\n

Pieredz\u0113ju\u0161as finan\u0161u iest\u0101des tagad atsak\u0101s no \u0161\u012bs paradigmas un ievie\u0161 m\u016bsdien\u012bgu pieeju kiberdro\u0161\u012bbai \u2014 nulles uzticam\u012bbas modeli. Nulles uzticam\u012bbas mode\u013ca galvenais princips ir p\u0113c noklus\u0113juma neuztic\u0113ties nevienam \u2014 iek\u0161\u0113jam vai \u0101r\u0113jam lietot\u0101jam \u2014, un pirms piek\u013cuves pie\u0161\u0137ir\u0161anas oblig\u0101ti j\u0101veic katras personas vai ier\u012bces verifik\u0101cija.<\/p>\n

Pils perimetrs joproj\u0101m ir svar\u012bgs, bet, t\u0101 viet\u0101, lai vienk\u0101r\u0161i ieguld\u012btu liel\u0101kas invest\u012bcijas sp\u0113c\u012bg\u0101ku sienu un plat\u0101ku gr\u0101vju rad\u012b\u0161anai, nulles uzticam\u012bbas modelis pied\u0101v\u0101 nians\u0113tu pieeju identit\u0101\u0161u, datu un ier\u012b\u010du p\u0101rvald\u012bbai \u0161aj\u0101 nosac\u012btaj\u0101 pil\u012b. T\u0101tad, neatkar\u012bgi no t\u0101, vai k\u0101ds iek\u0161\u0113jais lietot\u0101js darbojas \u013caunpr\u0101t\u012bgi vai pavir\u0161i, vai ar\u012b mask\u0113ti uzbruc\u0113ji tiek p\u0101ri pils sien\u0101m, netiek pie\u0161\u0137irta autom\u0101tiska piek\u013cuve datiem.<\/p>\n

Pils un gr\u0101vja pieejas ierobe\u017eojumi<\/h3>\n

Attiec\u012bb\u0101 uz m\u016bsdien\u012bga uz\u0146\u0113muma digit\u0101lo l\u012bdzek\u013cu aizsardz\u012bbu, pils un gr\u0101vja pieejai ir kritiski svar\u012bgi ierobe\u017eojumi, jo kiberapdraud\u0113jumu att\u012bst\u012bba ir radik\u0101li main\u012bjusi situ\u0101ciju. Lielas organiz\u0101cijas, tostarp bankas, darbojas ar izkais\u012btiem datu t\u012bkliem un lietojumprogramm\u0101m, kam piek\u013c\u016bst darbinieki, klienti un partneri kl\u0101tien\u0113 vai tie\u0161saist\u0113. T\u0101d\u0113j\u0101di pils perimetru aizsardz\u012bba ir apgr\u016btin\u0101ta. Pat tad, ja gr\u0101vis efekt\u012bvi attur ienaidniekus, tas neko \u012bsti nepal\u012bdz lietot\u0101jiem, kuriem ir apdraud\u0113tas identit\u0101tes vai citi iek\u0161\u0113ji apdraud\u0113jumi, kas jau atrodas pils sien\u0101s.<\/p>\n

T\u0101l\u0101k nor\u0101d\u012bt\u0101s metodes rada ievainojam\u012bbas riskus, un t\u0101s ir izplat\u012btas bank\u0101s, kas izmanto pils un gr\u0101vja pieeju dro\u0161\u012bbai.<\/p>\n