{"id":2424,"date":"2019-09-18T07:00:21","date_gmt":"2019-09-18T14:00:21","guid":{"rendered":"https:\/\/www.microsoft.com\/tr-tr\/2019\/09\/18\/why-banks-adopt-modern-cybersecurity-zero-trust-model\/"},"modified":"2022-06-28T11:29:53","modified_gmt":"2022-06-28T18:29:53","slug":"why-banks-adopt-modern-cybersecurity-zero-trust-model","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/tr-tr\/microsoft-365\/blog\/2019\/09\/18\/why-banks-adopt-modern-cybersecurity-zero-trust-model\/","title":{"rendered":"Bankalar neden siber g\u00fcvenli\u011fe kar\u015f\u0131 modern bir yakla\u015f\u0131m benimsiyor?\u2014S\u0131f\u0131r G\u00fcven modeli"},"content":{"rendered":"
G\u00fcn\u00fcm\u00fczde bir\u00e7ok banka, verileri k\u00f6t\u00fc ama\u00e7l\u0131 sald\u0131r\u0131lara kar\u015f\u0131 korumak i\u00e7in hala \u201c\u00e7evre g\u00fcvenli\u011fi\u201d olarak da bilinen \u201ckale ve hendek\u201d yakla\u015f\u0131m\u0131na g\u00fcveniyor. Ta\u015f duvarlar, hendekler ve b\u00fcy\u00fck kap\u0131larla korunan orta \u00e7a\u011f kaleleri gibi \u00e7evre g\u00fcvenli\u011fini kullanan bankalar da g\u00fcvenlik duvarlar\u0131, proxy sunucular\u0131, sanal sunucular ve yetkisiz eri\u015fimi \u00f6nlemeye y\u00f6nelik di\u011fer ara\u00e7larla a\u011f \u00e7evrelerini g\u00fc\u00e7lendirmek i\u00e7in y\u00fckl\u00fc miktarlarda yat\u0131r\u0131m yap\u0131yor. \u00c7evre g\u00fcvenli\u011fi, kurumun a\u011f\u0131na girip \u00e7\u0131kan kullan\u0131c\u0131lar\u0131n veri paketlerini ve kimli\u011fini do\u011frulayarak a\u011fa giri\u015f ve \u00e7\u0131k\u0131\u015f noktalar\u0131n\u0131 korur. B\u00f6ylece bu g\u00fc\u00e7lendirilen \u00e7evre i\u00e7indeki etkinli\u011fin nispeten g\u00fcvenli oldu\u011funu varsayar.<\/p>\n
Bilin\u00e7li finans kurumlar\u0131, art\u0131k bu d\u00fc\u015f\u00fcnce \u015feklinin \u00f6tesine ge\u00e7iyor ve S\u0131f\u0131r G\u00fcven modeliyle siber g\u00fcvenli\u011fe kar\u015f\u0131 modern bir yakla\u015f\u0131m benimsiyor. S\u0131f\u0131r G\u00fcven modelinin temel prensibi, varsay\u0131lan olarak \u015firket i\u00e7inden ve d\u0131\u015f\u0131ndan kimseye g\u00fcvenmemek ve eri\u015fim hakk\u0131 vermeden \u00f6nce her ki\u015finin ya da cihaz\u0131n kat\u0131 bi\u00e7imde do\u011frulanmas\u0131n\u0131 gerekli k\u0131lmakt\u0131r.<\/p>\n
Kalenin \u00e7evresi \u00f6nemini korusa da daha g\u00fc\u00e7l\u00fc duvarlara ve daha geni\u015f hendeklere giderek daha fazla yat\u0131r\u0131m yapmak yerine S\u0131f\u0131r G\u00fcven modeli, kimliklere, verilere ve me\u015fhur kalenin i\u00e7indeki cihazlara olan eri\u015fimin y\u00f6netimine kar\u015f\u0131 daha ayr\u0131nt\u0131l\u0131 bir yakla\u015f\u0131m benimser. B\u00f6ylece ister i\u00e7eriden biri k\u00f6t\u00fc ama\u00e7l\u0131 bir \u015fekilde veya dikkatsizce hareket etsin ister kimli\u011fini gizleyen sald\u0131rganlar kale duvarlar\u0131n\u0131 a\u015fs\u0131n, verilere otomatik eri\u015fim verilmez.<\/p>\n
Siber tehditlerin ger\u00e7ekle\u015fme \u015fekli savunman\u0131n ve koruman\u0131n anlam\u0131n\u0131 de\u011fi\u015ftirdi\u011finden, bug\u00fcn\u00fcn kurumsal dijital varl\u0131klar\u0131n\u0131 korumak s\u00f6z konusu oldu\u011funda kale ve hendek yakla\u015f\u0131m\u0131n\u0131n kritik s\u0131n\u0131rlamalar\u0131 vard\u0131r. Bankalar dahil olmak \u00fczere b\u00fcy\u00fck kurumlar, \u00e7al\u0131\u015fanlar\u0131n, m\u00fc\u015fterilerin ve i\u015f ortaklar\u0131n\u0131n hem tesis i\u00e7inde hem de \u00e7evrimi\u00e7i olarak eri\u015fti\u011fi da\u011f\u0131n\u0131k veri ve uygulama a\u011flar\u0131yla u\u011fra\u015f\u0131r. Bu da kalenin \u00e7evresini korumay\u0131 daha zor hale getirir. Hendek d\u00fc\u015fmanlar\u0131 d\u0131\u015far\u0131da tutmada etkili olsa da kimli\u011fi risk alt\u0131nda olan kullan\u0131c\u0131lar ya da kalenin duvarlar\u0131n\u0131n i\u00e7inde gizlice dola\u015fan di\u011fer i\u00e7 tehditler konusunda ayn\u0131 derecede etkili de\u011fildir.<\/p>\n
G\u00fcvenlik a\u00e7\u0131\u011f\u0131 olu\u015fturan \u015fu uygulamalar, g\u00fcvenli\u011fe y\u00f6nelik olarak kale ve hendek yakla\u015f\u0131m\u0131na g\u00fcvenen bankalarda \u00e7ok\u00e7a g\u00f6r\u00fcl\u00fcr:<\/p>\n
S\u0131f\u0131r G\u00fcven yakla\u015f\u0131m\u0131n\u0131n avantajlar\u0131 ayr\u0131nt\u0131l\u0131 belgelere dayan\u0131r<\/a> ve say\u0131s\u0131 giderek artan ger\u00e7ek \u00f6rnekler de bu yakla\u015f\u0131m\u0131n karma\u015f\u0131k siber sald\u0131r\u0131lar\u0131n \u00f6n\u00fcne ge\u00e7ebilece\u011fini g\u00f6steriyor. Fakat bug\u00fcn bir\u00e7ok banka, hala S\u0131f\u0131r G\u00fcven ilkelerinden uzak uygulamalara ba\u011fl\u0131 kal\u0131yor.<\/p>\n Bankalar\u0131n bir S\u0131f\u0131r G\u00fcven modelini benimsemesi g\u00fcvenlik duru\u015flar\u0131n\u0131 g\u00fc\u00e7lendirmelerine yard\u0131mc\u0131 olabilir ve b\u00f6ylece \u00e7al\u0131\u015fanlar ile m\u00fc\u015fterilere daha fazla esneklik tan\u0131yan giri\u015fimleri g\u00fcvenle destekleyebilirler. \u00d6rne\u011fin banka idarecileri, m\u00fc\u015fterilerle ileti\u015fim kuran \u00e7al\u0131\u015fanlar\u0131n (ili\u015fki y\u00f6neticileri ve finans dan\u0131\u015fmanlar\u0131 gibi) masalar\u0131na ba\u011fl\u0131 kalmamalar\u0131n\u0131 ve m\u00fc\u015fterilerle banka tesisleri d\u0131\u015f\u0131nda g\u00f6r\u00fc\u015fmelerini ister. Bug\u00fcn bir\u00e7ok finans kurumu, ka\u011f\u0131t \u00e7\u0131kt\u0131lar gibi analog ara\u00e7larla veya dan\u0131\u015fmanl\u0131klar\u0131n\u0131n statik g\u00f6r\u00fcn\u00fcm\u00fcyle bu co\u011frafi \u00e7evikli\u011fi destekler. Ancak hem banka \u00e7al\u0131\u015fanlar\u0131 hem de m\u00fc\u015fteriler, art\u0131k ger\u00e7ek zamanl\u0131 verilerin kullan\u0131ld\u0131\u011f\u0131 daha dinamik bir deneyim bekliyor.<\/p>\n G\u00fcvenlik konusunda kale ve hendek yakla\u015f\u0131m\u0131na g\u00fcvenen bankalar, fiziksel a\u011f\u0131n d\u0131\u015f\u0131na veri da\u011f\u0131tma konusunda teredd\u00fct ediyor. B\u00f6ylelikle m\u00fc\u015fteri g\u00f6r\u00fc\u015fmeleri banka tesislerinde ger\u00e7ekle\u015fiyorsa<\/em> bankac\u0131lar ve finans dan\u0131\u015fmanlar\u0131, yaln\u0131zca kan\u0131tlanm\u0131\u015f ve disiplinli yat\u0131r\u0131m stratejilerinin dinamik modellerinden yararlanabiliyor.<\/p>\n Bug\u00fcne dek, hareket halindeki bankac\u0131lar ya da finans dan\u0131\u015fmanlar\u0131 i\u00e7in en az\u0131ndan VPN olmadan ger\u00e7ek zamanl\u0131 model g\u00fcncelle\u015ftirmeleri payla\u015fmak veya di\u011fer bankac\u0131lar ya da t\u00fcccarlarla etkin bi\u00e7imde i\u015fbirli\u011fi yapmak olduk\u00e7a zahmetliydi. Evet, bu \u00e7eviklik sa\u011flam yat\u0131r\u0131m kararlar\u0131 ve m\u00fc\u015fteri memnuniyeti konusunda \u00f6nemli bir etkendir. S\u0131f\u0131r G\u00fcven modeli, ili\u015fki y\u00f6neticilerinin ya da analistlerin pazar veri sa\u011flay\u0131c\u0131lar\u0131n\u0131n i\u00e7g\u00f6r\u00fclerinden yararlanmas\u0131na, kendi modelleriyle birle\u015ftirmesine ve diledikleri zaman, diledikleri yerde farkl\u0131 m\u00fc\u015fteri senaryolar\u0131n\u0131 dinamik bi\u00e7imde incelemesine imkan tan\u0131r.<\/p>\n \u0130yi haber \u015fu ki bulut ve S\u0131f\u0131r G\u00fcven mimarisiyle desteklenen bu yeni ak\u0131ll\u0131 g\u00fcvenlik, bankalar i\u00e7in g\u00fcvenlik ve uyumlulu\u011fu kolayla\u015ft\u0131r\u0131p modernle\u015ftirebilir.<\/p>\n Microsoft 365<\/a> ile bankalar, \u00fc\u00e7 temel stratejiyi da\u011f\u0131tarak S\u0131f\u0131r G\u00fcven teknolojisine hemen ad\u0131m atabilir:<\/p>\n Bankalar, ihlal riskini y\u00fczde 99,9 azaltabilen iki fakt\u00f6rl\u00fc veya parolas\u0131z \u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulamas\u0131 (MFA)<\/a> gibi g\u00fc\u00e7l\u00fc kimlik do\u011frulamas\u0131 y\u00f6ntemlerini de da\u011f\u0131tabilir. Microsoft Authenticator<\/a> t\u00fcm Azure AD ba\u011fl\u0131 uygulamalar\u0131 i\u00e7in an\u0131nda iletme bildirimlerini, bir kerelik ge\u00e7i\u015f kodlar\u0131n\u0131 ve biyometrik sistemleri destekler.<\/p>\n Banka \u00e7al\u0131\u015fanlar\u0131, Windows cihazlar\u0131na y\u00f6nelik olarak cihazlarda oturum a\u00e7mak i\u00e7in g\u00fcvenli ve kullan\u0131m\u0131 kolay y\u00fcz tan\u0131ma \u00f6zelli\u011fi Windows Hello<\/a>\u2019yu kullanabilir. Son olarak bankalar, uygun eri\u015fim ilkelerini uygulayarak kaynaklar\u0131 \u015f\u00fcpheli isteklere kar\u015f\u0131 korumak i\u00e7in Azure AD Ko\u015fullu Eri\u015fim<\/a>\u2019i kullanabilir. Microsoft Intune ve Azure AD, e-posta ve \u015firket i\u00e7i uygulamalar<\/a> dahil olmak \u00fczere Office 365 hizmetlerine yaln\u0131zca y\u00f6netilen ve uyumlu cihazlar\u0131n eri\u015febilmesini sa\u011flamak i\u00e7in birlikte \u00e7al\u0131\u015f\u0131r. Intune ile cihazlar\u0131n uyumluluk durumunu da de\u011ferlendirebilirsiniz. Ko\u015fullu eri\u015fim ilkesi, kullan\u0131c\u0131 verilere eri\u015fmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131nda cihaz\u0131n uyumluluk durumuna ba\u011fl\u0131 olarak uygulan\u0131r.<\/p>\n <\/p>\n Ko\u015fullu eri\u015fim \u00e7izimi.<\/em><\/p>\n <\/p>\n Microsoft 365 g\u00fcvenlik merkezi.<\/em><\/p>\n <\/p>\n S\u0131n\u0131fland\u0131rma ve koruma senaryosu \u00f6rne\u011fi.<\/em><\/p>\n Microsoft 365, siber su\u00e7larla m\u00fccadele i\u00e7in gereken g\u00f6r\u00fcn\u00fcrl\u00fck, \u00f6l\u00e7ek ve makine zekas\u0131ndan yararlanarak modern bir S\u0131f\u0131r G\u00fcven mimarisinde g\u00fcvenlik y\u00f6netimini basitle\u015ftirmeye yard\u0131mc\u0131 olur.<\/p>\n Modern \u201ckalenizi\u201d nas\u0131l koruyaca\u011f\u0131n\u0131z\u0131 d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z bir S\u0131f\u0131r G\u00fcven ortam\u0131, modern siber g\u00fcvenlik tehditleri i\u00e7in ideal \u00e7\u00f6z\u00fcmd\u00fcr. Bir S\u0131f\u0131r G\u00fcven ortam\u0131, kimin neye, nerede ve nas\u0131l eri\u015fti\u011finin ve hatta eri\u015fim izninin gerekli olup olmad\u0131\u011f\u0131n\u0131n bile her a\u00e7\u0131dan kontrol edilmesini gerektirir.<\/p>\n Microsoft 365 g\u00fcvenlik ve uyumluluk \u00f6zellikleri<\/a> kurumlar\u0131n bir kullan\u0131c\u0131ya ya da cihaza g\u00fcvenmeden \u00f6nce do\u011frulama yapmas\u0131na yard\u0131mc\u0131 olur. Microsoft 365 ayr\u0131ca eksiksiz ekip \u00e7al\u0131\u015fmas\u0131 ve \u00fcretkenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> sunar. Bunlar\u0131n t\u00fcm\u00fc g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda Microsoft 365, banka idarecilerinin m\u00fc\u015fterilere ve yenili\u011fe odaklanmas\u0131na yard\u0131mc\u0131 olmak i\u00e7in kapsaml\u0131 bir \u00e7\u00f6z\u00fcm sunar.<\/p>\n","protected":false},"excerpt":{"rendered":" G\u00fcn\u00fcm\u00fczde bir\u00e7ok banka, verileri k\u00f6t\u00fc ama\u00e7l\u0131 sald\u0131r\u0131lara kar\u015f\u0131 korumak i\u00e7in hala \u201c\u00e7evre g\u00fcvenli\u011fi\u201d olarak da bilinen \u201ckale ve hendek\u201d yakla\u015f\u0131m\u0131na g\u00fcveniyor. Ta\u015f duvarlar, hendekler ve b\u00fcy\u00fck kap\u0131larla korunan orta \u00e7a\u011f kaleleri gibi \u00e7evre g\u00fcvenli\u011fini kullanan bankalar da g\u00fcvenlik duvarlar\u0131, proxy sunucular\u0131, sanal sunucular ve yetkisiz eri\u015fimi \u00f6nlemeye y\u00f6nelik di\u011fer ara\u00e7larla a\u011f \u00e7evrelerini g\u00fc\u00e7lendirmek i\u00e7in y\u00fckl\u00fc<\/p>\n","protected":false},"author":0,"featured_media":2428,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[149],"product":[151],"audience":[198,196],"tags":[222,260,228],"coauthors":[],"class_list":["post-2424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","product-microsoft-365","audience-banking","audience-enterprise","tag-azure","tag-windows-hello","tag-zero-trust-security"],"yoast_head":"\nMicrosoft 365 banka g\u00fcvenli\u011fini d\u00f6n\u00fc\u015ft\u00fcrmeye yard\u0131mc\u0131 olur<\/h3>\n
\n
\n
\n
S\u0131f\u0131r G\u00fcven ile g\u00fcvenlik y\u00f6netimini basitle\u015ftirin<\/h3>\n