{"id":2424,"date":"2019-09-18T07:00:21","date_gmt":"2019-09-18T14:00:21","guid":{"rendered":"https:\/\/www.microsoft.com\/tr-tr\/2019\/09\/18\/why-banks-adopt-modern-cybersecurity-zero-trust-model\/"},"modified":"2022-06-28T11:29:53","modified_gmt":"2022-06-28T18:29:53","slug":"why-banks-adopt-modern-cybersecurity-zero-trust-model","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/tr-tr\/microsoft-365\/blog\/2019\/09\/18\/why-banks-adopt-modern-cybersecurity-zero-trust-model\/","title":{"rendered":"Bankalar neden siber g\u00fcvenli\u011fe kar\u015f\u0131 modern bir yakla\u015f\u0131m benimsiyor?\u2014S\u0131f\u0131r G\u00fcven modeli"},"content":{"rendered":"

G\u00fcn\u00fcm\u00fczde bir\u00e7ok banka, verileri k\u00f6t\u00fc ama\u00e7l\u0131 sald\u0131r\u0131lara kar\u015f\u0131 korumak i\u00e7in hala \u201c\u00e7evre g\u00fcvenli\u011fi\u201d olarak da bilinen \u201ckale ve hendek\u201d yakla\u015f\u0131m\u0131na g\u00fcveniyor. Ta\u015f duvarlar, hendekler ve b\u00fcy\u00fck kap\u0131larla korunan orta \u00e7a\u011f kaleleri gibi \u00e7evre g\u00fcvenli\u011fini kullanan bankalar da g\u00fcvenlik duvarlar\u0131, proxy sunucular\u0131, sanal sunucular ve yetkisiz eri\u015fimi \u00f6nlemeye y\u00f6nelik di\u011fer ara\u00e7larla a\u011f \u00e7evrelerini g\u00fc\u00e7lendirmek i\u00e7in y\u00fckl\u00fc miktarlarda yat\u0131r\u0131m yap\u0131yor. \u00c7evre g\u00fcvenli\u011fi, kurumun a\u011f\u0131na girip \u00e7\u0131kan kullan\u0131c\u0131lar\u0131n veri paketlerini ve kimli\u011fini do\u011frulayarak a\u011fa giri\u015f ve \u00e7\u0131k\u0131\u015f noktalar\u0131n\u0131 korur. B\u00f6ylece bu g\u00fc\u00e7lendirilen \u00e7evre i\u00e7indeki etkinli\u011fin nispeten g\u00fcvenli oldu\u011funu varsayar.<\/p>\n

Bilin\u00e7li finans kurumlar\u0131, art\u0131k bu d\u00fc\u015f\u00fcnce \u015feklinin \u00f6tesine ge\u00e7iyor ve S\u0131f\u0131r G\u00fcven modeliyle siber g\u00fcvenli\u011fe kar\u015f\u0131 modern bir yakla\u015f\u0131m benimsiyor. S\u0131f\u0131r G\u00fcven modelinin temel prensibi, varsay\u0131lan olarak \u015firket i\u00e7inden ve d\u0131\u015f\u0131ndan kimseye g\u00fcvenmemek ve eri\u015fim hakk\u0131 vermeden \u00f6nce her ki\u015finin ya da cihaz\u0131n kat\u0131 bi\u00e7imde do\u011frulanmas\u0131n\u0131 gerekli k\u0131lmakt\u0131r.<\/p>\n

Kalenin \u00e7evresi \u00f6nemini korusa da daha g\u00fc\u00e7l\u00fc duvarlara ve daha geni\u015f hendeklere giderek daha fazla yat\u0131r\u0131m yapmak yerine S\u0131f\u0131r G\u00fcven modeli, kimliklere, verilere ve me\u015fhur kalenin i\u00e7indeki cihazlara olan eri\u015fimin y\u00f6netimine kar\u015f\u0131 daha ayr\u0131nt\u0131l\u0131 bir yakla\u015f\u0131m benimser. B\u00f6ylece ister i\u00e7eriden biri k\u00f6t\u00fc ama\u00e7l\u0131 bir \u015fekilde veya dikkatsizce hareket etsin ister kimli\u011fini gizleyen sald\u0131rganlar kale duvarlar\u0131n\u0131 a\u015fs\u0131n, verilere otomatik eri\u015fim verilmez.<\/p>\n

Kale ve hendek yakla\u015f\u0131m\u0131n\u0131n s\u0131n\u0131rlamalar\u0131<\/h3>\n

Siber tehditlerin ger\u00e7ekle\u015fme \u015fekli savunman\u0131n ve koruman\u0131n anlam\u0131n\u0131 de\u011fi\u015ftirdi\u011finden, bug\u00fcn\u00fcn kurumsal dijital varl\u0131klar\u0131n\u0131 korumak s\u00f6z konusu oldu\u011funda kale ve hendek yakla\u015f\u0131m\u0131n\u0131n kritik s\u0131n\u0131rlamalar\u0131 vard\u0131r. Bankalar dahil olmak \u00fczere b\u00fcy\u00fck kurumlar, \u00e7al\u0131\u015fanlar\u0131n, m\u00fc\u015fterilerin ve i\u015f ortaklar\u0131n\u0131n hem tesis i\u00e7inde hem de \u00e7evrimi\u00e7i olarak eri\u015fti\u011fi da\u011f\u0131n\u0131k veri ve uygulama a\u011flar\u0131yla u\u011fra\u015f\u0131r. Bu da kalenin \u00e7evresini korumay\u0131 daha zor hale getirir. Hendek d\u00fc\u015fmanlar\u0131 d\u0131\u015far\u0131da tutmada etkili olsa da kimli\u011fi risk alt\u0131nda olan kullan\u0131c\u0131lar ya da kalenin duvarlar\u0131n\u0131n i\u00e7inde gizlice dola\u015fan di\u011fer i\u00e7 tehditler konusunda ayn\u0131 derecede etkili de\u011fildir.<\/p>\n

G\u00fcvenlik a\u00e7\u0131\u011f\u0131 olu\u015fturan \u015fu uygulamalar, g\u00fcvenli\u011fe y\u00f6nelik olarak kale ve hendek yakla\u015f\u0131m\u0131na g\u00fcvenen bankalarda \u00e7ok\u00e7a g\u00f6r\u00fcl\u00fcr:<\/p>\n