{"id":3735,"date":"2023-04-10T19:45:50","date_gmt":"2023-04-10T19:45:50","guid":{"rendered":"https:\/\/bulutistan.com\/blog\/?p=3735"},"modified":"2024-01-20T10:33:46","modified_gmt":"2024-01-20T10:33:46","slug":"zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma","status":"publish","type":"post","link":"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/","title":{"rendered":"Zero Trust ve S\u0131f\u0131r G\u00fcven Mimarisi \u0130le \u015eirket \u0130\u00e7i G\u00fcvenli\u011fi Art\u0131rma"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Modern i\u015fletmeler, \u00e7al\u0131\u015fmak i\u00e7in bir\u00e7ok teknolojik sisteme ve hizmete g\u00fcvenir. Karma\u015f\u0131k bir teknoloji y\u0131\u011f\u0131n\u0131, \u015firketlerin dijital \u00e7a\u011fda t\u00fcketicilerin ihtiya\u00e7lar\u0131na ayak uydurmas\u0131na yard\u0131mc\u0131 olur, ancak bu ayn\u0131 zamanda siber su\u00e7lular\u0131n yararlanabilece\u011fi daha fazla a\u00e7\u0131k kap\u0131 olu\u015fturur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Siber g\u00fcvenli\u011fe y\u00f6nelik geleneksel yakla\u015f\u0131mlar, halihaz\u0131rda a\u011f\u0131n i\u00e7inde bulunan t\u00fcm cihaz ve kullan\u0131c\u0131lar\u0131n g\u00fcvenilir oldu\u011funu ve eri\u015fim i\u00e7in tamamen temizlendi\u011fini varsayarken, \u015firketin a\u011f \u00e7evresini sa\u011flam bir \u015fekilde korumaya \u00f6nem verir. Ancak, son birka\u00e7 y\u0131lda siber sald\u0131r\u0131lardaki \u00f6nemli art\u0131\u015flarla birlikte, bu yakla\u015f\u0131m art\u0131k yeterli olmamaktad\u0131r.<\/span><\/p>\n<p>Peki \u015firketler \u015fimdi ne yapacak?<\/p>\n<p><span style=\"font-weight: 400;\">K\u00fc\u00e7\u00fck ve orta \u00f6l\u00e7ekli i\u015fletmelerin siber su\u00e7lular\u0131n bir ad\u0131m \u00f6n\u00fcnde olmas\u0131na yard\u0131mc\u0131 olan bir g\u00fcvenlik stratejisi olan s\u0131f\u0131r g\u00fcven modelini duymu\u015f olabilirsiniz. Bu t\u00fcr bir g\u00fcvenlik mimarisi, bilgisayar korsanlar\u0131n\u0131n yaln\u0131zca bir \u015firketin a\u011f\u0131na girmesini zorla\u015ft\u0131rmakla kalmaz, ayn\u0131 zamanda girseler bile hesap ve uygulamalara tam eri\u015fim elde etmelerini de engelleyebilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bulutistan hizmetlerinin detaylar\u0131na ula\u015fmak i\u00e7in <\/span><a href=\"https:\/\/bulutistan.com\/cloud\/\"><span style=\"font-weight: 400;\">t\u0131klay\u0131n\u0131z<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2 id=\"zero-trust-nedir\">Zero Trust Nedir?<\/h2>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven yani zero trust, bir ihlalin ka\u00e7\u0131n\u0131lmaz oldu\u011fu varsay\u0131m\u0131na dayal\u0131 olarak korumalar\u0131 en \u00fcst d\u00fczeye \u00e7\u0131karan BT sistem uygulamas\u0131 ve tasar\u0131m\u0131 i\u00e7in modern bir g\u00fcvenlik mimarisidir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven, g\u00fcvenli\u011fe y\u00f6nelik geleneksel &#8220;g\u00fcven ama do\u011frula&#8221; yakla\u015f\u0131m\u0131n\u0131n \u00f6tesine ge\u00e7er ve bunun yerine &#8220;asla g\u00fcvenme, her zaman do\u011frula&#8221; modelini kullan\u0131r; bu, bir a\u011fa ba\u011fl\u0131 olsalar bile hi\u00e7bir cihaza, uygulamaya veya kullan\u0131c\u0131ya varsay\u0131lan olarak g\u00fcvenilmedi\u011fi anlam\u0131na gelir.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bir \u015firketin g\u00fcvenlik duvar\u0131ndaki herhangi bir \u015feyin veya herhangi birinin g\u00fcvenli oldu\u011funu varsaymak yerine s\u0131f\u0131r g\u00fcven yakla\u015f\u0131m\u0131, her bir a\u011f eri\u015fim iste\u011fini, sanki a\u00e7\u0131k veya bilinmeyen bir kaynaktan geliyormu\u015f gibi tam olarak do\u011frular. Ek olarak, t\u00fcm eri\u015fim en aza indirilir. Bir \u015firkette daha y\u00fcksek pozisyonlara sahip olanlar da dahil olmak \u00fczere t\u00fcm kullan\u0131c\u0131lara &#8220;yeterince eri\u015fim&#8221; politikas\u0131 uygulan\u0131r. Ayr\u0131ca, veri toplama ve analiz, meydana gelen herhangi bir anormalli\u011fi tespit etmek ve bunlara m\u00fcdahale etmek i\u00e7in kullan\u0131l\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven modelinde, bir \u015firketin teknoloji y\u0131\u011f\u0131n\u0131n\u0131n her bir bile\u015fenine kendi g\u00fcvenlik \u00e7evresi verilir. Bu, tek bir oturum a\u00e7ma ile t\u00fcm a\u011fa eri\u015fim sa\u011flayan geleneksel kapsaml\u0131 g\u00fcvenlik altyap\u0131s\u0131ndan farkl\u0131d\u0131r. Bu segmentlere ayr\u0131lm\u0131\u015f ve kimli\u011fi do\u011frulanm\u0131\u015f yakla\u015f\u0131m\u0131n nedeni, bir hesaba veya uygulamaya s\u0131z\u0131lsa bile bir siber su\u00e7lunun \u015firket a\u011f\u0131n\u0131n geri kalan\u0131na eri\u015femeyecek olmas\u0131 ve b\u00f6ylece bir ihlalin etkilerinin en aza indirilmesidir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A\u011f g\u00fcvenli\u011fine y\u00f6nelik bu proaktif ve uyarlanabilir yakla\u015f\u0131m, \u00f6zellikle hibrit ve uzaktan \u00e7al\u0131\u015fman\u0131n yayg\u0131n oldu\u011fu ve \u00e7e\u015fitli konumlardaki kullan\u0131c\u0131lar\u0131n bir \u015firketin a\u011f\u0131na eri\u015fmesine yol a\u00e7t\u0131\u011f\u0131 bir \u00e7a\u011fda, geleneksel BT g\u00fcvenlik modellerine k\u0131yasla s\u00fcrekli geli\u015fen siber ortama daha iyi ayak uydurabilir.<\/span><\/p>\n<h2 id=\"sifir-guvenin-tarihi\">S\u0131f\u0131r G\u00fcvenin Tarihi<\/h2>\n<p><span style=\"font-weight: 400;\">&#8220;S\u0131f\u0131r g\u00fcven&#8221; terimi ilk olarak 1994 y\u0131l\u0131nda Sterling \u00dcniversitesi&#8217;nde felsefe alan\u0131nda doktora \u00f6\u011frencisi olan Stephen Paul Marsh taraf\u0131ndan kullan\u0131lm\u0131\u015ft\u0131r. Tezinde g\u00fcveni, insan fakt\u00f6rlerinin veya muhakeme ve eti\u011fin \u00f6tesine ge\u00e7en sonlu ve matematiksel bir nicelik olarak tan\u0131mlam\u0131\u015ft\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">15 y\u0131l\u0131 a\u015fk\u0131n bir s\u00fcre sonra, &#8220;s\u0131f\u0131r g\u00fcven&#8221; kavram\u0131 ilk olarak bilgisayar ve a\u011f g\u00fcvenli\u011fine Forrester Research&#8217;ten siber g\u00fcvenlik uzman\u0131 John Kindervag taraf\u0131ndan uygulanm\u0131\u015ft\u0131r. Bu terimi, &#8220;asla g\u00fcvenme, her zaman do\u011frula&#8221; slogan\u0131n\u0131 olu\u015fturarak, \u015firketlerdeki kat\u0131 siber g\u00fcvenlik protokollerini ve eri\u015fim kontrol\u00fcn\u00fc tan\u0131mlamak i\u00e7in kullanm\u0131\u015ft\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Google, 2009 y\u0131l\u0131nda s\u0131f\u0131r g\u00fcven g\u00fcvenlik modelini uygulayan ilk \u015firket olmu\u015ftur. O zamandan beri, mobil ve bulut hizmetlerinin i\u015fletmeler taraf\u0131ndan giderek daha fazla benimsenmesi, zero trust g\u00fcvenlik modellerinin yayg\u0131nl\u0131\u011f\u0131n\u0131n artmas\u0131na yol a\u00e7m\u0131\u015ft\u0131r.\u00a0<\/span><\/p>\n<h2 id=\"sifir-guven-vs-geleneksel-bt-ag-guvenligi\">S\u0131f\u0131r G\u00fcven vs Geleneksel BT A\u011f G\u00fcvenli\u011fi<\/h2>\n<p><span style=\"font-weight: 400;\">Geleneksel BT g\u00fcvenlik yakla\u015f\u0131mlar\u0131, bir kullan\u0131c\u0131n\u0131n veya cihaz\u0131n nereden geldi\u011fine \u00e7ok de\u011fer verir; bu, konumun veya IP adresinin do\u011frulanmadan yasal oldu\u011funa g\u00fcvenildi\u011fini varsayar. \u00d6te yandan, zero trust g\u00fcvenli\u011fi hi\u00e7bir zaman herhangi bir d\u00fczeyde g\u00fcven sa\u011flamaz. Herhangi bir sisteme eri\u015fim vermeden \u00f6nce \u00f6nemli \u00f6l\u00e7\u00fcde kimlik do\u011frulamas\u0131 gerektirir ve yaln\u0131zca bir ki\u015finin i\u015fini tamamlamas\u0131 i\u00e7in gereken minimum eri\u015fimi sa\u011flar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Daha \u00f6nceki siber g\u00fcvenlik en iyi uygulamalar\u0131 kavramlar\u0131nda, &#8220;castle-and-moat&#8221; modeli BT g\u00fcvenli\u011fi i\u00e7in standartt\u0131. Bu model, a\u011f d\u0131\u015f\u0131ndaki herkesin verilere eri\u015fmesini engelledi, ancak a\u011f i\u00e7indeki herkese tam eri\u015fim sa\u011flad\u0131. Bir kullan\u0131c\u0131 veya cihaz a\u011fa girmek i\u00e7in a\u011f \u00e7evresini ge\u00e7ti\u011finde, \u015firketin a\u011f\u0131ndaki t\u00fcm uygulama ve verilere serbest\u00e7e eri\u015febildi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">BT g\u00fcvenli\u011fine y\u00f6nelik bu daha do\u011frudan yakla\u015f\u0131m, daha h\u0131zl\u0131 ve daha geni\u015f eri\u015fim sa\u011flayarak \u00e7al\u0131\u015fanlar\u0131n i\u015fini azaltt\u0131\u011f\u0131 i\u00e7in \u00e7ekici g\u00f6r\u00fcnebilir, ancak \u00f6nemli siber g\u00fcvenlik a\u00e7\u0131klar\u0131 yarat\u0131r. Bir bilgisayar korsan\u0131, bir castle-and-moat sisteminde bir \u015firketin a\u011f \u00e7evresine s\u0131zarsa, \u015firketin t\u00fcm veri ve hesaplar\u0131na s\u0131n\u0131rs\u0131z eri\u015fim elde eder. S\u0131f\u0131r g\u00fcven, bir \u00e7al\u0131\u015fan belirli bir uygulamaya veya hesaba her eri\u015fmek istedi\u011finde benzersiz oturum a\u00e7ma ve kimlik do\u011frulama i\u015flemleri gerektirse de, bu yava\u015flama, i\u015fletmeye sa\u011flad\u0131\u011f\u0131 ek korumaya fazlas\u0131yla de\u011ferdir.<\/span><\/p>\n<h2 id=\"zero-trusti-benimse\">Zero Trust&#8217;\u0131 Benimse<\/h2>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven, siber tehditlere kar\u015f\u0131 dayan\u0131kl\u0131l\u0131\u011f\u0131n\u0131 art\u0131rmas\u0131 gereken \u015firketler i\u00e7indir. Baz\u0131lar\u0131 i\u00e7in, y\u00f6neticilerin kullan\u0131c\u0131lar ve varl\u0131klar \u00fczerinde \u00e7ok fazla kontrole sahip olmad\u0131\u011f\u0131 ve onlar\u0131 etkili bir \u015fekilde koruyamad\u0131\u011f\u0131 \u00e7evrimi\u00e7i alanda ger\u00e7ekle\u015fen b\u00fcy\u00fck miktarda ticari faaliyet nedeniyle bir zorunluluktur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven mimarisinin avantajlar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/span><\/p>\n<p><b>Geli\u015fmi\u015f g\u00fcvenlik <\/b><span style=\"font-weight: 400;\">\u2013 Zero trust g\u00fcvenlik yakla\u015f\u0131mlar\u0131, yetkisiz eri\u015fimin \u00f6nlenmesine ve d\u0131\u015f ve i\u00e7 tehditlere kar\u015f\u0131 korunmaya yard\u0131mc\u0131 olur.<\/span><\/p>\n<p><strong>\u0130yile\u015ftirilmi\u015f g\u00f6r\u00fcn\u00fcrl\u00fck<\/strong><span style=\"font-weight: 400;\"> \u2013 Zero trust g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, ortam\u0131n\u0131z genelinde kullan\u0131c\u0131 ve cihaz eri\u015fimine ili\u015fkin daha fazla g\u00f6r\u00fcn\u00fcrl\u00fck sa\u011flar. Bu, \u015f\u00fcpheli etkinliklerin ve potansiyel tehditlerin ger\u00e7ek zamanl\u0131 olarak belirlenmesine yard\u0131mc\u0131 olur.<\/span><\/p>\n<p><b>Azalt\u0131lm\u0131\u015f risk<\/b><span style=\"font-weight: 400;\"> \u2013 \u0130\u015fletmeler, zero trust g\u00fcvenlik modeli uygulayarak veri ihlalleri ve di\u011fer siber sald\u0131r\u0131 risklerini azaltabilir.<\/span><\/p>\n<p><b>Artan verimlilik<\/b><span style=\"font-weight: 400;\"> \u2013 Zero trust g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, kimlik do\u011frulama ve yetkilendirme s\u00fcre\u00e7lerini kolayla\u015ft\u0131rmaya yard\u0131mc\u0131 olabilir, bu da verimlili\u011fin ve \u00fcretkenli\u011fin artmas\u0131na neden olabilir.<\/span><\/p>\n<p><b>Geli\u015ftirilmi\u015f uyumluluk<\/b><span style=\"font-weight: 400;\"> \u2013 Zero trust g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, kapsaml\u0131 g\u00fcvenlik izleme ve raporlama sa\u011flayarak i\u015fletmelerin uyumluluk gereksinimlerini kar\u015f\u0131lamas\u0131na yard\u0131mc\u0131 olabilir.<\/span><\/p>\n<h2 id=\"zero-trust-guvenliginin-temel-ilkeleri\">Zero Trust G\u00fcvenli\u011finin Temel \u0130lkeleri<\/h2>\n<p><span style=\"font-weight: 400;\">\u015eirketlerin verileri olabildi\u011fince g\u00fcvenli tutmak i\u00e7in izlemesi gereken zero trust g\u00fcvenli\u011finin be\u015f temel ilkesi vard\u0131r. Bunlar a\u015fa\u011f\u0131daki \u015fekildedir:<\/span><\/p>\n<h3 id=\"1-en-kotusunu-varsayin\">1. En k\u00f6t\u00fcs\u00fcn\u00fc varsay\u0131n<\/h3>\n<p><span style=\"font-weight: 400;\">En k\u00f6t\u00fcs\u00fcn\u00fc varsaymak, t\u00fcm zero trust g\u00fcvenlik sistemlerinin temelidir. A\u011f\u0131n\u0131za eri\u015fmeye \u00e7al\u0131\u015fan cihaz ve kullan\u0131c\u0131lar s\u00f6z konusu oldu\u011funda, masumiyeti kan\u0131tlanana kadar herkesi su\u00e7lu olarak kabul etmeniz gerekir.<\/span><\/p>\n<h3 id=\"2-dahili-ve-harici-ag-tehditlerinin-sabit-oldugunu-kabul-edin\">2. Dahili ve harici a\u011f tehditlerinin sabit oldu\u011funu kabul edin<\/h3>\n<p><span style=\"font-weight: 400;\">Geleneksel siber g\u00fcvenlik modelleri, bir BT a\u011f\u0131n\u0131n bir tehdit tespit edilene kadar g\u00fcvenli oldu\u011funu varsayarken, modern s\u0131f\u0131r g\u00fcven modelleri, a\u011f\u0131n hi\u00e7bir zaman g\u00fcvenli olmad\u0131\u011f\u0131n\u0131 varsayar.<\/span><\/p>\n<h3 id=\"3-geleneksel-ip-adresi-guvenlik-kurallarina-uymayin\">3. Geleneksel IP adresi g\u00fcvenlik kurallar\u0131na uymay\u0131n<\/h3>\n<p><span style=\"font-weight: 400;\">Bir cihaz\u0131n veya kullan\u0131c\u0131n\u0131n konumu, sahte olabilece\u011finden g\u00fcven sa\u011flamak i\u00e7in yeterli kan\u0131t de\u011fildir.<\/span><\/p>\n<h3 id=\"4-her-kullanici-hesap-ve-cihaz-icin-mfayi-uygulayin\">4. Her kullan\u0131c\u0131, hesap ve cihaz i\u00e7in MFA&#8217;y\u0131 uygulay\u0131n<\/h3>\n<p><span style=\"font-weight: 400;\">A\u011fa ne s\u0131kl\u0131kta eri\u015firlerse eri\u015fsinler veya \u015firkette ne kadar \u00fcst s\u0131ralarda olurlarsa olsunlar, her bir kullan\u0131c\u0131n\u0131n her oturum a\u00e7ma i\u015flemi i\u00e7in birden fazla kimlik do\u011frulama d\u00fczeyinden ge\u00e7mesi gerekir.<\/span><\/p>\n<h3 id=\"5-sirket-siber-guvenlik-politikalari-olusturun\">5. \u015eirket siber g\u00fcvenlik politikalar\u0131 olu\u015fturun<\/h3>\n<p><span style=\"font-weight: 400;\">Siber tehditler s\u00fcrekli olarak geli\u015fmektedir ve siber g\u00fcvenlik de \u00f6yle olmal\u0131d\u0131r. \u0130\u015fletmelerin siber g\u00fcvenlik politikalar\u0131 dinamik olmal\u0131 ve m\u00fcmk\u00fcn oldu\u011fu kadar \u00e7ok veri kayna\u011f\u0131n\u0131 dikkate almal\u0131d\u0131r. \u0130zleme ve tehdit tespiti, t\u00fcm \u00e7al\u0131\u015fanlar\u0131n \u00fczerinde e\u011fitim ald\u0131\u011f\u0131 bir m\u00fcdahale plan\u0131na sahip olmak kadar \u00f6nemlidir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bulutistan hizmetlerinin detaylar\u0131na ula\u015fmak i\u00e7in <\/span><a href=\"https:\/\/bulutistan.com\/cloud\/\"><span style=\"font-weight: 400;\">t\u0131klay\u0131n\u0131z<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2 id=\"sirketlerde-zero-trust-guvenligi-nasil-uygulanir\">\u015eirketlerde Zero Trust G\u00fcvenli\u011fi Nas\u0131l Uygulan\u0131r?<\/h2>\n<p><span style=\"font-weight: 400;\">\u0130\u015fletmeniz i\u00e7in zero trust g\u00fcvenlik mimarisi uygulaman\u0131n birka\u00e7 yolu vard\u0131r. Kullanabilece\u011finiz kaynaklara ba\u011fl\u0131 olarak \u015firket i\u00e7i g\u00fcvenlik y\u00f6netimini se\u00e7ebilir, g\u00fcvenlik hizmetleriyle ortak olabilir veya hibrit bir yakla\u015f\u0131m benimseyebilirsiniz.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tamamen yinelenen s\u0131f\u0131r g\u00fcven mimarisi \u015funlar\u0131 i\u00e7erir: geli\u015fmi\u015f kimlik do\u011frulama, geli\u015fmi\u015f tehdit alg\u0131lama, tutarl\u0131 ve yinelenebilir g\u00fcvenlik prosed\u00fcrleri, \u00e7e\u015fitli veri kaynaklar\u0131 ve yayg\u0131n veri toplama. Temel olarak, a\u011f\u0131n\u0131za y\u00f6nelik potansiyel tehditleri tespit ettik\u00e7e geli\u015febilecek bir sistem kurman\u0131z gerekir.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"Modern i\u015fletmeler, \u00e7al\u0131\u015fmak i\u00e7in bir\u00e7ok teknolojik sisteme ve hizmete g\u00fcvenir. Karma\u015f\u0131k bir teknoloji y\u0131\u011f\u0131n\u0131, \u015firketlerin dijital \u00e7a\u011fda t\u00fcketicilerin&hellip;\n","protected":false},"author":1,"featured_media":3736,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0},"categories":[11],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust ve S\u0131f\u0131r G\u00fcven Mimarisi \u0130le \u015eirket \u0130\u00e7i G\u00fcvenli\u011fi Art\u0131rma - Bulutistan Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust ve S\u0131f\u0131r G\u00fcven Mimarisi \u0130le \u015eirket \u0130\u00e7i G\u00fcvenli\u011fi Art\u0131rma - Bulutistan Blog\" \/>\n<meta property=\"og:description\" content=\"Modern i\u015fletmeler, \u00e7al\u0131\u015fmak i\u00e7in bir\u00e7ok teknolojik sisteme ve hizmete g\u00fcvenir. Karma\u015f\u0131k bir teknoloji y\u0131\u011f\u0131n\u0131, \u015firketlerin dijital \u00e7a\u011fda t\u00fcketicilerin&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/\" \/>\n<meta property=\"og:site_name\" content=\"Bulutistan Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-10T19:45:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-20T10:33:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2023\/05\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenlig\u0306i-artirma.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bulutistan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bulutistan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/\",\"url\":\"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/\",\"name\":\"Zero Trust ve S\u0131f\u0131r G\u00fcven Mimarisi \u0130le \u015eirket \u0130\u00e7i G\u00fcvenli\u011fi Art\u0131rma - Bulutistan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\"},\"datePublished\":\"2023-04-10T19:45:50+00:00\",\"dateModified\":\"2024-01-20T10:33:46+00:00\",\"author\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\",\"url\":\"https:\/\/bulutistan.com\/blog\/\",\"name\":\"Bulutistan Blog\",\"description\":\"Teknolojide Yol Arkada\u015f\u0131n\u0131z\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bulutistan.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\",\"name\":\"Bulutistan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"caption\":\"Bulutistan\"},\"sameAs\":[\"https:\/\/bulutistan.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust ve S\u0131f\u0131r G\u00fcven Mimarisi \u0130le \u015eirket \u0130\u00e7i G\u00fcvenli\u011fi Art\u0131rma - Bulutistan Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/","og_locale":"tr_TR","og_type":"article","og_title":"Zero Trust ve S\u0131f\u0131r G\u00fcven Mimarisi \u0130le \u015eirket \u0130\u00e7i G\u00fcvenli\u011fi Art\u0131rma - Bulutistan Blog","og_description":"Modern i\u015fletmeler, \u00e7al\u0131\u015fmak i\u00e7in bir\u00e7ok teknolojik sisteme ve hizmete g\u00fcvenir. Karma\u015f\u0131k bir teknoloji y\u0131\u011f\u0131n\u0131, \u015firketlerin dijital \u00e7a\u011fda t\u00fcketicilerin&hellip;","og_url":"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/","og_site_name":"Bulutistan Blog","article_published_time":"2023-04-10T19:45:50+00:00","article_modified_time":"2024-01-20T10:33:46+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2023\/05\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenlig\u0306i-artirma.jpeg","type":"image\/jpeg"}],"author":"Bulutistan","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bulutistan","Tahmini okuma s\u00fcresi":"7 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/","url":"https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/","name":"Zero Trust ve S\u0131f\u0131r G\u00fcven Mimarisi \u0130le \u015eirket \u0130\u00e7i G\u00fcvenli\u011fi Art\u0131rma - Bulutistan Blog","isPartOf":{"@id":"https:\/\/bulutistan.com\/blog\/#website"},"datePublished":"2023-04-10T19:45:50+00:00","dateModified":"2024-01-20T10:33:46+00:00","author":{"@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bulutistan.com\/blog\/zero-trust-ve-sifir-guven-mimarisi-ile-sirket-ici-guvenligi-artirma\/"]}]},{"@type":"WebSite","@id":"https:\/\/bulutistan.com\/blog\/#website","url":"https:\/\/bulutistan.com\/blog\/","name":"Bulutistan Blog","description":"Teknolojide Yol Arkada\u015f\u0131n\u0131z","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bulutistan.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e","name":"Bulutistan","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","caption":"Bulutistan"},"sameAs":["https:\/\/bulutistan.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3735"}],"collection":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/comments?post=3735"}],"version-history":[{"count":6,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3735\/revisions"}],"predecessor-version":[{"id":4207,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3735\/revisions\/4207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media\/3736"}],"wp:attachment":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media?parent=3735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/categories?post=3735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/tags?post=3735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}