{"id":3756,"date":"2023-04-16T21:07:46","date_gmt":"2023-04-16T21:07:46","guid":{"rendered":"https:\/\/bulutistan.com\/blog\/?p=3756"},"modified":"2024-01-20T10:32:32","modified_gmt":"2024-01-20T10:32:32","slug":"sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur","status":"publish","type":"post","link":"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/","title":{"rendered":"S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma: Zero Trust \u0130le G\u00fcvenli ve Verimli Bir Ortam Nas\u0131l Olu\u015fturulur?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">COVID-19 salg\u0131n\u0131, k\u00fcresel olarak \u015firketlerin %16&#8217;s\u0131n\u0131n art\u0131k tamamen uzaktan \u00e7al\u0131\u015fmas\u0131yla evden \u00e7al\u0131\u015fma trendini radikal bir \u015fekilde h\u0131zland\u0131rd\u0131.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uzaktan \u00e7al\u0131\u015fmaya ba\u011fl\u0131 olarak \u00fcretkenlik, \u00e7al\u0131\u015fan mutlulu\u011fu ve maliyet d\u00fc\u015f\u00fc\u015flerindeki geli\u015fmeler hakk\u0131nda \u00e7ok \u015fey s\u00f6ylendi. Ancak, g\u00fcn\u00fcm\u00fczdeki herhangi bir b\u00fcy\u00fck teknolojik de\u011fi\u015fimde oldu\u011fu gibi \u00f6zellikle siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan risklerini de beraberinde getirdi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bulutistan hizmetlerinin detaylar\u0131na ula\u015fmak i\u00e7in <\/span><a href=\"https:\/\/bulutistan.com\/cloud\/\"><span style=\"font-weight: 400;\">t\u0131klay\u0131n\u0131z<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2 id=\"uzaktan-calismanin-riskleri\">Uzaktan \u00c7al\u0131\u015fman\u0131n Riskleri<\/h2>\n<p><span style=\"font-weight: 400;\">Absolute&#8217;a g\u00f6re, BT uzmanlar\u0131n\u0131n %97&#8217;si uzaktan \u00e7al\u0131\u015fanlar\u0131n artan riske maruz kald\u0131\u011f\u0131na inan\u0131yor ve %47&#8217;si uzaktan \u00e7al\u0131\u015fanlar i\u00e7in riskin y\u00fcksek veya a\u015f\u0131r\u0131 y\u00fcksek olarak s\u0131n\u0131fland\u0131r\u0131labilece\u011fini s\u00f6yl\u00fcyor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uzaktan \u00e7al\u0131\u015fma \u015femsiyesi alt\u0131nda g\u00fcvenli uzaktan eri\u015fim en \u00f6nemli konu olurken, bunu veri g\u00fcvenli\u011fi, g\u00fcvenli ba\u011flant\u0131 ve g\u00fcvenli uygulama teslimi izledi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Peki di\u011fer riskler neler?<\/span><\/p>\n<h3 id=\"1-yavas-yanit\">1. Yava\u015f yan\u0131t<\/h3>\n<p><span style=\"font-weight: 400;\">Yan\u0131t s\u00fcreleri, bir siber g\u00fcvenlik olay\u0131n\u0131n etkisiyle ters orant\u0131l\u0131d\u0131r; uzak ortamlarda, g\u00fcvenlik olay\u0131 yan\u0131t\u0131 daha zor ve daha az h\u0131zl\u0131d\u0131r.<\/span><\/p>\n<h3 id=\"2-fidye-yazilimini-belirleme\">2. Fidye yaz\u0131l\u0131m\u0131n\u0131 belirleme<\/h3>\n<p><span style=\"font-weight: 400;\">Uzaktan eri\u015filen donan\u0131m\/yaz\u0131l\u0131m, dahili varl\u0131klarla ayn\u0131 alg\u0131lama sistemlerinden yararlanmayabilir; bu, fidye yaz\u0131l\u0131mlar\u0131n\u0131 veya di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 tan\u0131mlamay\u0131 ve uygun \u015fekilde yan\u0131t vermeyi zorla\u015ft\u0131r\u0131r.<\/span><\/p>\n<h3 id=\"3-eski-uzaktan-erisim\">3. Eski uzaktan eri\u015fim<\/h3>\n<p><span style=\"font-weight: 400;\">Eski uzaktan eri\u015fim sistemleri, g\u00fcn\u00fcm\u00fcz\u00fcn uzaktan \u00e7al\u0131\u015fma \u00f6l\u00e7e\u011fini veya a\u011f tehditlerinin hacmini veya geli\u015fen t\u00fcrlerini i\u015flemek i\u00e7in in\u015fa edilmedi.<\/span><\/p>\n<h3 id=\"4-guncelleme-eksikligi\">4. G\u00fcncelleme eksikli\u011fi<\/h3>\n<p><span style=\"font-weight: 400;\">Uzaktan \u00e7al\u0131\u015fanlar her zaman g\u00fcncellenen politikalara uymaz; g\u00fcncelleme zamanlamas\u0131ndaki uyumsuzluk da uyumsuzluklara ve g\u00fcvenlik a\u00e7\u0131klar\u0131na yol a\u00e7abilir.<\/span><\/p>\n<h3 id=\"5-saldiri-yuzeyi\">5. Sald\u0131r\u0131 y\u00fczeyi<\/h3>\n<p><span style=\"font-weight: 400;\">Bir a\u011f ne kadar da\u011f\u0131n\u0131ksa, sald\u0131r\u0131 y\u00fczeyi o kadar geni\u015f olur ve \u00e7evresi de o kadar da\u011f\u0131n\u0131k olur; bu, bilgisayar korsanlar\u0131 i\u00e7in daha fazla f\u0131rsat sa\u011flar.<\/span><\/p>\n<h3 id=\"6-azaltilmis-telemetri\">6. Azalt\u0131lm\u0131\u015f telemetri<\/h3>\n<p><span style=\"font-weight: 400;\">Uzaktan izleme genellikle daha yava\u015f, daha az do\u011fru ve her yerde daha az bulunur; bu, bir i\u015fletmenin sald\u0131r\u0131lara yan\u0131t verme ve g\u00fcvenlik \u00f6nlemlerini ve politikalar\u0131n\u0131 g\u00fc\u00e7lendirmek i\u00e7in verileri kullanma becerisini engeller.<\/span><\/p>\n<h3 id=\"7-cihaz-yonetimi\">7. Cihaz y\u00f6netimi<\/h3>\n<p><span style=\"font-weight: 400;\">Uzaktan \u00e7al\u0131\u015fma durumlar\u0131nda daha fazla cihaz kaybolur, \u00e7al\u0131n\u0131r veya yanl\u0131\u015f yere yerle\u015ftirilir. Uzak cihazlar\u0131n kurtar\u0131lmas\u0131 daha zordur ve yetkisiz eri\u015fime yol a\u00e7abilir, sald\u0131r\u0131lar\u0131n %28&#8217;e varan oran\u0131 \u00e7al\u0131nan veya tehlikeye at\u0131lan cihazlardan kaynaklan\u0131r.<\/span><\/p>\n<h3 id=\"8-kimlik-avi-saldirilari\">8. Kimlik av\u0131 sald\u0131r\u0131lar\u0131<\/h3>\n<p><span style=\"font-weight: 400;\">Kimlik av\u0131 sald\u0131r\u0131lar\u0131, \u00e7ok \u00e7e\u015fitli form fakt\u00f6rleri ve cihazlar kullan\u0131larak ba\u015flat\u0131labilir ve ayr\u0131ca \u00e7al\u0131\u015fanlar ayn\u0131 \u015firket i\u00e7i korumadan yararlanamaz.<\/span><\/p>\n<h2 id=\"guvenli-uzaktan-calisma-nedir\">G\u00fcvenli Uzaktan \u00c7al\u0131\u015fma Nedir?<\/h2>\n<p><span style=\"font-weight: 400;\">G\u00fcvenli uzaktan \u00e7al\u0131\u015fma, personelinizin \u00f6nemli \u015firket ve m\u00fc\u015fteri verilerine, kurumsal ileti\u015fimlere ve uygulama ara\u00e7lar\u0131na eri\u015febilece\u011fi g\u00fcvenli ve korumal\u0131 bir ortam sa\u011flar. Temel olarak bu, tamam\u0131 geleneksel ofis \u00e7al\u0131\u015fma alan\u0131n\u0131n d\u0131\u015f\u0131ndan g\u00fcvenli bir i\u015f istasyonu kullanmak anlam\u0131na da gelir. G\u00fcvenli uzaktan \u00e7al\u0131\u015fma \u00e7\u00f6z\u00fcm\u00fc t\u00fcm bu i\u015flevleri sa\u011flayarak i\u015fletmenizi, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 ve m\u00fc\u015fterilerinizi veri ihlallerinden, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlardan, fidye yaz\u0131l\u0131mlar\u0131ndan, kimlik av\u0131ndan, balina av\u0131ndan ve g\u00f6zetlemeden korur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do\u011fru bir g\u00fcvenli uzaktan \u00e7al\u0131\u015fma \u00e7\u00f6z\u00fcm\u00fc, neredeyse g\u00f6r\u00fcnmez bir koruyucu \u00f6rt\u00fc g\u00f6revi g\u00f6rerek bu i\u015flevleri sorunsuz bir \u015fekilde sa\u011flar. \u00c7al\u0131\u015fanlar\u0131n, g\u00fcvenlik politika ve prosed\u00fcrlerini atlatmaya \u00e7al\u0131\u015fmadan hassas \u015firket verileriyle uzaktan \u00e7al\u0131\u015fmas\u0131na yard\u0131mc\u0131 olur. Ayr\u0131ca, \u00e7al\u0131\u015fan\u0131n i\u015f ara\u00e7lar\u0131na nereden eri\u015fti\u011fi \u00f6nemli de\u011fil, g\u00fcvenli ve emniyetli bir uzaktan \u00e7al\u0131\u015fma ortam\u0131 sa\u011flar.<\/span><\/p>\n<h2 id=\"sifir-guven-nedir\">S\u0131f\u0131r G\u00fcven Nedir?<\/h2>\n<p><span style=\"font-weight: 400;\">Zero trust yani s\u0131f\u0131r g\u00fcven, i\u015fletmenizin g\u00fcvenli a\u011f\u0131n\u0131n hem i\u00e7inde hem de d\u0131\u015f\u0131nda g\u00fcvenli bir \u015fekilde \u00e7al\u0131\u015fmas\u0131na olanak tan\u0131r. S\u0131f\u0131r g\u00fcven sayesinde \u00e7al\u0131\u015fanlar, bir ihlal olmas\u0131 durumunda sistemlerden \u00f6d\u00fcn vermeden yaln\u0131zca i\u015flerini tamamlamak i\u00e7in ihtiya\u00e7 duyduklar\u0131 g\u00fcvenli dosyalara ve verilere eri\u015febilir. S\u0131f\u0131r g\u00fcven, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n her giri\u015f noktas\u0131nda yeniden eri\u015fim elde etmesini gerektiren s\u00fcrekli bir do\u011frulama s\u00fcreciyle i\u015fletmenizi korur. S\u0131f\u0131r g\u00fcven, standart bir parola korumas\u0131 kullanmak yerine daha fazla koruma ve gizlilik sa\u011flamak i\u00e7in bu \u00fc\u00e7 stratejinin bir kombinasyonunu kullan\u0131r:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Veri merkezini farkl\u0131 g\u00fcvenlik gruplar\u0131na b\u00f6len a\u011flar\u0131n mikro segmentasyonu<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Eri\u015fim talep eden kullan\u0131c\u0131lar\u0131 tan\u0131mlayan kullan\u0131c\u0131lar\u0131n kimlik do\u011frulamas\u0131<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">S\u00fcrekli de\u011fi\u015fse bile bir a\u011f\u0131n tasar\u0131m\u0131n\u0131 do\u011frulamak i\u00e7in analiz eden g\u00fcvenli bir a\u011f\u0131n do\u011frulanmas\u0131<\/span><\/li>\n<\/ul>\n<h2 id=\"sifir-guvenle-uzaktan-erisim-nedir\">S\u0131f\u0131r G\u00fcvenle Uzaktan Eri\u015fim Nedir?<\/h2>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcvenle uzaktan eri\u015fim, bu siber g\u00fcvenlik modelini \u00e7al\u0131\u015fanlar\u0131n, i\u015f ortaklar\u0131n\u0131n, makinelerin veya i\u00e7 a\u011fa ba\u011flant\u0131 gerektiren m\u00fc\u015fterilerin \u00f6zel ihtiya\u00e7lar\u0131na uygular.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven uzaktan eri\u015fim, uzak \u00e7al\u0131\u015fanlar\u0131n ihtiya\u00e7 duydu\u011fu sistemlere ve uygulamalara eri\u015fim sa\u011flamak i\u00e7in s\u0131r y\u00f6netimi teknolojilerini kullan\u0131r, ancak yaln\u0131zca eri\u015fime ihtiya\u00e7 duyduklar\u0131nda. Herhangi bir hesaba &#8220;her zaman izin ver&#8221; ayr\u0131cal\u0131\u011f\u0131 verilmedi\u011finden, s\u0131f\u0131r g\u00fcven modeliyle kal\u0131c\u0131 olarak a\u00e7\u0131k eri\u015fim sa\u011flama uygulamas\u0131 tamamen ortadan kalkar.<\/span><\/p>\n<h2 id=\"sifir-guven-ve-uzaktan-calisma\">S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma<\/h2>\n<p><span style=\"font-weight: 400;\">Uzak \u00e7al\u0131\u015fanlardan kaynaklanan g\u00fcvenlik riskini azaltman\u0131n en iyi yolu, s\u0131f\u0131r g\u00fcven g\u00fcvenlik modeli kullanmakt\u0131r. Ama\u00e7, sisteme eri\u015fmeye \u00e7al\u0131\u015fan her kullan\u0131c\u0131y\u0131 ve cihaz\u0131 do\u011frulamak ve yaln\u0131zca belirli i\u015fleri y\u00fcr\u00fctmek i\u00e7in gereken kadar eri\u015fime izin vermektir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Koronavir\u00fcsten \u00f6nce, k\u00fc\u00e7\u00fck ve orta \u00f6l\u00e7ekli i\u015fletmelerin yaln\u0131zca %27&#8217;si s\u0131f\u0131r g\u00fcven g\u00fcvenli\u011fi uygulam\u0131\u015ft\u0131. Art\u0131k evden \u00e7al\u0131\u015fan bu kadar \u00e7ok \u00e7al\u0131\u015fan varken, her b\u00fcy\u00fckl\u00fckteki i\u015fletmenin h\u0131zla s\u0131f\u0131r g\u00fcven modeline ge\u00e7mesi zorunludur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven modeli, \u00e7al\u0131\u015fanlar\u0131n kendi g\u00fcvenliklerinden sorumlu olmad\u0131\u011f\u0131n\u0131 varsayar ve sorumlulu\u011fu \u015firketin BT organizasyonuna y\u00fckler. Temel bir s\u0131f\u0131r g\u00fcven sistemi, hem dahili hem de harici t\u00fcm a\u011f eri\u015fimini, \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama kullanan g\u00fcvenli bir web tabanl\u0131 a\u011f ge\u00e7idi \u00fczerinden y\u00f6nlendirir. \u0130deal olarak, bu a\u011f ge\u00e7idi, t\u00fcm cihazlarda ve i\u015fletim sistemlerinde en son yamalar\u0131n kurulu oldu\u011funun do\u011frulanmas\u0131 da dahil olmak \u00fczere, tek tek cihazlarda g\u00fcvenlik kontrolleri ger\u00e7ekle\u015ftirmelidir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven modeli, evde \u00e7al\u0131\u015fanlar taraf\u0131ndan kullan\u0131lan farkl\u0131 t\u00fcrde cihazlara ve i\u015fletim sistemlerine de uyarlanabilir. Cisco, \u00e7al\u0131\u015fanlar\u0131n i\u015fleri i\u00e7in ortalama 2,5 cihaz kulland\u0131\u011f\u0131n\u0131 tespit etmi\u015ftir. \u00c7o\u011fu zaman tan\u0131nmayan bu kadar \u00e7ok cihazla \u00e7al\u0131\u015facak statik g\u00fcvenlik sistemleri tasarlamak zordur. S\u0131f\u0131r g\u00fcven modeli, g\u00fcvenli\u011fin donan\u0131m ve yaz\u0131l\u0131m teknolojisinden ba\u011f\u0131ms\u0131z olmas\u0131n\u0131 sa\u011flar.<\/span><\/p>\n<h2 id=\"sifir-guvenin-uzaktan-calismayi-guvenli-hale-getirmesinin-yollari\">S\u0131f\u0131r G\u00fcvenin Uzaktan \u00c7al\u0131\u015fmay\u0131 G\u00fcvenli Hale Getirmesinin Yollar\u0131<\/h2>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven, ek bir do\u011frulama katman\u0131yla t\u00fcm u\u00e7 nokta ve izinlerin g\u00fcvence alt\u0131na al\u0131nmas\u0131na yard\u0131mc\u0131 olarak i\u015fletmenize y\u00f6nelik hem d\u0131\u015f hem de i\u00e7 tehdit riskini azalt\u0131r. S\u0131f\u0131r g\u00fcven, \u00e7al\u0131\u015fanlar\u0131n yaln\u0131zca ihtiya\u00e7 duyduklar\u0131 \u015feylere eri\u015febildi\u011fi ve sisteme zarar veren bir \u00e7al\u0131\u015fan\u0131n dahili tehdidini ortadan kald\u0131ran en az ayr\u0131cal\u0131kl\u0131 bir modeli \u00f6rneklendirir. Uzaktan \u00e7al\u0131\u015fma yayg\u0131n olmaya devam edip pop\u00fclerlik kazand\u0131k\u00e7a, kurulu\u015flar i\u015fletmelerini olas\u0131 i\u00e7 ve d\u0131\u015f tehditlere kar\u015f\u0131 g\u00fcvenli bir \u015fekilde korumak i\u00e7in s\u0131f\u0131r g\u00fcven stratejilerini benimsemelidir.<\/span><\/p>\n<h2 id=\"sifir-guvenle-uzaktan-erisimin-avantajlari\">S\u0131f\u0131r G\u00fcvenle Uzaktan Eri\u015fimin Avantajlar\u0131<\/h2>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven uzaktan eri\u015fimin avantajlar\u0131 a\u015fa\u011f\u0131da \u015fekildedir:<\/span><\/p>\n<h3 id=\"1-daha-guclu-guvenlik\">1. Daha g\u00fc\u00e7l\u00fc g\u00fcvenlik<\/h3>\n<p><span style=\"font-weight: 400;\">ZTNA sistemleri, kullan\u0131c\u0131lar\u0131n ve cihazlar\u0131n s\u00fcrekli olarak kimlik do\u011frulamas\u0131 yapmas\u0131n\u0131 gerektirerek, a\u011fa eri\u015fim sa\u011flayan bilgisayar korsanlar\u0131n\u0131n a\u011f i\u00e7inde serbest\u00e7e hareket etmesini ve y\u00fcksek de\u011ferli hedeflere eri\u015fmesini engeller.<\/span><\/p>\n<h3 id=\"2-azaltilmis-saldiri-yuzeyi\">2. Azalt\u0131lm\u0131\u015f sald\u0131r\u0131 y\u00fczeyi<\/h3>\n<p><span style=\"font-weight: 400;\">Belirli uygulamalara eri\u015fim verilen kullan\u0131c\u0131 ve cihazlar, daha geni\u015f a\u011f altyap\u0131s\u0131n\u0131 veya ek IP adreslerini g\u00f6remez, bu da sald\u0131r\u0131 y\u00fczeyini \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r.<\/span><\/p>\n<h3 id=\"3-ustun-kullanici-deneyimleri\">3. \u00dcst\u00fcn kullan\u0131c\u0131 deneyimleri<\/h3>\n<p><span style=\"font-weight: 400;\">ZTNA \u00e7\u00f6z\u00fcmleri, VPN&#8217;lerden daha h\u0131zl\u0131 performans sa\u011flar ve trafi\u011fi merkezi bir a\u011f merkezi arac\u0131l\u0131\u011f\u0131yla geri y\u00fckleyerek gecikme sa\u011flar. \u00d6zel uygulamalara kesintisiz, do\u011frudan buluta eri\u015fim sa\u011flayan ZTNA teknolojisi, bulut ve \u00f6zel a\u011f eri\u015fimi i\u00e7in daha tutarl\u0131 bir deneyim sunar.<\/span><\/p>\n<h3 id=\"4-yonetim-kolayligi\">4. Y\u00f6netim kolayl\u0131\u011f\u0131<\/h3>\n<p><span style=\"font-weight: 400;\">Zero Trust uzaktan eri\u015fim, g\u00fcvenlik ekiplerinin uzaktan eri\u015fim g\u00fcvenli\u011fini y\u00f6netmesine ve politikalar\u0131 daha kolay bir \u015fekilde uygulamas\u0131na olanak tan\u0131r. \u00dcst\u00fcn ZTNA \u00e7\u00f6z\u00fcmleri, BT ekiplerinin kullan\u0131c\u0131 ve cihaz etkinli\u011fini izlerken tam g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fcn keyfini \u00e7\u0131karabilece\u011fi tek bir pano sa\u011flar.<\/span><\/p>\n<h3 id=\"5-zahmetsiz-olceklenebilirlik\">5. Zahmetsiz \u00f6l\u00e7eklenebilirlik<\/h3>\n<p><span style=\"font-weight: 400;\">VPN teknolojisini h\u0131zl\u0131 bir \u015fekilde \u00f6l\u00e7eklendirmek \u00e7ok zor ve pahal\u0131 olsa da, ZTNA sistemleri kurulu\u015flar kullan\u0131c\u0131 ekledik\u00e7e h\u0131zla \u00f6l\u00e7eklenebilir.<\/span><\/p>\n<h3 id=\"6-hizli-dagitim\">6. H\u0131zl\u0131 da\u011f\u0131t\u0131m<\/h3>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r G\u00fcven uzaktan eri\u015fim \u00e7\u00f6z\u00fcmleri, geleneksel teknolojilerden \u00e7ok daha h\u0131zl\u0131 bir \u015fekilde birka\u00e7 g\u00fcn i\u00e7inde devreye al\u0131nabilir.<\/span><\/p>\n<h2 id=\"sifir-guvenle-uzaktan-erisim-nasil-calisir\">S\u0131f\u0131r G\u00fcvenle Uzaktan Eri\u015fim Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n<p><span style=\"font-weight: 400;\">\u0130\u015fletmeler, s\u0131f\u0131r g\u00fcven \u00e7er\u00e7evesinin ilkeleriyle uyumlu teknolojileri ve uygulamalar\u0131 devreye alarak s\u0131f\u0131r g\u00fcven uzaktan eri\u015fimini uygulayabilir. Bunlar a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/span><\/p>\n<h3 id=\"1-asla-guvenme-her-zaman-dogrula\">1. Asla g\u00fcvenme &#8211; her zaman do\u011frula<\/h3>\n<p><span style=\"font-weight: 400;\">G\u00fcven, a\u011f\u0131n i\u00e7indeki veya d\u0131\u015f\u0131ndaki hi\u00e7 kimseye veya herhangi bir makineye asla otomatik olarak verilmez. Her kullan\u0131c\u0131, cihaz ve uygulama, BT kaynaklar\u0131na eri\u015firken kimli\u011fini do\u011frulamal\u0131 ve s\u00fcrekli olarak yeniden do\u011frulamal\u0131d\u0131r.<\/span><\/p>\n<h3 id=\"2-en-az-ayricalikli-erisim-izni-verin\">2. En az ayr\u0131cal\u0131kl\u0131 eri\u015fim izni verin<\/h3>\n<p><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven sistemleri, kaynaklara eri\u015fim i\u00e7in minimum izinler verir. Kullan\u0131c\u0131lar, cihazlar ve uygulamalar, yaln\u0131zca belirli bir i\u015fi ger\u00e7ekle\u015ftirmek i\u00e7in ihtiya\u00e7 duyduklar\u0131 kaynaklara eri\u015febilir.<\/span><\/p>\n<h3 id=\"3-saldiri-yuzeyini-sinirlayin\">3. Sald\u0131r\u0131 y\u00fczeyini s\u0131n\u0131rlay\u0131n<\/h3>\n<p><span style=\"font-weight: 400;\">En az ayr\u0131cal\u0131kl\u0131 eri\u015fimi kullanman\u0131n yan\u0131 s\u0131ra g\u00fcvenlik ekipleri mikro segmentasyon kullanarak sald\u0131r\u0131 y\u00fczeyini azalt\u0131r. Bu uygulama, yanal harekete dayal\u0131 siber sald\u0131r\u0131lar\u0131 \u00f6nlemek i\u00e7in bir a\u011f\u0131n bir\u00e7ok k\u00fc\u00e7\u00fck alan\u0131 \u00e7evresinde g\u00fcvenlik s\u0131n\u0131rlar\u0131 olu\u015fturur. Mikro segmentasyon, bireysel i\u015f y\u00fckleri, uygulamalar ve i\u015f a\u00e7\u0131s\u0131ndan kritik varl\u0131klar etraf\u0131nda g\u00fcvenlik s\u0131n\u0131rlar\u0131 bile olu\u015fturabilir.<\/span><\/p>\n<h3 id=\"4-tehditlerin-mevcut-oldugunu-varsayin\">4. Tehditlerin mevcut oldu\u011funu varsay\u0131n<\/h3>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik ekipleri, siber sald\u0131r\u0131lar\u0131n halihaz\u0131rda devam etmekte oldu\u011funu varsayarak, sald\u0131r\u0131lar\u0131 bulmak ve neden olabilecekleri hasar\u0131 s\u0131n\u0131rlamak i\u00e7in daha proaktif bir yakla\u015f\u0131m benimseyebilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u0130\u015fletmeler, uzaktan eri\u015fim i\u00e7in bu ilkeleri uygulamak \u00fczere genellikle ZTNA&#8217;dan veya a\u011f eri\u015fim denetimi sat\u0131c\u0131lar\u0131ndan bir veya daha fazla \u00e7\u00f6z\u00fcm kullan\u0131r. ZTNA teknolojileri, bulutta bar\u0131nd\u0131r\u0131lan bir ZTNA hizmetine veya arac\u0131ya giden ba\u011flant\u0131 yoluyla g\u00fcvenli, \u015fifreli bir t\u00fcnel olu\u015fturur. Hizmet, kullan\u0131c\u0131lar\u0131 do\u011frulayarak ve cihazlar\u0131n g\u00fcvenlik duru\u015funu do\u011frulayarak ve kimlikleri do\u011frulayarak a\u011fa eri\u015fimi izler. Hizmet ayr\u0131ca belirli uygulamalara g\u00fcvenli eri\u015fim sa\u011flar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bulutistan hizmetlerinin detaylar\u0131na ula\u015fmak i\u00e7in <\/span><a href=\"https:\/\/bulutistan.com\/cloud\/\"><span style=\"font-weight: 400;\">t\u0131klay\u0131n\u0131z<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2 id=\"sifir-guvende-uzaktan-erisim-cozumu-turleri\">S\u0131f\u0131r G\u00fcvende Uzaktan Eri\u015fim \u00c7\u00f6z\u00fcm\u00fc T\u00fcrleri<\/h2>\n<p><span style=\"font-weight: 400;\">ZTNA \u00e7\u00f6z\u00fcmlerinin iki ana kategorisi vard\u0131r: arac\u0131 tabanl\u0131 \u00e7\u00f6z\u00fcmler ve arac\u0131s\u0131z \u00e7\u00f6z\u00fcmler.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Arac\u0131 tabanl\u0131 \u00e7\u00f6z\u00fcmler, g\u00fcvenlikle ilgili bilgileri bir ZTNA denetleyicisine g\u00f6ndermek i\u00e7in kullan\u0131c\u0131 cihazlar\u0131ndaki yaz\u0131l\u0131m arac\u0131lar\u0131n\u0131 kullan\u0131r. Denetleyici, s\u0131n\u0131rl\u0131 uygulamalara ve kaynaklara eri\u015fim sa\u011flayarak kimlik do\u011frulamay\u0131 y\u00f6netir. Arac\u0131 tabanl\u0131 \u00e7\u00f6z\u00fcmlerin \u00e7o\u011fu, son kullan\u0131c\u0131 cihazlar\u0131na bir miktar cihaz y\u00f6netimi altyap\u0131s\u0131 veya yaz\u0131l\u0131m kurulumu gerektirir. Bu model genellikle a\u011fa eri\u015fen y\u00f6netilmeyen cihazlar\u0131n say\u0131s\u0131n\u0131 azaltmak isteyen i\u015fletmeler taraf\u0131ndan tercih edilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Arac\u0131s\u0131z ZTNA \u00e7\u00f6z\u00fcmleri, ayr\u0131 cihazlara herhangi bir yaz\u0131l\u0131m\u0131n y\u00fcklenmesini gerektirmez. Bu model, bir a\u011fdaki veya buluttaki uygulamalar\u0131, bulut tabanl\u0131 bir ZTNA denetleyicisiyle ileti\u015fim kuran hafif bir ZTNA konekt\u00f6r\u00fcyle korur. Denetleyici bir kullan\u0131c\u0131n\u0131n veya ayg\u0131t\u0131n kimli\u011fini do\u011frulad\u0131ktan sonra uygulamalar\u0131 do\u011frudan eri\u015fimden izole ederek trafik ZTNA sa\u011flay\u0131c\u0131s\u0131 \u00fczerinden akar. Bu arac\u0131s\u0131z yakla\u015f\u0131m, kullan\u0131c\u0131lar\u0131n y\u00f6netilmeyen veya ki\u015fisel cihazlarla ba\u011fland\u0131\u011f\u0131 kurulu\u015flar i\u00e7in daha caziptir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sonu\u00e7 olarak, s\u0131f\u0131r g\u00fcven, bir a\u011f mimarisi veya modelinden \u00e7ok bir stratejidir. Bu stratejinin temeli, g\u00fcvenin do\u011frulanabilir kan\u0131tlarla do\u011frulanmas\u0131 gerekti\u011fidir ve bu do\u011frulama stratejisi, a\u011f ile her de\u011fi\u015fiklik ve etkile\u015fim i\u00e7in ge\u00e7erlidir. Bu konuda unutmaman\u0131z gereken \u015fey \u015fudur: Bir etkinlik veya kullan\u0131c\u0131ya d\u00fcn g\u00fcvenilmi\u015f olmas\u0131, ona bug\u00fcn de g\u00fcvenilmemesi gerekti\u011fi anlam\u0131na gelmez. Bu y\u00fczden tekrar tekrar do\u011frulama yapman\u0131z gerekir.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"COVID-19 salg\u0131n\u0131, k\u00fcresel olarak \u015firketlerin %16&#8217;s\u0131n\u0131n art\u0131k tamamen uzaktan \u00e7al\u0131\u015fmas\u0131yla evden \u00e7al\u0131\u015fma trendini radikal bir \u015fekilde h\u0131zland\u0131rd\u0131. Uzaktan&hellip;\n","protected":false},"author":1,"featured_media":3757,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0},"categories":[11],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma: Zero Trust \u0130le G\u00fcvenli ve Verimli Bir Ortam Nas\u0131l Olu\u015fturulur? - Bulutistan Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma: Zero Trust \u0130le G\u00fcvenli ve Verimli Bir Ortam Nas\u0131l Olu\u015fturulur? - Bulutistan Blog\" \/>\n<meta property=\"og:description\" content=\"COVID-19 salg\u0131n\u0131, k\u00fcresel olarak \u015firketlerin %16&#8217;s\u0131n\u0131n art\u0131k tamamen uzaktan \u00e7al\u0131\u015fmas\u0131yla evden \u00e7al\u0131\u015fma trendini radikal bir \u015fekilde h\u0131zland\u0131rd\u0131. Uzaktan&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/\" \/>\n<meta property=\"og:site_name\" content=\"Bulutistan Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-16T21:07:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-20T10:32:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2023\/05\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bulutistan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bulutistan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/\",\"url\":\"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/\",\"name\":\"S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma: Zero Trust \u0130le G\u00fcvenli ve Verimli Bir Ortam Nas\u0131l Olu\u015fturulur? - Bulutistan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\"},\"datePublished\":\"2023-04-16T21:07:46+00:00\",\"dateModified\":\"2024-01-20T10:32:32+00:00\",\"author\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\",\"url\":\"https:\/\/bulutistan.com\/blog\/\",\"name\":\"Bulutistan Blog\",\"description\":\"Teknolojide Yol Arkada\u015f\u0131n\u0131z\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bulutistan.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\",\"name\":\"Bulutistan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"caption\":\"Bulutistan\"},\"sameAs\":[\"https:\/\/bulutistan.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma: Zero Trust \u0130le G\u00fcvenli ve Verimli Bir Ortam Nas\u0131l Olu\u015fturulur? - Bulutistan Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/","og_locale":"tr_TR","og_type":"article","og_title":"S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma: Zero Trust \u0130le G\u00fcvenli ve Verimli Bir Ortam Nas\u0131l Olu\u015fturulur? - Bulutistan Blog","og_description":"COVID-19 salg\u0131n\u0131, k\u00fcresel olarak \u015firketlerin %16&#8217;s\u0131n\u0131n art\u0131k tamamen uzaktan \u00e7al\u0131\u015fmas\u0131yla evden \u00e7al\u0131\u015fma trendini radikal bir \u015fekilde h\u0131zland\u0131rd\u0131. Uzaktan&hellip;","og_url":"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/","og_site_name":"Bulutistan Blog","article_published_time":"2023-04-16T21:07:46+00:00","article_modified_time":"2024-01-20T10:32:32+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2023\/05\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur.jpeg","type":"image\/jpeg"}],"author":"Bulutistan","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bulutistan","Tahmini okuma s\u00fcresi":"10 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/","url":"https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/","name":"S\u0131f\u0131r G\u00fcven ve Uzaktan \u00c7al\u0131\u015fma: Zero Trust \u0130le G\u00fcvenli ve Verimli Bir Ortam Nas\u0131l Olu\u015fturulur? - Bulutistan Blog","isPartOf":{"@id":"https:\/\/bulutistan.com\/blog\/#website"},"datePublished":"2023-04-16T21:07:46+00:00","dateModified":"2024-01-20T10:32:32+00:00","author":{"@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bulutistan.com\/blog\/sifir-guven-ve-uzaktan-calisma-zero-trust-ile-guvenli-ve-verimli-bir-ortam-nasil-olusturulur\/"]}]},{"@type":"WebSite","@id":"https:\/\/bulutistan.com\/blog\/#website","url":"https:\/\/bulutistan.com\/blog\/","name":"Bulutistan Blog","description":"Teknolojide Yol Arkada\u015f\u0131n\u0131z","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bulutistan.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e","name":"Bulutistan","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","caption":"Bulutistan"},"sameAs":["https:\/\/bulutistan.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3756"}],"collection":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/comments?post=3756"}],"version-history":[{"count":4,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3756\/revisions"}],"predecessor-version":[{"id":4201,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3756\/revisions\/4201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media\/3757"}],"wp:attachment":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media?parent=3756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/categories?post=3756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/tags?post=3756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}