Netinfo Security ›› 2020, Vol. 20 ›› Issue (10): 83-91.doi: 10.3969/j.issn.1671-1122.2020.10.011

Previous Articles     Next Articles

A Zero Trust Network Research Based on Overlay Technology

LIU Yuan1(), SUN Chen2, ZHANG Yanling3   

  1. 1. China Petrochemical Corporation, Beijing 100728, China
    2. Petro-cyber Works Information Technology Co., Ltd., Beijing 100007, China
    3. MPS Information Classified Security Protection Evaluation Center,Beijing 100142, China
  • Received:2020-07-09 Online:2020-10-10 Published:2020-11-25
  • Contact: LIU Yuan E-mail:liuyuan@sinopec.com

Abstract:

With the rapid development of cloud computing, mobile Internet, Internet of things, and 5G technology, enterprises have accelerated the digital transformation and the evolution of the IT environment. The traditional boundary network architecture and boundary security defense model are designed for the declining traditional business architecture, which can’t meet the dynamic security access requirements of digital services. Enterprises need to actively adjust the network security architecture to meet the security needs under the new network architecture. Based on the research goal of constructing the security defense model under the framework of borderless network and coupled with the combination of practical experience, this paper uses overlay network technology and zero trust security model and puts forward a method to build a new generation of information infrastructure in enterprises, which has universal reference significance.

Key words: zero trust, overlay network, unbounded network

CLC Number: