Research Article
BibTex RIS Cite

DtyPAM: Kurumsal Destek Firmaları için Önerilmiş Konteynır Tabanlı Ayrıcalıklı Erişim Yönetim Sistemi

Year 2023, Volume: 4 Issue: 2, 67 - 75, 30.12.2023
https://doi.org/10.54047/bibted.1326467

Abstract

Bilişim alanında önceki zamanlarda da uygulanan uzaktan destek ve uzaktan çalışma kavramları, 2019 yılında başlayan ve tüm dünyayı etkisi altına alan COVID-19 salgını ile hemen hemen tüm sektörler tarafından uygulanmaya başlamıştır. Ölçeği ne olursa olsun bütün girişimler dijital uygulamaları kullanmakta ya da kullanma planı yapmaktadır. Özellikle holding düzeyindeki firmalar, birçok iş sürecini karmaşık kurumsal kaynak planlama uygulamaları üzerinden yürütmektedir. Bu uygulamalar içinse genellikle dış kaynaklardan destek almakta ve bu destekler günümüzde sıklıkla uzaktan yapılmaktadır. Bu aşamada kurumlar güçlü bir erişim yönetim sistemine ihtiyaç duymaktadırlar. Bahsedilen sebeplerden ötürü çalışmamızda uzaktan bağlantı ve destek süreçlerinin sanal masaüstü alt yapısı kullanarak otomatik olarak yapılabileceği bir ayrıcalıklı erişim yönetim sistemi önerilmiştir. Tasarlanan sistem ile kullanıcılara, bağlantı sağlanacak sunucuda yapılacak olan iş için en az düzeyde ayrıcalık verilmesi hedeflenmektedir. Bir sunucuya yapılan bağlantıların geriye dönük takibinin rahatlıkla yapılabilmesi için, çalışma sonucu önerilmiş olan ayrıcalıklı erişim yönetim uygulamasına güçlü bir kayıt defteri sistemi (log) eklenmiştir. Eklenecek olan bu kayıt sistemi sayesinde önermiş olduğumuz sistem veri madenciliği ve iş zekâsı gibi analizlere de uyumlu olacaktır. Bahsedilen tüm özelliklerin yanı sıra önerilen sistemin ölçeklenebilir ve mikro-servis tabanlı olması, literatürde var olan yöntemlerden farklılık göstermesini sağlamaktadır.

References

  • Alruwies, M., Mishra, S., Abdul, M., & Alshehri, R. (2021). Identity Governance Framework for Privileged Users. Computer Systems Science and Engineering, 40. https://doi.org/10.32604/csse.2022.019355
  • Anton, P., & Soetomo, M. (2018). Assessing Privileged Access Management (PAM) using ISO 27001: 2013 Control. 5, 65-76. Annual Conference on Management and Information Technology.
  • Docker Documentation. (200M.S., 42:25 + +0200). Geliş tarihi 02 Ekim 2023, gönderen Docker Documentation website: https://docs.docker.com/
  • D’Silva, D., & Ambawade, D. D. (2021). Building A Zero Trust Architecture Using Kubernetes. 2021 6th International Conference for Convergence in Technology (I2CT), 1-8. https://doi.org/10.1109/I2CT51068.2021.9418203
  • Elasticsearch: The Official Distributed Search & Analytics Engine. (t.y.). Geliş tarihi 02 Ekim 2023, gönderen Elastic website: https://www.elastic.co/elasticsearch
  • Elasticsearch vs MongoDB - A detailed comparison of Document-Oriented Databases | SigNoz. (2023, Ocak 20). Geliş tarihi 08 Ekim 2023, gönderen https://signoz.io/blog/elasticsearch-vs-mongodb/
  • Garbis, J., & Chapman, J. W. (2021). Privileged Access Management. Içinde J. Garbis & J. W. Chapman (Ed.), Zero Trust Security: An Enterprise Guide (ss. 155-161). Berkeley, CA: Apress. https://doi.org/10.1007/978-1-4842-6702-8_12
  • Getting to Know Kubevirt. (2018, Mayıs 22). Geliş tarihi 02 Ekim 2023, gönderen Kubernetes website: https://kubernetes.io/blog/2018/05/22/getting-to-know-kubevirt/
  • Infrastructure as code. (2023). Içinde Wikipedia. Geliş tarihi gönderen https://en.wikipedia.org/w/index.php?title=Infrastructure_as_code&oldid=1176394945
  • Ionita, V. (2023). Privileged access management for databases. Geliş tarihi gönderen https://aaltodoc.aalto.fi:443/handle/123456789/122872
  • Kubernetes Documentation. (t.y.). Geliş tarihi 02 Ekim 2023, gönderen Kubernetes website: https://kubernetes.io/docs/home/
  • Lang, D., Jiang, H., Ding, W., & Bai, Y. (2019). Research on Docker Role Access Control Mechanism Based on DRBAC. Journal of Physics: Conference Series, 1168(3), 032127. https://doi.org/10.1088/1742-6596/1168/3/032127
  • Preuveneers, D., & Joosen, W. (t.y.). Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM.
  • Sindiren, E., & Ciylan, B. (2018). Privileged Account Management Approach for Preventing Insider Attacks.
  • Sindiren, E., & Ciylan, B. (2019). Application model for privileged account access control system in enterprise networks. Computers & Security, 83, 52-67. https://doi.org/10.1016/j.cose.2019.01.008
  • Steinhoff, M. (2020). Using Software Containers for Privileged Access Management in Cloud Environments: A Novel Approach to Handle Access Management for Cloud-based Networks. Nordic and Baltic Journal of Information & Communications Technologies, 297-310. https://doi.org/10.13052/nbjict1902-097X.2020.013
  • Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493-9532. https://doi.org/10.1007/s11227-020-03213-1
  • Tep, K. S., Martini, B., Hunt, R., & Choo, K.-K. R. (2015). A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. 2015 IEEE Trustcom/BigDataSE/ISPA, 1, 1073-1080. https://doi.org/10.1109/Trustcom.2015.485
  • Tran, L. (2020). Privileged Access Management for System to System communications. Geliş tarihi gönderen https://aaltodoc.aalto.fi:443/handle/123456789/46232
  • What Is NoSQL? NoSQL Databases Explained. (t.y.). Geliş tarihi 02 Ekim 2023, gönderen MongoDB website: https://www.mongodb.com/nosql-explained
  • Ylonen, T., Turner, P., Scarfone, K., & Souppaya, M. (2015). Security of Interactive and Automated Access Management Using Secure Shell (SSH) (Sy NIST IR 7966; s. NIST IR 7966). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.7966

DtyPAM: Container Based Privilege Access Management System for Corporate Consulting Companies

Year 2023, Volume: 4 Issue: 2, 67 - 75, 30.12.2023
https://doi.org/10.54047/bibted.1326467

Abstract

The concepts of remote support and remote work, which were also applied in the field of informatics in previous times, have started to be applied by almost all sectors with the COVID-19 epidemic that started in 2019 and affected the whole world. Regardless of the scale, all enterprises use or plan to use digital applications. In particular, companies at the holding level carry out many business processes through complex enterprise resource planning applications. For these applications, they usually get support from external sources and these supports are often done remotely today. At this stage, institutions need a strong access management system. For the aforementioned reasons, a privileged access management system has been proposed in our study, where remote connection and support processes can be done automatically using the virtual desktop infrastructure. With the designed system, it is aimed to give the users minimal privileges for the work to be done on the server to which the connection will be provided. A powerful registry system (log) has been added to the privileged access management application, which was suggested as a result of the study, so that the connections made to a server can be easily tracked retrospectively. Thanks to this recording system to be added, the system we propose will be compatible with analyzes such as data mining and business intelligence. In addition to all the mentioned features, the proposed system is scalable and micro-service-based, making it different from the existing methods in the literature.

References

  • Alruwies, M., Mishra, S., Abdul, M., & Alshehri, R. (2021). Identity Governance Framework for Privileged Users. Computer Systems Science and Engineering, 40. https://doi.org/10.32604/csse.2022.019355
  • Anton, P., & Soetomo, M. (2018). Assessing Privileged Access Management (PAM) using ISO 27001: 2013 Control. 5, 65-76. Annual Conference on Management and Information Technology.
  • Docker Documentation. (200M.S., 42:25 + +0200). Geliş tarihi 02 Ekim 2023, gönderen Docker Documentation website: https://docs.docker.com/
  • D’Silva, D., & Ambawade, D. D. (2021). Building A Zero Trust Architecture Using Kubernetes. 2021 6th International Conference for Convergence in Technology (I2CT), 1-8. https://doi.org/10.1109/I2CT51068.2021.9418203
  • Elasticsearch: The Official Distributed Search & Analytics Engine. (t.y.). Geliş tarihi 02 Ekim 2023, gönderen Elastic website: https://www.elastic.co/elasticsearch
  • Elasticsearch vs MongoDB - A detailed comparison of Document-Oriented Databases | SigNoz. (2023, Ocak 20). Geliş tarihi 08 Ekim 2023, gönderen https://signoz.io/blog/elasticsearch-vs-mongodb/
  • Garbis, J., & Chapman, J. W. (2021). Privileged Access Management. Içinde J. Garbis & J. W. Chapman (Ed.), Zero Trust Security: An Enterprise Guide (ss. 155-161). Berkeley, CA: Apress. https://doi.org/10.1007/978-1-4842-6702-8_12
  • Getting to Know Kubevirt. (2018, Mayıs 22). Geliş tarihi 02 Ekim 2023, gönderen Kubernetes website: https://kubernetes.io/blog/2018/05/22/getting-to-know-kubevirt/
  • Infrastructure as code. (2023). Içinde Wikipedia. Geliş tarihi gönderen https://en.wikipedia.org/w/index.php?title=Infrastructure_as_code&oldid=1176394945
  • Ionita, V. (2023). Privileged access management for databases. Geliş tarihi gönderen https://aaltodoc.aalto.fi:443/handle/123456789/122872
  • Kubernetes Documentation. (t.y.). Geliş tarihi 02 Ekim 2023, gönderen Kubernetes website: https://kubernetes.io/docs/home/
  • Lang, D., Jiang, H., Ding, W., & Bai, Y. (2019). Research on Docker Role Access Control Mechanism Based on DRBAC. Journal of Physics: Conference Series, 1168(3), 032127. https://doi.org/10.1088/1742-6596/1168/3/032127
  • Preuveneers, D., & Joosen, W. (t.y.). Federated Privileged Identity Management for Break-the-Glass: A Case Study with OpenAM.
  • Sindiren, E., & Ciylan, B. (2018). Privileged Account Management Approach for Preventing Insider Attacks.
  • Sindiren, E., & Ciylan, B. (2019). Application model for privileged account access control system in enterprise networks. Computers & Security, 83, 52-67. https://doi.org/10.1016/j.cose.2019.01.008
  • Steinhoff, M. (2020). Using Software Containers for Privileged Access Management in Cloud Environments: A Novel Approach to Handle Access Management for Cloud-based Networks. Nordic and Baltic Journal of Information & Communications Technologies, 297-310. https://doi.org/10.13052/nbjict1902-097X.2020.013
  • Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: Issues, threats, and solutions. The Journal of Supercomputing, 76(12), 9493-9532. https://doi.org/10.1007/s11227-020-03213-1
  • Tep, K. S., Martini, B., Hunt, R., & Choo, K.-K. R. (2015). A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. 2015 IEEE Trustcom/BigDataSE/ISPA, 1, 1073-1080. https://doi.org/10.1109/Trustcom.2015.485
  • Tran, L. (2020). Privileged Access Management for System to System communications. Geliş tarihi gönderen https://aaltodoc.aalto.fi:443/handle/123456789/46232
  • What Is NoSQL? NoSQL Databases Explained. (t.y.). Geliş tarihi 02 Ekim 2023, gönderen MongoDB website: https://www.mongodb.com/nosql-explained
  • Ylonen, T., Turner, P., Scarfone, K., & Souppaya, M. (2015). Security of Interactive and Automated Access Management Using Secure Shell (SSH) (Sy NIST IR 7966; s. NIST IR 7966). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.7966
There are 21 citations in total.

Details

Primary Language Turkish
Subjects Information Security Management, Business Process Management, Dependable Systems, Data and Information Privacy
Journal Section Research Articles
Authors

Hamza Kürşat Şimşek 0009-0009-5274-8698

Halil Arslan 0000-0003-3286-5159

Yasin Görmez 0000-0001-8276-2030

Early Pub Date December 14, 2023
Publication Date December 30, 2023
Submission Date July 12, 2023
Acceptance Date December 1, 2023
Published in Issue Year 2023 Volume: 4 Issue: 2

Cite

APA Şimşek, H. K., Arslan, H., & Görmez, Y. (2023). DtyPAM: Kurumsal Destek Firmaları için Önerilmiş Konteynır Tabanlı Ayrıcalıklı Erişim Yönetim Sistemi. Bilgisayar Bilimleri Ve Teknolojileri Dergisi, 4(2), 67-75. https://doi.org/10.54047/bibted.1326467