企業有逐漸有雲端伺服器的需求,又正巧面臨2019年之後的疫情爆發開始有了遠距辦公的需求,但卻接連發生因為進階持續性威脅 (Advanced Persistent Threat, APT)攻擊資安危機,因為傳統透過VPN讓員工進入內網的作法,雖然VPN本身擁有足夠的安全規劃,與特有的加密隧道,能夠加密傳輸的封包,然而VPN最大的問題在於節點,如果各個節點其中之一出現問題,如本身就是惡意的節點,或者個人電腦遭到駭客入侵,個人電腦遭到監聽與側錄,而VPN帳號、密碼或憑證被竊用,內網就被輕易突破,進而遭成企業的資安風險。本論文希望透過零信任網路的七項安全定義,結合防火牆與VPN技術,並且對使用者與設備進行反覆驗證,以確保使用者的身分,同時在實驗中使用Surfshark和wireshark來展示封包的內容。概念上,必須假設使用者的帳戶與裝置都不能信任,因此強調內部網路應該如同外部網路,需要有同樣的安全政策,進行嚴格的控管,使用多類型認證模式,強調反覆驗證,這種對於網路資源與使用者不信任的態度,並且零信任架構同時還強調了持續驗證以確保安全,透過反覆驗證使用者的身分,能夠補足VPN在使用上的一些缺點,進一步保障企業內部資訊安全。本文將透過Surfshark作為VPN的連線工具,並以wireshark搭配Microsoft內建的CMD作為監控防火牆封包的監視工具,來探討防火牆封包的內容,目的在建構一個由零信任網路、VPN與防火牆共同組成一個能夠防範APT攻擊的遠端辦公安全架構。
Since the outbreak of covid-19, enterprises adopting work-from home and the demand for cloud servers are growing. Information seurity have increasing becoming a significant issue due to the frequent use of network access. Legacy VPN access of office intranet allows employees working remotely while keeping the whole network traffic encrypted.Advanced Persistent Threat (APT) attacks on information security crisis occurs because of the traditional practice of giving employees access to the intranet through a VPN, though the VPN itself has adequate security planning and a unique encrypted tunnel that encrypts the transmitted packets. The biggest problem with VPNs is the relaying nodes.If one of the nudes is compromised the network traffic will thus prone to being monitored and recorded, and the VPN account, password or credentials can be copied, and the intranet becoming open to intruders, which can lead to security risks for the enterprise. This paper aims to combine the seven security definitions of a zero-trust network with firewall and VPN technologies, and to authenticate users and devices repeatedly to ensure user identity, while using Surfshark and wireshark to demonstrate the contents of packets in the experiment. Conceptually, it must be assumed that both the user's account and device cannot be trusted. Therefore, it is emphasized that the internal network should have the same security policy as the external network, with strict control, using multiple types of authentication models, and emphasizing repeated authentication. This distrustful attitude toward network resources and users, and the zero-trust framework also emphasizes continuous authentication to ensure security. By repeatedly verifying the identity of users, it can complement some shortcomings in the use of VPN and further protect the security of information within the enterprise.