Downloads: 13 | Views: 69 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Informative Article | Computer Science and Information Technology | United States of America | Volume 13 Issue 6, June 2024 | Popularity: 5.5 / 10
Deparameterizing the Oil and Gas Industry Infrastructure with Zero Trust Architecture and Improve the Cyber Security
Suchismita Chatterjee
Abstract: The Oil and Gas industry is an important industry and critical industry as many organizations and civil society depends on them for their day-to-day activities. Hence the Oil and Gas industry is always in the crosshair of cyber criminals or enemy state players. Oil and Gas Infrastructure always focus on securing their infrastructure, but since the number of ends point, they operate are in thousand and hundreds of services and sites distributes all over the country makes the security the infrastructure a big challenge. To add to the challenge, there is an ever-evolving nature of the IT infrastructure. The current security posture of the Oil and Gas industry is more static in nature and using mix of latest and traditional security devices. In this paper will be looking into the concept of Zero Trust and Zero trust Architecture. Here we will be looking at different components of the Zero Trust Architecture and explore the concepts where the Zero Trust Architecture can be used to manage the access control at much more granular level and how the architecture can help to identify any new vulnerability or attack in real time and dynamically react to the incident and secure the network and better manage the security posture of the industry.
Keywords: Zero Trust, Utility Industry, Virtual Asset Management, Cybersecurity, Cyber Hacks, DevSecOps, Automation
Edition: Volume 13 Issue 6, June 2024
Pages: 1931 - 1935
DOI: https://www.doi.org/10.21275/SR241221044359
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science and Information Technology, United States of America, Volume 8 Issue 6, June 2019
Pages: 2454 - 2456Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools
Satheesh Reddy Gopireddy
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Case Studies, Computer Science and Information Technology, United States of America, Volume 13 Issue 8, August 2024
Pages: 1374 - 1382DevSecOps in Cloud Native CyberSecurity: Shifting Left for Early Security, Securing Right with Continuous Protection
Ramakrishna Manchana
Downloads: 6 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Informative Article, Computer Science and Information Technology, United States of America, Volume 13 Issue 12, December 2024
Pages: 1163 - 1171Disaster Recovery Plan in Utility Industry for Virtual Asset Management - A Comprehensive Overview to Avoid Cyber Attack
Suchismita Chatterjee