IMPLEMENTASI ZERO TRUST NETWORK UNTUK MENINGKATKAN KEAMANAN JARINGAN MENGGUNAKAN FERRUMGATE DENGAN METODE NDLC
(1) Universitas Internasional Batam
(2) Universitas Internasional Batam
(3) Universitas Internasional Batam
(*) Corresponding Author
Abstract
As Cyber threats grow increasingly sophisticated, traditional network security measures are no longer adequate to safeguard critical data and resources. This study focuses on enhancing network security through the deployment of a Zero Trust Network utilizing the Ferrumgate platform. Employing the Network Development Life Cycle (NDLC) methodology, the research encompasses requirements analysis, the design of a segmented network, the implementation of Multi-Factor Authentication (MFA) using Google Authenticator, and User activity Monitoring. Findings reveal that Ferrumgate effectively restricts network access to verified Users and devices, significantly reducing risks posed by both internal and external threats. The adoption of MFA enhances security standards, while continuous Monitoring successfully detects and mitigates potential Cyberattacks. In summary, the NDLC-driven implementation of Ferrumgate demonstrated its effectiveness in bolstering network security, with a recommendation for regular evaluations and monitoring to ensure the system remains robust against emerging threats.
ABSTRAK
Dalam menghadapi ancaman Cyber yang semakin kompleks, pendekatan keamanan jaringan tradisional tidak lagi cukup untuk melindungi data dan aset penting. Penelitian ini bertujuan untuk memperkuat keamanan jaringan melalui implementasi Zero Trust Network dengan menggunakan platform Ferrumgate. Pendekatan penelitian dilakukan menggunakan metodologi Network Development Life Cycle (NDLC), yang meliputi analisis kebutuhan, perancangan jaringan yang tersegmentasi, penerapan autentikasi Multi-Factor Authentication – MFA dengan Google Authenticator, serta pemantauan aktivitas pengguna. Hasil penelitian mengindikasikan bahwa Ferrumgate mampu memastikan hanya perangkat dan pengguna yang terverifikasi yang dapat mengakses jaringan, sehingga risiko ancaman internal dan eksternal dapat diminimalkan. Integrasi MFA memberikan peningkatan signifikan pada keamanan, sementara sistem pemantauan berkelanjutan efektif dalam mendeteksi serta mencegah potensi serangan Cyber. Kesimpulannya, penerapan Ferrumgate berbasis NDLC terbukti efektif dalam meningkatakan keamanan jaringan, dengan rekomendasi untuk melakukan evaluasi dan pemantauan berkala guna menjaga efektivitas sistem terhadap ancaman yang terus berkembang.
Keywords
Full Text:
PDFReferences
Adhar, S., & Saprudin, U. (2023). Implementasi cloudflare zero trust dalam mendeteksi aktivitas cryptojcking pada jaringan komputer. Jurnal Teknologi Komputer Dan Sistem Informasi, 6(January). https://ojs.stmikpringsewu.ac.id/index.php/jtksi
Aklani, S. A., Haeruddin, H., & Putri, N. (2024). Implementasi Mail Gateway Security Dalam Meningkatkan Keamanan Email. Journal of Information System Management (JOISM), 5(2), 150–155. https://doi.org/10.24076/joism.2024v5i2.1378
Arogundade, & Richard, O. (2023). Network Security Concepts , Dangers , and Defense Best Practical. Computer Engineering and Intelligent Systems, 14(April). https://doi.org/10.7176/CEIS/14-2-03
Bodström, & Tero, T. (2022). Strategic cyber environment management with zero trust and cyber counterintelligence. Journal of Information Warfare, 21(3), 1–12. http://urn.fi/URN:NBN:fi:jyu-202208164124#
Dancheva, T., Alonso, U., Barton, M., Dancheva, T., & Barton, M. (2024). Cloud benchmarking and performance analysis of an HPC application in amazon EC2. Cluster Computing, 27(2), 2273–2290. https://doi.org/10.1007/s10586-023-04060-4
Deshpande, A. (2021). Relevance of zero trust network architecture amidts and it’s rapid adoption amidts work from home enforced by COVID-19. Psychology and Education Journal, 58(January), 5672–5677. https://doi.org/10.17762/pae.v58i1.2190
DetikInet. (2022). 5 Kebocoran Data di RI yang Diumbar Hacker Bjorka. Detik.Com. https://www.detik.com/jabar/berita/d-6284694/5-kebocoran-data-di-ri-yang-diumbar-hacker-bjorka
Ferrumgate. (2023). Ferrumgate. Ferrumgate.Com. https://ferrumgate.com/docs/getting-started/
Habash, R. M., & Ibrahem, M. K. (2023). Zero trust security model for enterprise networks. Iraqi Journal of Information and Communications Technology, 6(2), 68–77. https://doi.org/10.31987/ijict.6.2.223
Haeruddin, H., Wijaya, G., & Khatimah, H. (2023). Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut. JITU : Journal Informatic Technology And Communication, 7(2), 102–113. https://doi.org/10.36596/jitu.v7i2.1086
Nivarthi Panchangam Sharma, K., & Gatla, G. (2022). Fighting Cybercrime with Zero Trust. American Academic Scientific Research Journal of Engineering, Technology, and Sciences, 90(December), 371–381. http://asrjetsjournal.org/%0AFighting
Pratama, A. P., Sugiyanta, L., & Idrus, A. (2023). Design and implementation of freeradius as a user manager on the mikrotik hotspot network at PT indotruck utama using the NDLC ( network development life cycle ) method. International Journal of Information System & Technology, 7(158), 136–143.
Silva, D. D. (2021). Building A Zero Trust Architecture Using Kubernetes. International Conference for Convergence in Technology, 1–8.
Suryo, A. (2023). 1,5 Terabite Data BSI Dicuri Geng Ransomware LockBit. Detik.Com. https://www.detik.com/jatim/bisnis/d-6718693/1-5-terabite-data-bsi-dicuri-geng-ransomware-lockbit
Tang, F., Ma, C., & Cheng, K. (2023). Privacy-preserving authentication scheme based on zero trust architecture. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2023.01.021
Tudosi, A., Graur, A., Balan, D. G., & Potorac, A. D. (2023). Research on security weakness using penetration testing in a distributed firewall. Department of Computers, Electronics and Automation, Stefan Cel Mare University of Suceava, 23(February), 2683. https://doi.org/https://doi.org/10.3390/s23052683
Yeoh, W., Liu, M., Shore, M., & Jiang, F. (2023). Computers & Security Zero trust cybersecurity : Critical success factors and A maturity assessment framework. Computers & Security, 133(July), 103412. https://doi.org/10.1016/j.cose.2023.103412
DOI: https://doi.org/10.37365/jti.v10i2.324
Refbacks
- There are currently no refbacks.