IMPLEMENTASI ZERO TRUST NETWORK UNTUK MENINGKATKAN KEAMANAN JARINGAN MENGGUNAKAN FERRUMGATE DENGAN METODE NDLC

Haeruddin Haeruddin(1*), Felix Favian(2), Stefanus Eko Prasetyo(3),

(1) Universitas Internasional Batam
(2) Universitas Internasional Batam
(3) Universitas Internasional Batam
(*) Corresponding Author

Abstract


As Cyber threats grow increasingly sophisticated, traditional network security measures are no longer adequate to safeguard critical data and resources. This study focuses on enhancing network security through the deployment of a Zero Trust Network utilizing the Ferrumgate platform. Employing the Network Development Life Cycle (NDLC) methodology, the research encompasses requirements analysis, the design of a segmented network, the implementation of Multi-Factor Authentication (MFA) using Google Authenticator, and User activity Monitoring. Findings reveal that Ferrumgate effectively restricts network access to verified Users and devices, significantly reducing risks posed by both internal and external threats. The adoption of MFA enhances security standards, while continuous Monitoring successfully detects and mitigates potential Cyberattacks. In summary, the NDLC-driven implementation of Ferrumgate demonstrated its effectiveness in bolstering network security, with a recommendation for regular evaluations and monitoring to ensure the system remains robust against emerging threats.

 

ABSTRAK

Dalam menghadapi ancaman Cyber yang semakin kompleks, pendekatan keamanan jaringan tradisional tidak lagi cukup untuk melindungi data dan aset penting. Penelitian ini bertujuan untuk memperkuat keamanan jaringan melalui implementasi Zero Trust Network dengan menggunakan platform Ferrumgate. Pendekatan penelitian dilakukan menggunakan metodologi Network Development Life Cycle (NDLC), yang meliputi analisis kebutuhan, perancangan jaringan yang tersegmentasi, penerapan autentikasi Multi-Factor Authentication – MFA dengan Google Authenticator, serta pemantauan aktivitas pengguna. Hasil penelitian mengindikasikan bahwa Ferrumgate mampu memastikan hanya perangkat dan pengguna yang terverifikasi yang dapat mengakses jaringan, sehingga risiko ancaman internal dan eksternal dapat diminimalkan. Integrasi MFA memberikan peningkatan signifikan pada keamanan, sementara sistem pemantauan berkelanjutan efektif dalam mendeteksi serta mencegah potensi serangan Cyber. Kesimpulannya, penerapan Ferrumgate berbasis NDLC terbukti efektif dalam meningkatakan keamanan jaringan, dengan rekomendasi untuk melakukan evaluasi dan pemantauan berkala guna menjaga efektivitas sistem terhadap ancaman yang terus berkembang.


Keywords


Zero Trust Network, Ferrumgate, Multi-Factor Authentication, Cyber Threat, Monitoring.

Full Text:

PDF

References


Adhar, S., & Saprudin, U. (2023). Implementasi cloudflare zero trust dalam mendeteksi aktivitas cryptojcking pada jaringan komputer. Jurnal Teknologi Komputer Dan Sistem Informasi, 6(January). https://ojs.stmikpringsewu.ac.id/index.php/jtksi

Aklani, S. A., Haeruddin, H., & Putri, N. (2024). Implementasi Mail Gateway Security Dalam Meningkatkan Keamanan Email. Journal of Information System Management (JOISM), 5(2), 150–155. https://doi.org/10.24076/joism.2024v5i2.1378

Arogundade, & Richard, O. (2023). Network Security Concepts , Dangers , and Defense Best Practical. Computer Engineering and Intelligent Systems, 14(April). https://doi.org/10.7176/CEIS/14-2-03

Bodström, & Tero, T. (2022). Strategic cyber environment management with zero trust and cyber counterintelligence. Journal of Information Warfare, 21(3), 1–12. http://urn.fi/URN:NBN:fi:jyu-202208164124#

Dancheva, T., Alonso, U., Barton, M., Dancheva, T., & Barton, M. (2024). Cloud benchmarking and performance analysis of an HPC application in amazon EC2. Cluster Computing, 27(2), 2273–2290. https://doi.org/10.1007/s10586-023-04060-4

Deshpande, A. (2021). Relevance of zero trust network architecture amidts and it’s rapid adoption amidts work from home enforced by COVID-19. Psychology and Education Journal, 58(January), 5672–5677. https://doi.org/10.17762/pae.v58i1.2190

DetikInet. (2022). 5 Kebocoran Data di RI yang Diumbar Hacker Bjorka. Detik.Com. https://www.detik.com/jabar/berita/d-6284694/5-kebocoran-data-di-ri-yang-diumbar-hacker-bjorka

Ferrumgate. (2023). Ferrumgate. Ferrumgate.Com. https://ferrumgate.com/docs/getting-started/

Habash, R. M., & Ibrahem, M. K. (2023). Zero trust security model for enterprise networks. Iraqi Journal of Information and Communications Technology, 6(2), 68–77. https://doi.org/10.31987/ijict.6.2.223

Haeruddin, H., Wijaya, G., & Khatimah, H. (2023). Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut. JITU : Journal Informatic Technology And Communication, 7(2), 102–113. https://doi.org/10.36596/jitu.v7i2.1086

Nivarthi Panchangam Sharma, K., & Gatla, G. (2022). Fighting Cybercrime with Zero Trust. American Academic Scientific Research Journal of Engineering, Technology, and Sciences, 90(December), 371–381. http://asrjetsjournal.org/%0AFighting

Pratama, A. P., Sugiyanta, L., & Idrus, A. (2023). Design and implementation of freeradius as a user manager on the mikrotik hotspot network at PT indotruck utama using the NDLC ( network development life cycle ) method. International Journal of Information System & Technology, 7(158), 136–143.

Silva, D. D. (2021). Building A Zero Trust Architecture Using Kubernetes. International Conference for Convergence in Technology, 1–8.

Suryo, A. (2023). 1,5 Terabite Data BSI Dicuri Geng Ransomware LockBit. Detik.Com. https://www.detik.com/jatim/bisnis/d-6718693/1-5-terabite-data-bsi-dicuri-geng-ransomware-lockbit

Tang, F., Ma, C., & Cheng, K. (2023). Privacy-preserving authentication scheme based on zero trust architecture. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2023.01.021

Tudosi, A., Graur, A., Balan, D. G., & Potorac, A. D. (2023). Research on security weakness using penetration testing in a distributed firewall. Department of Computers, Electronics and Automation, Stefan Cel Mare University of Suceava, 23(February), 2683. https://doi.org/https://doi.org/10.3390/s23052683

Yeoh, W., Liu, M., Shore, M., & Jiang, F. (2023). Computers & Security Zero trust cybersecurity : Critical success factors and A maturity assessment framework. Computers & Security, 133(July), 103412. https://doi.org/10.1016/j.cose.2023.103412




DOI: https://doi.org/10.37365/jti.v10i2.324

Refbacks

  • There are currently no refbacks.


Slot Gacor

mahjong ways scatter hitam

slot thailand