Sökning: "Keycloak"

Hittade 3 uppsatser innehållade ordet Keycloak.

  1. 1. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Victor Pero; Linus Ekman; [2023]
    Nyckelord :Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Sammanfattning : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. LÄS MER

  2. 2. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Thomas Yacob; [2023]
    Nyckelord :Zero Trust; GitLab; Docker; Keycloak; GPG keys; sensitive data; firewalls;

    Sammanfattning : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. LÄS MER

  3. 3. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Nyckelord :Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Sammanfattning : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. LÄS MER