{"id":11646,"date":"2023-08-24T10:00:29","date_gmt":"2023-08-24T07:00:29","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11646"},"modified":"2023-08-21T23:12:48","modified_gmt":"2023-08-21T20:12:48","slug":"how-to-benefit-from-identity-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-benefit-from-identity-security\/11646\/","title":{"rendered":"Kimlik g\u00fcvenli\u011fi: nedir ve neden faydal\u0131d\u0131r?"},"content":{"rendered":"<p>Dijital i\u015f d\u00f6n\u00fc\u015f\u00fcm\u00fcn\u00fcn faydalar\u0131 yaz\u0131l\u0131 kan\u0131tlara dayan\u0131r: s\u00fcre\u00e7ler modernle\u015ftirilir, i\u015f \u00f6l\u00e7eklendirmesi daha kolay hale gelir ve \u00fcr\u00fcn ve hizmet olu\u015fturma s\u00fcreci b\u00fcy\u00fck \u00f6l\u00e7\u00fcde h\u0131zlan\u0131r. Ancak siber sald\u0131r\u0131lar\u0131n say\u0131s\u0131 ve neden olduklar\u0131 hasar her ge\u00e7en y\u0131l artt\u0131\u011f\u0131ndan, g\u00fcvenlik riskleri bu t\u00fcr bir d\u00f6n\u00fc\u015f\u00fcm\u00fcn \u00f6n\u00fcnde giderek daha b\u00fcy\u00fck bir engel haline gelmektedir. \u0130statistikler, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/\">\u015firketlere y\u00f6nelik sald\u0131r\u0131lar\u0131n %60\u2019\u0131ndan fazlas\u0131n\u0131n<\/a> hesaplar\u0131n veya eri\u015fim belirte\u00e7lerinin \u00e7al\u0131nmas\u0131yla ba\u015flad\u0131\u011f\u0131n\u0131 g\u00f6steriyor. Ayr\u0131ca, \u00e7o\u011fu \u015firketin hesap y\u00f6netimi ve g\u00fcvenli\u011fine yakla\u015f\u0131m\u0131 korkun\u00e7 bi\u00e7imde modas\u0131 ge\u00e7mi\u015f durumda ve hala 30 y\u0131ll\u0131k teknolojilere dayan\u0131yor. Bu arada, altyap\u0131 b\u00fcy\u00fck bir h\u0131zla ilerledi \u2014 art\u0131k genel bulutlara, uzak i\u015f istasyonlar\u0131na ve di\u011fer kullan\u0131\u015fl\u0131 ancak, \u00e7o\u011fu zaman g\u00fcvensiz teknolojilere sahibiz.<\/p>\n<p>Hesap g\u00fcvenli\u011fini modernize etmek, \u015firketinizin BT sistemlerinde uzun vadeli b\u00fcy\u00fcme potansiyeli olu\u015fturmak i\u00e7in atabilece\u011finiz en \u00f6nemli ve stratejik a\u00e7\u0131dan de\u011ferli ad\u0131mlardan biridir. Temel dijital hijyen \u00f6nlemleri \u2014 \u00f6rne\u011fin <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/edr-security-software-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">u\u00e7 nokta ve sunucu korumas\u0131<\/a> ve birle\u015ftirilmi\u015f BT ve IS politikalar\u0131 zaten y\u00fcr\u00fcrl\u00fckteyse, bir sonraki mant\u0131kl\u0131 ad\u0131m \u201ckimlik g\u00fcvenli\u011fini\u201d uygulamakt\u0131r.<\/p>\n<h2>Kimlik g\u00fcvenli\u011finin temel ilkeleri<\/h2>\n<p><strong>Her t\u00fcrl\u00fc hesap ve kimlik y\u00f6netimi<\/strong>. Kimlik kavram\u0131n\u0131n yaln\u0131zca \u00e7al\u0131\u015fan hesaplar\u0131 i\u00e7in de\u011fil, ayn\u0131 zamanda sunucular ve uygulamalar i\u00e7in de ge\u00e7erli oldu\u011funu anlamak \u00f6nem ta\u015f\u0131r. Modern \u015firketlerde, canl\u0131 olmayan hesaplar\u0131n say\u0131s\u0131 genellikle \u00e7al\u0131\u015fan say\u0131s\u0131ndan \u00e7ok daha fazlad\u0131r. Kapsaml\u0131 bir kimlik g\u00fcvenli\u011fi yakla\u015f\u0131m\u0131, eri\u015fim belirte\u00e7lerini, uygulamalarda depolanan gizli anahtarlar\u0131 vb. y\u00f6netmek anlam\u0131na gelir.<\/p>\n<p><strong>G\u00fcvenilir kimlik do\u011frulama. <\/strong>Bu, hesap koruman\u0131n temel ta\u015f\u0131d\u0131r. \u015eirket, her bir \u00e7al\u0131\u015fan, hizmet veya sunucu i\u00e7in eri\u015fim ve risk d\u00fczeyini dikkate alan g\u00fcncel \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama standartlar\u0131n\u0131 uygulamal\u0131d\u0131r.<\/p>\n<p><strong>Orant\u0131l\u0131, yap\u0131land\u0131r\u0131lm\u0131\u015f yetkilendirme.<\/strong> Kimli\u011fi do\u011frulanm\u0131\u015f bir hesaba, eldeki i\u015f i\u00e7in gerekli ve yeterli eri\u015fim ve izinler verilmelidir, daha fazlas\u0131 de\u011fil. Eri\u015fim ve izinler, merkezi bir ilkeye g\u00f6re tan\u0131mlan\u0131r ve ayn\u0131 g\u00f6revi ger\u00e7ekle\u015ftiren \u00e7al\u0131\u015fanlar veya hizmetler i\u00e7in ayn\u0131d\u0131r. \u0130deal senaryoda, en az ayr\u0131cal\u0131k ilkesinin yan\u0131 s\u0131ra, g\u00fcncellik ilkesini de uygulaman\u0131z gerekir; yani izinler, tam olarak ihtiya\u00e7 duyulduklar\u0131 s\u00fcre boyunca verilmelidir. \u00d6rne\u011fin, y\u00f6neticilere bir sunucuya yaln\u0131zca sunucuda gerekli bak\u0131m\u0131 ger\u00e7ekle\u015ftirirken \u00fcst d\u00fczey eri\u015fim verilir ve ard\u0131ndan ayr\u0131cal\u0131klar\u0131 otomatik olarak temel d\u00fczeye indirilir.<\/p>\n<p><strong>Merkezi hale getirme<\/strong> ve <strong>denetlenebilirlik<\/strong>. Ama\u00e7, hesap veri taban\u0131n\u0131 merkezile\u015ftirmek ve SSO (tek oturum a\u00e7ma) kullanarak kimlik do\u011frulama s\u00fcrecini birle\u015ftirmek olmal\u0131d\u0131r. Kimlik do\u011frulama ve yetkilendirmenin t\u00fcm a\u015famalar\u0131 dikkatlice kaydedilmeli ve hesaplar\u0131n eklenmesi, de\u011fi\u015ftirilmesi veya silinmesi dikkatli bir \u015fekilde d\u00fczenlenerek belgelenmelidir. B\u00f6ylece di\u011fer kimlik g\u00fcvenli\u011fi ilkelerini ihlal etme riski b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azalt\u0131l\u0131r. Ayr\u0131ca, kontroll\u00fc ve merkezi bir kimlik do\u011frulama portal\u0131 ile \u015firket, korsan faaliyetlerine \u00f6zg\u00fc anormallikleri belirleyerek siber sald\u0131r\u0131lar\u0131 daha erken ve daha etkili bir \u015fekilde tespit edebilir.<\/p>\n<p>Hesap g\u00fcvenli\u011fi ve ayr\u0131cal\u0131kl\u0131 eri\u015fim y\u00f6netiminin uygulanmas\u0131, s\u0131f\u0131r g\u00fcven bilgi g\u00fcvenli\u011fi mimarisinin olu\u015fturulmas\u0131nda hayati bir ad\u0131md\u0131r.<\/p>\n<h2>\u00c7al\u0131\u015fanlar a\u00e7\u0131s\u0131ndan hesap g\u00fcvenli\u011fi<\/h2>\n<p>\u0130yi tasarlanm\u0131\u015f hesap korumas\u0131, i\u015fleri karma\u015f\u0131k hale getirmez; aksine \u00e7al\u0131\u015fanlar\u0131n hayat\u0131n\u0131 kolayla\u015ft\u0131r\u0131r. \u00d6ncelikle, dahili dosya portallar\u0131, bulut tabanl\u0131 i\u015f seyahati raporlama yaz\u0131l\u0131m\u0131 veya di\u011fer BT sistemleri olsun, \u00e7o\u011fu kurumsal hizmet i\u00e7in ayn\u0131 oturum a\u00e7ma mekani\u011fi kullan\u0131l\u0131r. Birden \u00e7ok parolay\u0131 hat\u0131rlaman\u0131za veya sabaha bir d\u00fczine farkl\u0131 hesapta oturum a\u00e7arak ba\u015flaman\u0131za gerek kalmaz. Dahas\u0131, kimlik bilgilerini unutmak neredeyse sorun olmaktan \u00e7\u0131kar. Bu da ekibin \u00e7ok y\u00f6nl\u00fc \u00fcretkenli\u011fini art\u0131r\u0131r.<\/p>\n<p>\u0130kinci olarak, risk profillerine dayal\u0131 bir kimlik do\u011frulama sistemi, kullan\u0131c\u0131y\u0131 gere\u011finden fazla rahats\u0131z edemez. Bu temel olarak, \u00e7al\u0131\u015fanlar\u0131n her zamanki i\u015f istasyonlar\u0131ndan kurumsal sisteme giri\u015f yapt\u0131ktan sonra, bilgisayar\u0131n kilidini a\u00e7mak i\u00e7in i\u015f g\u00fcn\u00fcn\u00fcn ba\u015f\u0131nda bir kez parola kullanabilecekleri ve ard\u0131ndan g\u00fcvenlik i\u00e7in daha fazla zaman harcamayacaklar\u0131 anlam\u0131na gelir. Ayn\u0131 zamanda, al\u0131\u015f\u0131lmad\u0131k eylemler ger\u00e7ekle\u015ftirme giri\u015fimleri veya \u00f6nemli bilgilere eri\u015fim talepleri birka\u00e7 ek kontrolle sonu\u00e7lanabilir.<\/p>\n<p>\u00dc\u00e7\u00fcnc\u00fc olarak, kimlik g\u00fcvenli\u011fi, uzaktan \u00e7al\u0131\u015fmay\u0131 ve harici y\u00fckleniciler ile i\u015fbirli\u011fini basitle\u015ftirir. Ofis d\u0131\u015f\u0131ndayken, belki ki\u015fisel bir cihaz kullanarak, \u00e7al\u0131\u015fanlar \u015firket politikas\u0131na uygun \u015fekilde kurumsal hizmetlere eri\u015fmeye devam edebilir. Do\u011fru, kontrol listesi ve eri\u015fim seviyesi de\u011fi\u015febilir.<\/p>\n<h2>Kimlik g\u00fcvenli\u011finin faydalar\u0131<\/h2>\n<p><strong>M\u00fc\u015fterilerin buluta ge\u00e7i\u015fi desteklenir.<\/strong> Pek \u00e7ok kurumsal BT hizmeti, genel bulut hizmetleri (Microsoft 365, Salesforce) veya hibrit bulutlar arac\u0131l\u0131\u011f\u0131yla sa\u011flan\u0131rken, bunlara eri\u015fim genellikle \u015firketin sunucular\u0131ndaki geleneksel kaynaklara g\u00f6re daha az d\u00fczenlenmi\u015f ve daha az g\u00fcvenlidir. T\u00fcm BT hizmetlerinde hesap korumas\u0131na y\u00f6nelik birle\u015fik bir yakla\u015f\u0131m, bilgisayar korsanl\u0131\u011f\u0131 riskini azaltarak \u015firketin yarar\u0131na olan dijital hizmetlerin benimsenmesini h\u0131zland\u0131r\u0131r.<\/p>\n<p><strong>Daha fazla \u00e7al\u0131\u015fan verimlili\u011fi<\/strong> \u00c7al\u0131\u015fanlar\u0131n t\u00fcm sistemlerde hesap olu\u015fturmas\u0131na, her g\u00fcn oturum a\u00e7arak ve her \u00fc\u00e7 ayda bir parola de\u011fi\u015ftirerek zaman harcamas\u0131na gerek yoktur. \u015eirket genelinde bu, somut zaman tasarrufu anlam\u0131na gelir \u2014 bunun yerine zaman daha verimli i\u015flere harcan\u0131r.<\/p>\n<p><strong>Azalan i\u015f y\u00fck\u00fc ve maliyetler.<\/strong> T\u00fcm hesaplar\u0131 merkezi olarak y\u00f6netebilecek ve on binlerce parola i\u00e7in endi\u015felenmeyi b\u0131rakacak olan BT ve siber g\u00fcvenlik departmanlar\u0131n\u0131n i\u015f y\u00fck\u00fcndeki \u00f6nemli azalma ayr\u0131 bir noktad\u0131r. Baz\u0131 \u015firketlerde, yard\u0131m birimine yap\u0131lan \u015fifreyle ilgili talepler, BT uzmanlar\u0131na yap\u0131lan t\u00fcm taleplerin %40\u2019\u0131 kadar\u0131n\u0131 olu\u015fturmaktad\u0131r. Merkezi hesap korumas\u0131na ge\u00e7mek bu rakam\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde d\u00fc\u015f\u00fcr\u00fcr. Dahas\u0131, standartla\u015ft\u0131r\u0131lm\u0131\u015f bir hesap ya\u015fam d\u00f6ng\u00fcs\u00fcne sahip olmak, \u00e7al\u0131\u015fanlar\u0131 i\u015fe almay\u0131, i\u015ften \u00e7\u0131karmay\u0131 veya rotasyona sokmay\u0131 \u00e7ok daha kolay hale getirir \u2014 gerekli izinler otomatik olarak atan\u0131r ve geri al\u0131n\u0131r.<\/p>\n<p><strong>Azalt\u0131lm\u0131\u015f mevzuat riskleri.<\/strong> Pek \u00e7ok \u00fclkede, bilgi g\u00fcvenli\u011fi d\u00fczenleyicileri, k\u0131smen \u00e7al\u0131\u015fanlar\u0131n ve m\u00fc\u015fterilerin ki\u015fisel verileriyle ilgili endi\u015felerden dolay\u0131, kurumsal g\u00fcvenlik sistemlerine kat\u0131 gereklilikler getirmeye ba\u015fl\u0131yor. Merkezi bir kimlik g\u00fcvenlik sistemi yaln\u0131zca ba\u015far\u0131l\u0131 bir siber sald\u0131r\u0131 riskini azaltmakla kalmaz, ayn\u0131 zamanda \u015firketteki herkesin parolalar, uzaktan \u00e7al\u0131\u015fma ve di\u011fer alanlarda onaylanm\u0131\u015f g\u00fcvenli uygulamalara ba\u011fl\u0131 kalmas\u0131n\u0131 sa\u011flar. B\u00f6ylece, d\u00fczenleyici kurum taraf\u0131ndan yap\u0131lacak ani bir denetimin a\u011f\u0131r bir para cezas\u0131yla sonu\u00e7lanmayaca\u011f\u0131ndan emin olabilirsiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>Uygun hesap g\u00fcvenli\u011fi, \u015firketlere y\u00f6nelik siber sald\u0131r\u0131lar\u0131n say\u0131s\u0131n\u0131 azaltman\u0131n yan\u0131 s\u0131ra finansal faydalar da sa\u011flar. Peki bunu yapmak i\u00e7in ne gerekir?<\/p>\n","protected":false},"author":2722,"featured_media":11647,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1278,1564,1656,1575,2653,1525],"class_list":{"0":"post-11646","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-ekonomi","10":"tag-hesaplar","11":"tag-isletme","12":"tag-kimlik-dogrulama","13":"tag-kimlik-guvenligi","14":"tag-parolalar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-benefit-from-identity-security\/11646\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-benefit-from-identity-security\/25782\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-benefit-from-identity-security\/21223\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/how-to-benefit-from-identity-security\/10876\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-benefit-from-identity-security\/28476\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-benefit-from-identity-security\/26081\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-benefit-from-identity-security\/35525\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-benefit-from-identity-security\/48399\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/how-to-benefit-from-identity-security\/28902\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-benefit-from-identity-security\/26395\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-benefit-from-identity-security\/32091\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-benefit-from-identity-security\/31774\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/parolalar\/","name":"parolalar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11646"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11646\/revisions"}],"predecessor-version":[{"id":11649,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11646\/revisions\/11649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11647"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}