Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2
This thesis examines how dynamic access control can be implemented with a focus on zero trust architecture.The thesis reviews how companies with larger office networks, like Skellefteå Kraft AB can achieve upcomingNIS 2 requirements. The thesis explains logging, authentication and dynamic access con...
Main Author: | |
---|---|
Format: | Bachelor Thesis |
Language: | Swedish |
Published: |
Luleå tekniska universitet, Institutionen för system- och rymdteknik
2025
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-112100 |
_version_ | 1831847543591403520 |
---|---|
author | Downey, Wyatt |
author_facet | Downey, Wyatt |
author_sort | Downey, Wyatt |
collection | Luleå University of Technology Publications (DiVA) |
description | This thesis examines how dynamic access control can be implemented with a focus on zero trust architecture.The thesis reviews how companies with larger office networks, like Skellefteå Kraft AB can achieve upcomingNIS 2 requirements. The thesis explains logging, authentication and dynamic access control and how thesecan help achieve a secure network that is ready for NIS 2.The work begins by explaining how dynamic access control works and important elements of the zero trustmodel. It goes on to explain how identification and authentication are associated with identity and accessmanagement systems such as Active Directory and multi factor authentication.Then network segmentation is explained and how it can be used to divide a larger network, and why it shouldbe done from a security standpoint.Methods for the work included research, interviews and weekly reports to supervisors at Luleå University ofTechnology, as well as Skellefteå Kraft.The result shows that an effective implementation of zero-trust requires careful planning, and how this can beachieved. It also describes the use case and implementation of dynamic access control, and how it can be used tomanage access. By using these systems and guidelines, Skellefteå Kraft can be well prepared for the upcomingNIS 2 directive. |
format | Bachelor Thesis |
genre | Luleå Luleå Luleå |
genre_facet | Luleå Luleå Luleå |
id | ftluleatu:oai:DiVA.org:ltu-112100 |
institution | Open Polar |
language | Swedish |
op_collection_id | ftluleatu |
op_rights | info:eu-repo/semantics/openAccess |
publishDate | 2025 |
publisher | Luleå tekniska universitet, Institutionen för system- och rymdteknik |
record_format | openpolar |
spelling | ftluleatu:oai:DiVA.org:ltu-112100 2025-05-11T14:22:17+00:00 Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 Downey, Wyatt 2025 application/pdf http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-112100 swe swe Luleå tekniska universitet, Institutionen för system- och rymdteknik info:eu-repo/semantics/openAccess Datornätverk NIS-2 Åtkomstkontroll Other Computer and Information Science Annan data- och informationsvetenskap Student thesis info:eu-repo/semantics/bachelorThesis text 2025 ftluleatu 2025-04-15T14:16:02Z This thesis examines how dynamic access control can be implemented with a focus on zero trust architecture.The thesis reviews how companies with larger office networks, like Skellefteå Kraft AB can achieve upcomingNIS 2 requirements. The thesis explains logging, authentication and dynamic access control and how thesecan help achieve a secure network that is ready for NIS 2.The work begins by explaining how dynamic access control works and important elements of the zero trustmodel. It goes on to explain how identification and authentication are associated with identity and accessmanagement systems such as Active Directory and multi factor authentication.Then network segmentation is explained and how it can be used to divide a larger network, and why it shouldbe done from a security standpoint.Methods for the work included research, interviews and weekly reports to supervisors at Luleå University ofTechnology, as well as Skellefteå Kraft.The result shows that an effective implementation of zero-trust requires careful planning, and how this can beachieved. It also describes the use case and implementation of dynamic access control, and how it can be used tomanage access. By using these systems and guidelines, Skellefteå Kraft can be well prepared for the upcomingNIS 2 directive. Bachelor Thesis Luleå Luleå Luleå Luleå University of Technology Publications (DiVA) |
spellingShingle | Datornätverk NIS-2 Åtkomstkontroll Other Computer and Information Science Annan data- och informationsvetenskap Downey, Wyatt Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 |
title | Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 |
title_full | Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 |
title_fullStr | Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 |
title_full_unstemmed | Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 |
title_short | Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 |
title_sort | dynamisk åtkomstkontroll för kontorsnätverk : en genomgång av åtkomstkontroll med betoning på zero trust och nis 2 |
topic | Datornätverk NIS-2 Åtkomstkontroll Other Computer and Information Science Annan data- och informationsvetenskap |
topic_facet | Datornätverk NIS-2 Åtkomstkontroll Other Computer and Information Science Annan data- och informationsvetenskap |
url | http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-112100 |