Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2

This thesis examines how dynamic access control can be implemented with a focus on zero trust architecture.The thesis reviews how companies with larger office networks, like Skellefteå Kraft AB can achieve upcomingNIS 2 requirements. The thesis explains logging, authentication and dynamic access con...

Full description

Bibliographic Details
Main Author: Downey, Wyatt
Format: Bachelor Thesis
Language:Swedish
Published: Luleå tekniska universitet, Institutionen för system- och rymdteknik 2025
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-112100
_version_ 1831847543591403520
author Downey, Wyatt
author_facet Downey, Wyatt
author_sort Downey, Wyatt
collection Luleå University of Technology Publications (DiVA)
description This thesis examines how dynamic access control can be implemented with a focus on zero trust architecture.The thesis reviews how companies with larger office networks, like Skellefteå Kraft AB can achieve upcomingNIS 2 requirements. The thesis explains logging, authentication and dynamic access control and how thesecan help achieve a secure network that is ready for NIS 2.The work begins by explaining how dynamic access control works and important elements of the zero trustmodel. It goes on to explain how identification and authentication are associated with identity and accessmanagement systems such as Active Directory and multi factor authentication.Then network segmentation is explained and how it can be used to divide a larger network, and why it shouldbe done from a security standpoint.Methods for the work included research, interviews and weekly reports to supervisors at Luleå University ofTechnology, as well as Skellefteå Kraft.The result shows that an effective implementation of zero-trust requires careful planning, and how this can beachieved. It also describes the use case and implementation of dynamic access control, and how it can be used tomanage access. By using these systems and guidelines, Skellefteå Kraft can be well prepared for the upcomingNIS 2 directive.
format Bachelor Thesis
genre Luleå
Luleå
Luleå
genre_facet Luleå
Luleå
Luleå
id ftluleatu:oai:DiVA.org:ltu-112100
institution Open Polar
language Swedish
op_collection_id ftluleatu
op_rights info:eu-repo/semantics/openAccess
publishDate 2025
publisher Luleå tekniska universitet, Institutionen för system- och rymdteknik
record_format openpolar
spelling ftluleatu:oai:DiVA.org:ltu-112100 2025-05-11T14:22:17+00:00 Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2 Downey, Wyatt 2025 application/pdf http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-112100 swe swe Luleå tekniska universitet, Institutionen för system- och rymdteknik info:eu-repo/semantics/openAccess Datornätverk NIS-2 Åtkomstkontroll Other Computer and Information Science Annan data- och informationsvetenskap Student thesis info:eu-repo/semantics/bachelorThesis text 2025 ftluleatu 2025-04-15T14:16:02Z This thesis examines how dynamic access control can be implemented with a focus on zero trust architecture.The thesis reviews how companies with larger office networks, like Skellefteå Kraft AB can achieve upcomingNIS 2 requirements. The thesis explains logging, authentication and dynamic access control and how thesecan help achieve a secure network that is ready for NIS 2.The work begins by explaining how dynamic access control works and important elements of the zero trustmodel. It goes on to explain how identification and authentication are associated with identity and accessmanagement systems such as Active Directory and multi factor authentication.Then network segmentation is explained and how it can be used to divide a larger network, and why it shouldbe done from a security standpoint.Methods for the work included research, interviews and weekly reports to supervisors at Luleå University ofTechnology, as well as Skellefteå Kraft.The result shows that an effective implementation of zero-trust requires careful planning, and how this can beachieved. It also describes the use case and implementation of dynamic access control, and how it can be used tomanage access. By using these systems and guidelines, Skellefteå Kraft can be well prepared for the upcomingNIS 2 directive. Bachelor Thesis Luleå Luleå Luleå Luleå University of Technology Publications (DiVA)
spellingShingle Datornätverk
NIS-2
Åtkomstkontroll
Other Computer and Information Science
Annan data- och informationsvetenskap
Downey, Wyatt
Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2
title Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2
title_full Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2
title_fullStr Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2
title_full_unstemmed Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2
title_short Dynamisk Åtkomstkontroll För Kontorsnätverk : En genomgång av åtkomstkontroll med betoning på zero trust och NIS 2
title_sort dynamisk åtkomstkontroll för kontorsnätverk : en genomgång av åtkomstkontroll med betoning på zero trust och nis 2
topic Datornätverk
NIS-2
Åtkomstkontroll
Other Computer and Information Science
Annan data- och informationsvetenskap
topic_facet Datornätverk
NIS-2
Åtkomstkontroll
Other Computer and Information Science
Annan data- och informationsvetenskap
url http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-112100