메인메뉴 바로가기 본문내용 바로가기
뒤로가기

RISK BUSINESS

SK hynix built integrated access control for cloud environments

Zero-Trust access control strengthens cloud security and efficiency.

Situation
SK Hynix required the establishment of a Zero-Trust-based integrated authentication system that enhances user convenience and efficiency. Furthermore, standardisation and reinforcement of the company-wide authorisation framework were necessary to address IT auditing and compliance requirements. The existing system struggled to provide integrated access control across diverse environments, including the evolving work environment, cloud, and on-premise systems.
Target
• Access control for diverse cloud-based SaaS applications and all environments including web, messenger, and client/server systems
• Assessment of implicit risk factors and proactive management of inherent risks
• Establishment of a pre-emptive response framework through enhanced Zero-Trust authentication systems
• Expansion to enterprise-wide business systems and compliance with internal and external regulatory requirements
• Implementation of user behaviour monitoring and tracking capabilities
Solution
• Rathon-AM
Impact
• Enhanced access control based on risk classification grades
- Implementation of policies evaluating diverse risk factors and pre-emptive blocking
- Response to potential risk factors through anomaly detection analysis
- Streamlined management system facilitating adaptation to evolving work environments

• Cost reduction through improved usability and reduced operational lead times
- Single sign-on enabling access to all services, enhancing login convenience
- Integrated authentication for on-premise and cloud-based work systems, including client/server environments
- Enables integration with diverse applications, ensuring system scalability
- Reduces task processing time and operational costs

• Compliance adherence and governance enhancement
- Ensures compliance through authentication, authorisation, risk management, and logging
- Strengthens governance via management of access policies, risk factors, monitoring, and handling procedures
- Enhances access security with reinforced authentication policies and mechanisms