TY - GEN
T1 - Information System Deployment Security Architecture Based on Reverse Proxy Technology in Commercial Cryptography with Chinese Standards
AU - Zhao, Wen
AU - Huo, Xulun
AU - Chen, Yinan
AU - Liu, Xia
AU - Zhang, Hongfeng
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - In recent years, cybersecurity incidents have continued to occur. As information systems are deployed in increasing numbers, security management has become increasingly challenging. The deployment of these systems often lacks unified cybersecurity planning, failing to effectively establish security boundaries, identity authentication, and unified management. Particularly with the promotion of commercial cryptography applications in China, existing system deployment architectures face significant compatibility challenges during transformation. This paper conducts an in-depth study on the role of reverse proxy technology in system business deployment. Combining the concepts of Defense-in-Depth and Zero Trust Architecture, it proposes a scalable, standardized security architecture for system deployment. This architecture has been successfully implemented and applied within the author's organization, demonstrating promising results.
AB - In recent years, cybersecurity incidents have continued to occur. As information systems are deployed in increasing numbers, security management has become increasingly challenging. The deployment of these systems often lacks unified cybersecurity planning, failing to effectively establish security boundaries, identity authentication, and unified management. Particularly with the promotion of commercial cryptography applications in China, existing system deployment architectures face significant compatibility challenges during transformation. This paper conducts an in-depth study on the role of reverse proxy technology in system business deployment. Combining the concepts of Defense-in-Depth and Zero Trust Architecture, it proposes a scalable, standardized security architecture for system deployment. This architecture has been successfully implemented and applied within the author's organization, demonstrating promising results.
KW - Commercial Cryptography with Chinese Standards
KW - component
KW - Cybersecurity Architecture
KW - Reverse Proxy
UR - https://www.scopus.com/pages/publications/105019058032
U2 - 10.1109/IDSAC65763.2025.11170184
DO - 10.1109/IDSAC65763.2025.11170184
M3 - Conference contribution
AN - SCOPUS:105019058032
T3 - Proceedings of 2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025
SP - 31
EP - 36
BT - Proceedings of 2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025
Y2 - 11 July 2025 through 13 July 2025
ER -