Publicación: Diseño de una arquitectura de Security Service Edge basada en SASE para ambientes de Cloud AWS
| dc.contributor.advisor | Durán Vásquez, Javier Mauricio | |
| dc.contributor.author | Ramírez Restrepo, Andrés Felipe | |
| dc.contributor.author | Martínez Salgado, Luis Alberto | |
| dc.contributor.jury | Maya Arango, Paula Andrea | |
| dc.contributor.jury | Martínez Lozano, Jeferson Eleazar | |
| dc.contributor.researchgroup | Ingenierías::Automática, Electrónica y Ciencias Computacionales | |
| dc.date.accessioned | 2026-05-06T18:12:39Z | |
| dc.date.issued | 2026-04-26 | |
| dc.description.abstract | La creciente migración de entidades financieras hacia la nube pública de Amazon Web Services (AWS) ha traído consigo una serie de beneficios, como la escalabilidad y la reducción de costos. Sin embargo, esta transición también ha expuesto a estas organizaciones a importantes desafíos en materia de seguridad de la información. La falta de un diseño específico para mitigar los riesgos asociados con la navegación en este entorno compartido ha generado vulnerabilidades críticas, como fugas de información y accesos no autorizados a datos sensibles. Para afrontar este reto, se hace crucial desarrollar una solución que ayude a mitigar la pérdida de la confidencialidad, integridad y disponibilidad de la información. Así, el objetivo general de este trabajo de profundización es proponer un diseño para una solución de Security Service Edge (SSE) en AWS basada en la arquitectura Secure Access Service Edge (SASE), utilizando controles como Secure Web Gateway (SWG) y Zero Trust Network Access (ZTNA) para establecer políticas de seguridad. Para abordar estos desafíos, se han establecido objetivos claros que guiarán el desarrollo de esta solución. En primer lugar, se caracterizarán los criterios de aceptación necesarios para la solución SSE, enfocándose en mitigar los riesgos de fuga de información mediante controles como SWG y ZTNA. Luego, se identificarán las tecnologías más adecuadas que cumplan con estos criterios. Posteriormente, se integrará las tecnologías para SWG y ZTNA, permitiendo la generación del diseño SSE. Finalmente, se evaluará el cumplimiento de estos criterios mediante el desarrollo de una prueba de concepto (PoC) en AWS. A través de este enfoque metodológico, se pretende contribuir significativamente a la mejora de la seguridad en la nube, fortaleciendo así la confianza en las operaciones digitales del sector financiero y avalando la protección de sus activos. El presente trabajo de profundización pretende ser un referente en el acople de tecnologías de seguridad en ambientes de nube pública en AWS. Así, se espera que los resultados obtenidos puedan ser aplicados en diferentes contextos, desde pequeñas y medianas empresas hasta grandes corporaciones, adaptándose a las necesidades específicas del entorno de seguridad. Además, este trabajo de profundización servirá como base para futuras investigaciones y desarrollos en el campo de la ciberseguridad, contribuyendo a crear entornos digitales seguros y resilientes. | spa |
| dc.description.abstract | The increasing migration of financial institutions to the Amazon Web Services (AWS) public cloud has brought with it a number of benefits, such as scalability and cost reduction. However, this transition has also exposed these organizations to significant information security challenges. The lack of a specific design to mitigate the risks associated with browsing this shared environment has led to critical vulnerabilities, such as information leaks and unauthorized access to sensitive data. To address this challenge, it is crucial to develop a solution that helps mitigate the loss of confidentiality, integrity, and availability of information. Thus, the overall objective of this in-depth study is to propose a design for a Security Service Edge (SSE) solution on AWS based on the Secure Access Service Edge (SASE) architecture, using controls such as Secure Web Gateway (SWG) and Zero Trust Network Access (ZTNA) to establish security policies. To address these challenges, clear objectives have been established to guide the development of this solution. First, the acceptance criteria required for the SSE solution will be characterized, focusing on mitigating information leakage risks through controls such as SWG and ZTNA. Next, the most appropriate technologies that meet these criteria will be identified. Subsequently, the technologies for SWG and ZTNA will be integrated, enabling the generation of the SSE design. Finally, compliance with these criteria will be assessed through the development of a proof of concept (PoC) on AWS. Through this methodological approach, the aim is to significantly contribute to improving cloud security, thus strengthening confidence in the digital operations of the financial sector and ensuring the protection of its assets. This in-depth work aims to serve as a benchmark for the integration of security technologies in public cloud environments on AWS. Thus, the results obtained are expected to be applicable in different contexts, from small and medium-sized businesses to large corporations, adapting to the specific needs of the security environment. Furthermore, this in-depth work will serve as a foundation for future research and development in the field of cybersecurity, contributing to the creation of secure and resilient digital environments. | eng |
| dc.description.degreelevel | Maestría | |
| dc.description.degreename | Magíster en Seguridad Informática | |
| dc.description.researcharea | Ingenierías::Automática, Electrónica y Ciencias Computacionales::Ciencias Computacionales | |
| dc.description.tableofcontents | RESUMEN DEL PROYECTO ................................................................................................................... 5 Índice de Figuras ................................................................................................................................. 8 Índice de Tablas ................................................................................................................................... 9 INTRODUCCIÓN ................................................................................................................................. 11 1. MARCO TEÓRICO Y ESTADO DEL ARTE ...................................................................................... 14 1.1. Marco teórico .................................................................................................................. 14 1.2. Estado del arte ................................................................................................................ 21 2. METODOLOGÍA Y RESULTADOS ................................................................................................ 25 2.1 Fase 1 Definición. ............................................................................................................ 27 2.1.1 Arquitecturas tradicionales vs modelo SSE .................................................................... 27 2.1.2 Riesgos en nube publica .................................................................................................. 28 2.1.3 Investigación del modelo SSE y sus controles SWG y ZTNA en SASE. ........................... 32 2.1.3.1 Nube Pública Microsoft Azure. .............................................................................. 33 2.1.3.2 Nube Pública Google Cloud Platform (GCP). ......................................................... 34 2.1.3.3 Nube Pública AWS. ................................................................................................. 35 2.1.4 Definición de criterios para cumplir una solución SSE ................................................... 39 2.1.4.1 Criterios de aceptación (Controles) para SWG. ..................................................... 41 2.1.4.2 Criterios de aceptación (Controles) ZTNA. ............................................................ 43 2.2 Fase 2 Selección de tecnologías. ..................................................................................... 46 2.2.1 Fuentes. ........................................................................................................................... 46 2.2.1.1 Herramientas nativas de AWS útiles para SWG. ................................................... 47 2.2.1.2 Herramientas de Código abierto útiles para SWG. ............................................... 49 2.2.1.3 Herramientas nativas de AWS útiles para ZTNA. .................................................. 51 2.2.1.4 Herramientas de Código abierto útiles para control ZTNA. .................................. 54 2.2.1.5 Herramientas Comerciales para controles SWG y ZTNA. ...................................... 56 2.2.2 Elección de herramienta para la arquitectura SSE basada en SASE. ............................. 61 2.3 Fase 3 Diseño. .................................................................................................................. 66 2.4 Fase 4 PoC. ....................................................................................................................... 71 2.4.1 PoC SWG .......................................................................................................................... 71 2.4.1.1. Casos de Pruebas. ........................................................................................................ 73 2.4.2 PoC ZTNA. ........................................................................................................................ 79 2.4.2.1. Casos de Pruebas. ........................................................................................................ 80 Conclusiones ..................................................................................................................................... 90 Recomendaciones ............................................................................................................................. 90 Bibliografía ........................................................................................................................................ 93 | |
| dc.format.extent | 104 páginas | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.instname | instname:Institución Universitaria ITM | spa |
| dc.identifier.reponame | reponame:Repositorio Institucional Institución Universitaria ITM | spa |
| dc.identifier.repourl | repourl:https://repositorio.itm.edu.co | spa |
| dc.identifier.uri | https://hdl.handle.net/20.500.12622/8104 | |
| dc.language.iso | spa | |
| dc.publisher | Institución Universitaria ITM | |
| dc.publisher.branch | Campus Fraternidad | |
| dc.publisher.department | Departamento de Sistemas::Maestría en Seguridad Informática | |
| dc.publisher.faculty | Maestrías | |
| dc.publisher.place | Medellín | |
| dc.publisher.program | Maestría en Seguridad Informática | |
| dc.relation.references | T. H. Group, «d1.awsstatic.com,» [En línea]. Available: https://d1.awsstatic.com/psc-digital/2022/gc-mig/business-value-of-migration/Business-Value-of-Migration-eBook-ES-XL.pdf. | |
| dc.relation.references | gartner, «https://www.gartner.com,» [En línea]. Available: https://www.gartner.com/en/newsroom/press-releases/2022-02-09-gartner-says-more-than-half-of-enterprise-it-spending | |
| dc.relation.references | P. Alto, «Palo Alto,» [En línea]. Available: https://www.paloaltonetworks.es/apps/pan/public/downloadResource?pagePath=/content/pan/es_ES/resources/research/cloud-native-security-summary-2023 | |
| dc.relation.references | aws, «https://aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/compliance/data-protection/ | |
| dc.relation.references | E. S. Group, «SSE Leads the Way to SASE,» [En línea]. Available: https://zerotrust.cio.com/wp-content/uploads/sites/64/2024/08/esg-sse-leads-the-way-to-sase.pdf?utm…. | |
| dc.relation.references | E. S. Group, «SSE Leads the Way to SASE,» [En línea]. Available: https://zerotrust.cio.com/wp-content/uploads/sites/64/2024/08/esg-sse-leads-the-way-to-sase.pdf?utm…. | |
| dc.relation.references | MoldStud, «Moldstud,» [En línea]. Available: https://moldstud.com/articles/p-discover-how-secure-access-service-edge-sase-is-revolutionizing-network-security?. | |
| dc.relation.references | Forinet, «Fortinet,» [En línea]. Available: https://www.fortinet.com/lat/corporate/about-us/newsroom/press-releases/2023/fortiguard-labs-reports-destructive-wiper-malware-increases-over-50-percent | |
| dc.relation.references | R. Semana. [En línea]. Available: https://www.semana.com/tecnologia/articulo/atentos-en-2022-hubo-alarmante-cifra-de-intentos-de-ciberataques-en-colombia/202314/. | |
| dc.relation.references | crowdstrike, «www.crowdstrike.com,» [En línea]. Available: https://www.crowdstrike.com/cloud-risk-report/. | |
| dc.relation.references | Netskope, «www.netskope.com,» [En línea]. Available: https://www.netskope.com/solutions/secure-web-gateway | |
| dc.relation.references | n.-C. d. Exito, «https://www.netskope.com/resources/case-studies#&&industry=financial-service-insurance&,» [En línea]. Available: https://www.netskope.com/resources/case-studies#&&industry=financial-service-insurance&. | |
| dc.relation.references | zscaler, «www.zscaler.com,» [En línea]. Available: https://www.zscaler.com/customers#customersListing | |
| dc.relation.references | secureframe, «secureframe.com,» [En línea]. Available: https://secureframe.com/es-es/blog/cloud-security-statistics1 | |
| dc.relation.references | nttdata, «https://mx.nttdata.com,» [En línea]. Available: https://mx.nttdata.com/es/case-studies/multinational-bank-achieves-10x-value-from-aws-migration | |
| dc.relation.references | cloudflare, «www.cloudflare.com,» [En línea]. Available: https://www.cloudflare.com/es-es/learning/cloud/what-is-cloud-security/. | |
| dc.relation.references | Karpersky, «latam.kaspersky.com,» [En línea]. Available: https://latam.kaspersky.com/resource-center/definitions/what-is-cloud-security. | |
| dc.relation.references | kaspersky, «www.kaspersky.es,» [En línea]. Available: https://www.kaspersky.es/resource-center/definitions/what-is-cloud-security | |
| dc.relation.references | cloudflare, «www.cloudflare.com,» [En línea]. Available: https://www.cloudflare.com/es-es/learning/access-management/what-is-sase/. | |
| dc.relation.references | Paloalto, «www.paloaltonetworks.lat,» [En línea]. Available: https://www.paloaltonetworks.lat/cyberpedia/what-is-sase. | |
| dc.relation.references | akamai, «https://www.akamai.com,» [En línea]. Available: https://www.akamai.com/glossary/what-is-sase. | |
| dc.relation.references | microsoft, «www.microsoft.com,» [En línea]. Available: https://www.microsoft.com/es-es/security/business/security-101/what-is-data-loss-prevention-dlp?msockid=3a1a85dca3d362083d449139a27c63ac. | |
| dc.relation.references | fortinet, «www.fortinet.com,» [En línea]. Available: https://www.fortinet.com/lat/resources/cyberglossary/dlp. | |
| dc.relation.references | govtechreview, «www.govtechreview.com.au,» [En línea]. Available: https://www.govtechreview.com.au/content/gov-cloud/news/aws-microsoft-have-56-of-cloud-services-market-finbold-767150963. | |
| dc.relation.references | statista, «https://www.statista.com,» [En línea]. Available: https://www.statista.com/statistics/967365/worldwide-cloud-infrastructure-services-market-share-vendor/. | |
| dc.relation.references | AWS, «aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/about-aws/global-infrastructure/regions_az/. | |
| dc.relation.references | AWS, «aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/what-is-aws/. | |
| dc.relation.references | D. Guardian, «What is AWS Security? Retrieved from,» 2023. [En línea]. Available: https://www.digitalguardian.com/blog/what-aws-security. | |
| dc.relation.references | ScalaHosting, «What is AWS Cloud Security? How Does it Work?,» 2023. [En línea]. Available: https://www.scalahosting.com/blog/what-is-aws-cloud-security-how-does-it-work/. | |
| dc.relation.references | Netskope, «www.netskope.com,» [En línea]. Available: https://www.netskope.com/es/security-defined/security-service-edge-sse. | |
| dc.relation.references | catonetworks, «https://www.catonetworks.com,» [En línea]. Available: https://www.catonetworks.com/es/security-service-edge/. | |
| dc.relation.references | checkpoint, «www.checkpoint.com,» [En línea]. Available: https://www.checkpoint.com/es/cyber-hub/network-security/what-is-secure-access-service-edge-sase/what-is-security-service-edge-sse/. | |
| dc.relation.references | goguardian, «www.goguardian.com,» [En línea]. Available: https://www.goguardian.com/glossary/what-is-content-filtering. | |
| dc.relation.references | CISCO, «https://www.cisco.com/,» 2023. [En línea]. Available: https://www.cisco.com/site/us/en/products/security/secure-web-appliance/index.html. | |
| dc.relation.references | checkpoint, «www.checkpoint.com,» [En línea]. Available: https://www.checkpoint.com/es/cyber-hub/threat-prevention/what-is-web-filtering/. | |
| dc.relation.references | Elastics, «www.elastic.co,» [En línea]. Available: https://www.elastic.co/es/what-is/zero-trust | |
| dc.relation.references | Netskope, «www.netskope.com,» [En línea]. Available: https://www.netskope.com/es/security-defined/what-is-zero-trust-network-access. | |
| dc.relation.references | Cloudflare, «www.cloudflare.com,» [En línea]. Available: https://www.cloudflare.com/es-es/learning/access-management/what-is-ztna/. | |
| dc.relation.references | P. A. Networks. [En línea]. Available: https://www.paloaltonetworks.es/cyberpedia/what-is-zero-trust-network-access-ztna. | |
| dc.relation.references | www.asana.com, «asana,» [En línea]. Available: https://asana.com/es/resources/proof-of-concept. | |
| dc.relation.references | secureframe, «secureframe.com,» [En línea]. Available: https://secureframe.com/es-es/blog/cloud-security-statistics1 | |
| dc.relation.references | cloudsecurityalliance, «https://cloudsecurityalliance.org,» [En línea]. Available: https://cloudsecurityalliance.org/blog/2020/10/14/aws-cloud-security-report-2020-for-management-managing-the-rapid-shift-to-cloud | |
| dc.relation.references | A. &. S. B. Jones, «Security Service Edge: A New Approach to Cloud Security,» de Journal of Cloud Computing and Security, 2021, pp. 12(3), 45-67. | |
| dc.relation.references | R. &. K. P. Sharma, «Comparative Analysis of Security Architectures: SASE and SSE in AWS Environments,» de International Journal of Cybersecurity and Cloud Computing, 2022, pp. 5(2), 123-139. | |
| dc.relation.references | S. &. G. R. Kumar, «Review of Security Architectures for Cloud Services: Focus on SSE Integration,» de Cloud Security Review, 2023, pp. 8(1), 78-95.. | |
| dc.relation.references | catonetworks, «www.catonetworks.com,» [En línea]. Available: https://www.catonetworks.com/es/security-service-edge/. | |
| dc.relation.references | Intervision, «intervision.com,» [En línea]. Available: https://intervision.com/blog-sse-ztna-swg-casb-fwaas/. | |
| dc.relation.references | Datacenterdynamics, «www.datacenterdynamics.com,» [En línea]. Available: https://www.datacenterdynamics.com/es/noticias/c%C3%B3mo-garantiza-la-seguridad-de-los-datos-de-su-nube-p%C3%BAblica-amazon-web-services/. | |
| dc.relation.references | AWS, «aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/compliance/shared-responsibility-model/. | |
| dc.relation.references | Zscaler, «www.zscaler.com,» [En línea]. Available: https://www.zscaler.com/es/resources/ebooks/choosing-sse-solution.pdf#:~:text=SSE%20protege%20y%20conecta%20una%20base%20de%20usuarios,moverse%2C%20reubicarse%20y%20transformarse%20sin%20perder%20el%20control.. | |
| dc.relation.references | AWS, «/aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/blogs/aws-spanish/seguridad-para-portales-y-aplicaciones-web-on-premises-con-servicios-de-aws/. | |
| dc.relation.references | cloudsecurityninja.com, «cloudsecurityninja.com,» [En línea]. Available: https://cloudsecurityninja.com/securing-data-in-the-cloud/. | |
| dc.relation.references | Netskope, «www.netskope.com,» [En línea]. Available: https://www.netskope.com/security-defined/what-is-zero-trust-network-access | |
| dc.relation.references | Fortinet, «www.fortinet.com,» [En línea]. Available: https://www.fortinet.com/lat/products/public-cloud-security/aws. | |
| dc.relation.references | [En línea]. Available: https://www.datacenterdynamics.com/es/opinion/aws-inteligencia-artificial-en-la-base-de-la-seguridad-cloud/. | |
| dc.relation.references | Netskope, «www.netskope.com,» [En línea]. Available: https://www.netskope.com/resources/case-studies/ascensus. | |
| dc.relation.references | Ascensus, «www.ascensus.com,» [En línea]. Available: https://www.ascensus.com/. | |
| dc.relation.references | Netskope, «www.netskope.com,» [En línea]. Available: https://www.netskope.com/resources/case-studies/ris-raiffeisen-information-service. | |
| dc.relation.references | R. B. International, «www.rbinternational.com,» [En línea]. Available: https://www.rbinternational.com/en/raiffeisen.html. | |
| dc.relation.references | D. A. Cordova Urbina, S. H. Diaz Sifuentes y A. C. Mendoza de los Santos, «Universidad Privada de Tacna,» 28 11 2025. [En línea]. Available: https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/1342. | |
| dc.relation.references | S. L. Forero Macabares, «UniPiloto,» 13 09 2024. [En línea]. Available: https://repository.unipiloto.edu.co/handle/20.500.12277/14050 | |
| dc.relation.references | V. J. Pinargote Bravo, «Innova Science Journal,» 31 01 2025. [En línea]. Available: https://doi.org/10.63618/omd/isj/v3/n1/5. | |
| dc.relation.references | A. F. Gil Villa, S. A. Espinoza Dávalos y A. C. Mendoza de los Santos, «Universidad Privada de Tacna,» 21 11 2025. [En línea]. Available: https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/1331 | |
| dc.relation.references | W. Rashid, «National College of Ireland,» 12 12 2024. [En línea]. Available: https://norma.ncirl.ie/8250/. | |
| dc.relation.references | Netskope, «www.netskope.com,» [En línea]. Available: https://www.netskope.com/customers/care-ratings-case-study. | |
| dc.relation.references | elpais, «https://elpais.com,» [En línea]. Available: https://elpais.com/america colombia/2023-09-14/hackeo-masivo-en-colombia-la-informacion-de-millones-de personas-esta-en-manos-de-delincuentes-en-este-momento.html. | |
| dc.relation.references | mineryreport, «https://mineryreport.com,» [En línea]. Available: https://mineryreport.com/blog/hackeo-masivo-colombia/. | |
| dc.relation.references | linktic, «linktic.com,» [En línea]. Available: https://linktic.com/blog/panorama-completo de-la-ciberseguridad-en-colombia/. | |
| dc.relation.references | ccce, «https://www.ccce.org.co,» [En línea]. Available: https://www.ccce.org.co/noticias/conozca-los-principales-desafios-de-seguridad-digital que-tiene-colombia-para-el-2024/. | |
| dc.relation.references | QMA. [En línea]. Available: https://qma.mx/filtrado-contenido-web-2/. | |
| dc.relation.references | NIST. [En línea]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf. | |
| dc.relation.references | nist, «csrc.nist.gov,» [En línea]. Available: https://csrc.nist.gov/pubs/sp/800/30/r1/final. | |
| dc.relation.references | mitre, «https://attack.mitre.org/,» [En línea]. Available: https://attack.mitre.org/. | |
| dc.relation.references | Verizon, «www.verizon.com,» [En línea]. Available: https://www.verizon.com/business/resources/reports/dbir/. | |
| dc.relation.references | sentinelone, «www.sentinelone.com,» [En línea]. Available: https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-security-statistics/. | |
| dc.relation.references | enteldigital, https://enteldigital.cl/, https://enteldigital.cl/hubfs/ebooks/ciberseguridad/2025/Entel_Digital_Reporte_Ciberseg uridad_2025_.pdf. | |
| dc.relation.references | IBM, «www.ibm.com,» [En línea]. Available: https://www.ibm.com/es-es/reports/data breach. | |
| dc.relation.references | opswat, «www.opswat.com,» [En línea]. Available: https://www.opswat.com/blog/top cloud-security-issues-risks-threats-and-challenges. | |
| dc.relation.references | attack.mitre, «attack.mitre.org,» [En línea]. Available: https://attack.mitre.org/matrices/enterprise/cloud/. | |
| dc.relation.references | owasp, «https://owasp.org,» [En línea]. Available: https://owasp.org/www-project-cloud native-application-security-top-10/. | |
| dc.relation.references | cloudsecurityalliance, «www.cloudsecurityalliance.org,» [En línea]. Available: https://cloudsecurityalliance.org/research/topics/top-threats#. | |
| dc.relation.references | kaspersky, «www.kaspersky.es/,» [En línea]. Available: https://www.kaspersky.es/resource-center/preemptive-safety/cloud-security-issues challenges?srsltid=AfmBOooBGyMUsAA6q68YbT8QCGiR_p ProeM9OQenvHnmzD_o8_WgAuz. | |
| dc.relation.references | verizon, «www.verizon.com,» [En línea]. Available: https://www.verizon.com/business/resources/reports/dbir/?msockid=3fee3f4f84d7679a1 d802ad185786691. | |
| dc.relation.references | dtexsystems, «www2.dtexsystems.com,» [En línea]. Available: https://www2.dtexsystems.com/insiderriskreport2024?&utm_campaign=2024%20IRIR&ut m_medium=Paid%20Search&utm_source=Bing&Latest_Campaign=701Ql00000BnO1N&Lat est_Campaign_Status=Convertedhttps://www.dtexsystems.com/resource-insider-risk investigations-report-2. | |
| dc.relation.references | thales, «cpl.thalesgroup.com,» [En línea]. Available: https://cpl.thalesgroup.com/cloud security-research. | |
| dc.relation.references | G. Caruso, «https://neverofftechnology.com/,» [En línea]. Available: https://neverofftechnology.com/blog/amenazas-internas-quien-se-infiltra-maliciosamente y-como-gestionar-estos-incidentes-en-la-empresa. | |
| dc.relation.references | phish.report, «phish.report,» [En línea]. Available: https://phish.report/analysis. | |
| dc.relation.references | CSA, «cloudsecurityalliance.org,» [En línea]. Available: https://cloudsecurityalliance.org/press-releases/2025/02/27/csa-report-examines-how organizations-assess-and-manage-cybersecurity-and-data-risks. | |
| dc.relation.references | owasp, «https://owasp.org,» [En línea]. Available: https://owasp.org/Top10/A02_2021 Cryptographic_Failures/. | |
| dc.relation.references | censys, «censys.com,» [En línea]. Available: https://censys.com/the-2024-state-of-the internet-report/. | |
| dc.relation.references | apwg, «apwg.org,» [En línea]. Available: https://apwg.org/trendsreports/. | |
| dc.relation.references | Powerdmarc, «https://powerdmarc.com/,» [En línea]. Available: https://powerdmarc.com/es/email-phishing-dmarc-statistics/. | |
| dc.relation.references | cloudflare, «https://radar.cloudflare.com,» [En línea]. Available: https://radar.cloudflare.com/reports/ddos-2024-q4. | |
| dc.relation.references | preyproject, «preyproject.com,» [En línea]. Available: https://preyproject.com/es/blog/estadisticas-y-tendencia-dark-web. | |
| dc.relation.references | desklib, «https://desklib.com,» [En línea]. Available: https://desklib.com/study documents/ddos-attack-case-study/. | |
| dc.relation.references | Zscaler, «www.zscaler.com,» [En línea]. Available: https://www.zscaler.com/es/resources/security-terms-glossary/what-is-security-service edge-sse?utm_source=chatgpt.com. | |
| dc.relation.references | Zscaler, «www.zscaler.com,» [En línea]. Available: https://www.zscaler.com/resources/security-terms-glossary/what-is-sase. | |
| dc.relation.references | www.microsoft.com, «learn.microsoft.com,» [En línea]. Available: https://learn.microsoft.com/en-us/azure/web-application-firewall/. | |
| dc.relation.references | microsoft, «www.microsoft.com,» [En línea]. Available: https://learn.microsoft.com/en us/security/zero-trust/. | |
| dc.relation.references | microsoft., «www.microsoft.com,» [En línea]. Available: https://learn.microsoft.com/en us/azure/defender-for-cloud/. | |
| dc.relation.references | Google, «cloud.google.com,» [En línea]. Available: https://cloud.google.com/armor/docs?hl=es-419. | |
| dc.relation.references | Google, «Google,» [En línea]. Available: https://cloud.google.com/blog/products/identity security/introducing-the-unified-chronicle-security-operations-platform. | |
| dc.relation.references | Google, «google,» [En línea]. Available: https://cloud.google.com/beyondcorp?hl=es_419. | |
| dc.relation.references | Google, «Cloud Google,» [En línea]. Available: https://cloud.google.com/iap/docs/concepts-overview?hl=es-419. | |
| dc.relation.references | AWS, «Amazon,» [En línea]. Available: https://aws.amazon.com/es/network-firewall/. | |
| dc.relation.references | AWS, «www.aws.com.co,» [En línea]. Available: https://docs.aws.amazon.com/whitepapers/latest/building-scalable-secure-multi-vpc network-infrastructure/private-nat-gateway.html. | |
| dc.relation.references | AWS, «www.aws.com.co,» [En línea]. Available: https://docs.aws.amazon.com/es_es/Route53/latest/DeveloperGuide/resolver-dns firewall-overview.html. | |
| dc.relation.references | AWS, «https://aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/macie/?. | |
| dc.relation.references | AWS, «https://www.amazonaws.cn,» [En línea]. Available: https://www.amazonaws.cn/en/documentation-overview/guardduty/?. | |
| dc.relation.references | AWS, «Amazon,» [En línea]. Available: https://aws.amazon.com/es/iam/. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/es_es/detective/latest/userguide/what-is-detective.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/es_es/controltower/latest/userguide/what-is-control tower.html. | |
| dc.relation.references | AWS, «Amazon,» [En línea]. Available: https://docs.aws.amazon.com/vpc/latest/privatelink/what-is-privatelink.html. | |
| dc.relation.references | Aws, «Amazon,» [En línea]. Available: https://aws.amazon.com/what-is/sso/. | |
| dc.relation.references | AWS, «https://aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/iam/access-analyzer/?. | |
| dc.relation.references | AWS, «https://aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/documentation-overview/config/?. | |
| dc.relation.references | AWS, «https://aws.amazon.com,» [En línea]. Available: https://aws.amazon.com/es/security-hub/?. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://aws.amazon.com/es/network firewall/. | |
| dc.relation.references | AWS, «WWW.AWS.COM,» [En línea]. Available: https://docs.aws.amazon.com/es_es/vpc/latest/userguide/network-firewall.html. | |
| dc.relation.references | AWS, «WWW.AWS.COM,» [En línea]. Available: https://docs.aws.amazon.com/es_es/Route53/latest/DeveloperGuide/resolver-dns firewall-overview.html. | |
| dc.relation.references | AWS, www.aws.com, https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://aws.amazon.com/es/blogs/networking-and-content-delivery/introducing-amazon vpc-flow-logs-kinesis-data-firehose/. | |
| dc.relation.references | Amazon, «https://docs.aws.amazon.com,» [En línea]. Available: https://docs.aws.amazon.com/es_es/eventbridge/latest/userguide/eb-what-is.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/es_es/guardduty/latest/ug/what-is-guardduty.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-guide.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-points-policies.html. | |
| dc.relation.references | AWS, «docs.aws.amazon.com,» [En línea]. Available: https://docs.aws.amazon.com/es_es/artifact/latest/ug/what-is-aws-artifact.html. | |
| dc.relation.references | AWS, «AWS,» [En línea]. Available: https://docs.aws.amazon.com/es_es/audit manager/latest/userguide/what is.html#:~:text=nota,a%20los%20expertos%20en%20cumplimiento.. | |
| dc.relation.references | squid, «https://www.squid.org,» [En línea]. Available: https://www.squid-cache.org/. | |
| dc.relation.references | opnsense, «www.shop.opnsense.com,» [En línea]. Available: https://shop.opnsense.com/product/opnsense-on-azure/. | |
| dc.relation.references | Psense, «https://docs.netgate.com,» [En línea]. Available: https://docs.netgate.com/pfsense/en/latest/general/what-is-pfsense.html. | |
| dc.relation.references | Squic, «squidclamav.darold.net,» [En línea]. Available: https://squidclamav.darold.net/documentation.html. | |
| dc.relation.references | c-icap, «https://c-icap.sourceforge.net/,» [En línea]. Available: https://c icap.sourceforge.net/documentation.html. | |
| dc.relation.references | clamav, «https://www.clamav.net/,» [En línea]. Available: https://docs.clamav.net/. | |
| dc.relation.references | e2guardian, «http://e2guardian.org,» [En línea]. Available: http://e2guardian.org/cms/index.php. | |
| dc.relation.references | linux, «https://www.linux.com,» [En línea]. Available: https://www.linux.com/training tutorials/filter-content-your-home-network-e2guardian/. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/IAM/latest/UserGuide/introduction.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://aws.amazon.com/es/cognito/. | |
| dc.relation.references | aws, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/vpc/latest/privatelink/what-is-privatelink.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://aws.amazon.com/es/config/. | |
| dc.relation.references | AWS, «www.aws.com,» [En línea]. Available: https://aws.amazon.com/es/verified-access/. | |
| dc.relation.references | AWS, «https://docs.aws.amazon.com,» AWS, [En línea]. Available: https://docs.aws.amazon.com/controltower/latest/userguide/what-is-control tower.html?. | |
| dc.relation.references | AWS, «https://docs.aws.amazon.com,» AWS, [En línea]. Available: https://docs.aws.amazon.com/wellarchitected/latest/management-and-governance guide/controls.html?. | |
| dc.relation.references | Pomerium, «www.pomerium.com,» [En línea]. Available: https://www.pomerium.com/docs. | |
| dc.relation.references | goteleport, «www.goteleport.com,» [En línea]. Available: https://goteleport.com/docs/. | |
| dc.relation.references | openziti, «www.openziti.io,» [En línea]. Available: https://openziti.io/docs/learn/introduction/. | |
| dc.relation.references | ZITADEL, «www.zitadel.com,» [En línea]. Available: https://zitadel.com/docs. | |
| dc.relation.references | Keycloak, «https://www.keycloak.org,» [En línea]. Available: https://www.keycloak.org/documentation. | |
| dc.relation.references | oauth2-proxy, «https://oauth2-proxy.github.io,» [En línea]. Available: https://oauth2 proxy.github.io/oauth2-proxy/. | |
| dc.relation.references | OPA, «https://www.openpolicyagent.org,» [En línea]. Available: https://www.openpolicyagent.org/docs. | |
| dc.relation.references | Gartner, «www.gartner.es,» [En línea]. Available: https://www.gartner.es/es?utm_source=chatgpt.com. | |
| dc.relation.references | Gartner, «www.gartner.es,» [En línea]. Available: https://www.gartner.es/es/metodologias/magic-quadrant. | |
| dc.relation.references | netskope, «https://www.netskope.com,» [En línea]. Available: https://www.netskope.com/resources/analyst-reports/2025-gartner-magic-quadrant-for sase-platforms. | |
| dc.relation.references | Forester, «www.forrester.com,» [En línea]. Available: https://www.forrester.com/policies/forrester-wave-methodology/. | |
| dc.relation.references | F. Wave, «Forrester Wave SASE,» [En línea]. Available: https://reprint.forrester.com/reports/the-forrester-wave-tm-secure-access-service-edge solutions-q3-2025-2888fb8f/index.html. | |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | |
| dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | |
| dc.rights.license | Atribución 4.0 Internacional (CC BY 4.0) | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc/4.0/ | |
| dc.subject.ddc | 000 - Ciencias de la computación, información y obras generales::004 - Procesamiento de datos Ciencia de los computadores | |
| dc.subject.ddc | 000 - Ciencias de la computación, información y obras generales::005 - Programación, programas, datos de computación | |
| dc.subject.lemb | Seguridad informática | |
| dc.subject.ocde | 2. Ingeniería y Tecnología::2B. Ingenierías Eléctrica, Electrónica e Informática::2B06. Hardware y arquitectura de computadores | |
| dc.subject.ods | ODS 4: Educación de calidad. Garantizar una educación inclusiva y equitativa de calidad y promover oportunidades de aprendizaje permanente para todos | |
| dc.subject.ods | ODS 8: Trabajo decente y crecimiento económico. Promover el crecimiento económico sostenido, inclusivo y sostenible, el empleo pleno y productivo y el trabajo decente para todos | |
| dc.subject.ods | ODS 9: Industria, innovación e infraestructura. Construir infraestructuras resilientes, promover la industrialización inclusiva y sostenible y fomentar la innovación | |
| dc.subject.proposal | Amazon Web Services (AWS) | |
| dc.subject.proposal | Diseño Security Service Edge (SSE) | |
| dc.subject.proposal | Filtrado de contenido web (WCF) | |
| dc.subject.proposal | Controles | |
| dc.subject.proposal | Secure Access Service Edge (SASE) | |
| dc.subject.proposal | Seguridad en la nube, Zero Trust Network Access (ZTNA) | |
| dc.title | Diseño de una arquitectura de Security Service Edge basada en SASE para ambientes de Cloud AWS | spa |
| dc.type | Trabajo de grado - Maestría | |
| dc.type.coar | http://purl.org/coar/resource_type/c_bdcc | |
| dc.type.coarversion | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |
| dc.type.content | Text | |
| dc.type.driver | info:eu-repo/semantics/masterThesis | |
| dc.type.redcol | http://purl.org/redcol/resource_type/TM | |
| dc.type.version | info:eu-repo/semantics/publishedVersion | |
| dspace.entity.type | Publication |
Archivos
Bloque original
Bloque de licencias
1 - 1 de 1
Cargando...
- Nombre:
- license.txt
- Tamaño:
- 1.37 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción: