{"id":3972,"date":"2023-12-25T14:06:09","date_gmt":"2023-12-25T11:06:09","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3972"},"modified":"2023-12-25T14:09:10","modified_gmt":"2023-12-25T11:09:10","slug":"zero-trust","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/zero-trust\/","title":{"rendered":"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir?"},"content":{"rendered":"\n<p>S\u0131f\u0131r g\u00fcven, t\u00fcm kimliklerin (ki\u015filer, cihazlar veya kullan\u0131c\u0131 olarak belirlenen di\u011fer varl\u0131klar), kullan\u0131c\u0131 ister kurumun a\u011f\u0131n\u0131n i\u00e7inde ister d\u0131\u015f\u0131nda olsun, verilere ve uygulamalara eri\u015fmeden \u00f6nce ve eri\u015firken kimli\u011finin do\u011frulanmas\u0131n\u0131, yetkilendirilmesini ve s\u00fcrekli olarak do\u011frulanmas\u0131n\u0131 gerektiren bir BT g\u00fcvenlik \u00e7er\u00e7evesidir.<\/p>\n\n\n\n<p>Geleneksel BT a\u011f g\u00fcvenli\u011fi, a\u011fa girdikten sonra t\u00fcm kimliklere g\u00fcvenir, bu da i\u015fletmeleri g\u00fcn\u00fcm\u00fcz\u00fcn siber ortam\u0131nda savunmas\u0131z b\u0131rak\u0131r:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Uzaktan, hibrit ve \u00e7al\u0131\u015fan olmayan eri\u015fimi<\/li><li>\u00c7e\u015fitli veri, uygulama ve a\u011f cihazlar\u0131 ve konumlar\u0131&nbsp;<\/li><li>Buluta ge\u00e7i\u015f&nbsp;<\/li><li>Veri ihlalleri ve fidye yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131&nbsp;<\/li><\/ul>\n\n\n\n<p>K\u00f6t\u00fc niyetli i\u00e7eriden bir ki\u015fi a\u011fa girdi\u011finde, kaynaklara kolayca yanal eri\u015fim sa\u011flayabilir. S\u0131f\u0131r g\u00fcven ile a\u011f i\u00e7indeki kullan\u0131c\u0131lara bile g\u00fcvenilmez ve uygulama ve verilere hala eri\u015febilmeleri gerekti\u011finden emin olmak i\u00e7in s\u00fcrekli olarak do\u011frulama istenir.<\/p>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven, kurumun her zaman i\u00e7 ve d\u0131\u015f tehditler taraf\u0131ndan tehlikeye at\u0131ld\u0131\u011f\u0131n\u0131 varsayar. Bu siber tehditleri azaltmak i\u00e7in kas\u0131tl\u0131 ve metodik bir yakla\u015f\u0131m sa\u011flar. S\u0131f\u0131r g\u00fcven modeli, kurumsal kaynaklara mevcut eri\u015fimi olan kullan\u0131c\u0131lar da dahil olmak \u00fczere hi\u00e7 kimseye g\u00fcvenmedi\u011finden, modern i\u015fletmeler i\u00e7in temel g\u00fcvenlik sa\u011flar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r G\u00fcvenin Tarihi<\/h2>\n\n\n\n<p>Forrester Research analistlerinden John Kindervag, 2010 y\u0131l\u0131nda model \u00fczerine yapt\u0131\u011f\u0131 bir sunum s\u0131ras\u0131nda &#8220;s\u0131f\u0131r g\u00fcven&#8221; terimini ortaya atm\u0131\u015ft\u0131r.&nbsp;<\/p>\n\n\n\n<p>Gartner, 2019 y\u0131l\u0131nda g\u00fcvenli eri\u015fim hizmeti s\u0131n\u0131r\u0131 (SASE) \u00e7\u00f6z\u00fcmlerine s\u0131f\u0131r g\u00fcveni dahil etti ve Birle\u015fik Krall\u0131k&#8217;taki National Cyber Security Centre (NCSC), a\u011f mimarlar\u0131n\u0131n yeni BT da\u011f\u0131t\u0131mlar\u0131 i\u00e7in \u00f6zellikle de da\u011f\u0131t\u0131m bulut hizmetlerini i\u00e7eriyorsa, s\u0131f\u0131r g\u00fcven modelini dikkate almalar\u0131n\u0131 tavsiye etti.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r G\u00fcven A\u011f Eri\u015fimi (ZTNA) Nedir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"587\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-ag-erisimi-nedir-1024x587.png\" alt=\"\" class=\"wp-image-3979\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-ag-erisimi-nedir-1024x587.png 1024w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-ag-erisimi-nedir-300x172.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-ag-erisimi-nedir-768x440.png 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-ag-erisimi-nedir-750x430.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-ag-erisimi-nedir-1140x654.png 1140w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-ag-erisimi-nedir.png 1146w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Kaynak: Techtarget<\/figcaption><\/figure><\/div>\n\n\n\n<p>S\u0131f\u0131r G\u00fcven A\u011f Eri\u015fimi (ZTNA), i\u015fletmenin s\u0131f\u0131r g\u00fcven g\u00fcvenlik modelini kullanmas\u0131n\u0131 sa\u011flayan birincil teknolojidir. ZTNA, cihazlar ve ihtiya\u00e7 duyduklar\u0131 kaynaklar aras\u0131nda belirtilen eri\u015fim kontrol politikalar\u0131na dayal\u0131 olarak bire bir \u015fifreli ba\u011flant\u0131lar kurar, varsay\u0131lan olarak eri\u015fimi engeller ve yaln\u0131zca kesin olarak izin verildi\u011finde hizmetlere eri\u015fime izin verir. ZTNA g\u00fcvenli eri\u015fim sa\u011flamadan \u00f6nce kullan\u0131c\u0131lar\u0131n kimli\u011fi \u015fifreli bir t\u00fcnel arac\u0131l\u0131\u011f\u0131yla do\u011frulan\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r G\u00fcven Modelinin Temel \u0130lkeleri<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131daki listede s\u0131f\u0131r g\u00fcven modelinin temel ilkelerini bulabilirsiniz:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. S\u00fcrekli izleme ve do\u011frulama<\/h3>\n\n\n\n<p>S\u0131f\u0131r g\u00fcvende anahtar kavram, uygulamalar\u0131n g\u00fcvenilir oldu\u011funun varsay\u0131lamayaca\u011f\u0131 ve davran\u0131\u015flar\u0131n\u0131 do\u011frulamak i\u00e7in \u00e7al\u0131\u015fma zaman\u0131nda s\u00fcrekli izleme yap\u0131lmas\u0131 gerekti\u011fidir. S\u00fcrekli do\u011frulama, i\u015fletmenin t\u00fcm kaynaklar i\u00e7in eri\u015fimi s\u00fcrekli olarak do\u011frulamas\u0131 gerekti\u011fi anlam\u0131na gelir.&nbsp;<\/p>\n\n\n\n<p>Bu kadar kapsaml\u0131 kaynaklar\u0131n s\u00fcrekli olarak do\u011frulanmas\u0131, i\u015f ak\u0131\u015f\u0131n\u0131n yaln\u0131zca risk seviyeleri de\u011fi\u015fti\u011finde kesintiye u\u011framas\u0131n\u0131 sa\u011flamak i\u00e7in risk tabanl\u0131 ko\u015fullu eri\u015fim gerektirir ve kullan\u0131c\u0131 deneyiminden \u00f6d\u00fcn vermeden bu s\u00fcrekli do\u011frulamay\u0131 m\u00fcmk\u00fcn k\u0131lar. Ayr\u0131ca kullan\u0131c\u0131lar, bilgiler ve i\u015f y\u00fckleri s\u0131k s\u0131k hareket etti\u011finden, i\u015fletmenin risk, uyumluluk ve BT hususlar\u0131n\u0131 i\u00e7eren \u00f6l\u00e7eklenebilir bir dinamik politika modeli uygulamas\u0131 gerekir.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Mikro segmentasyon<\/h3>\n\n\n\n<p>Mikro b\u00f6l\u00fcmlendirme, g\u00fcvenlik \u00e7evrelerini daha k\u00fc\u00e7\u00fck sekt\u00f6rlere ay\u0131rma ve her a\u011f b\u00f6lgesine farkl\u0131 eri\u015fim yaratma i\u015flemidir. Bir b\u00f6lgeye eri\u015fim izni verilen bir kullan\u0131c\u0131 veya uygulama, ek izinler almadan di\u011ferlerine eri\u015femez.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-mikro-segmentasyon-1024x713.png\" alt=\"\" class=\"wp-image-3976\" width=\"1024\" height=\"713\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-mikro-segmentasyon-1024x713.png 1024w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-mikro-segmentasyon-300x209.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-mikro-segmentasyon-768x534.png 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-mikro-segmentasyon-750x522.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-mikro-segmentasyon-1140x793.png 1140w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-mikro-segmentasyon.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Kaynak: Techtarget<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Yanal hareketi \u00f6nleme<\/h3>\n\n\n\n<p>S\u0131f\u0131r g\u00fcvenin \u00f6nemli bir y\u00f6n\u00fc, bir bilgisayar korsan\u0131n\u0131n bir a\u011fa girdikten sonra a\u011f i\u00e7inde yeniden konumlanmas\u0131yla ortaya \u00e7\u0131kan yanal hareketi \u00f6nlemektir. Bilgisayar korsan\u0131 \u00e7oktan a\u011fdaki di\u011fer alanlara s\u0131zmaya ba\u015flam\u0131\u015f olaca\u011f\u0131ndan, giri\u015f noktas\u0131 tespit edilse bile bunu tespit etmek zor olabilir.<\/p>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven, a\u011fa eri\u015fimi mikro b\u00f6l\u00fcmlere ay\u0131rarak bilgisayar korsanlar\u0131n\u0131n yanal olarak di\u011fer mikro b\u00f6l\u00fcmlere ge\u00e7mesini engeller.&nbsp;<\/p>\n\n\n\n<p>Belirli bir b\u00f6lgeye sabitlenen bilgisayar korsan\u0131n\u0131n yerini tespit etmek daha kolayd\u0131r, b\u00f6ylece ek b\u00f6lgelere eri\u015fim imkans\u0131z hale gelir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Cihaz eri\u015fim kontrol\u00fc<\/h3>\n\n\n\n<p>\u0130\u015fletmenin a\u011f sald\u0131r\u0131 y\u00fczeyini s\u0131n\u0131rlamak i\u00e7in s\u0131f\u0131r g\u00fcven, cihaz eri\u015fiminin titizlikle y\u00f6netilmesini gerektirir:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A\u011fa eri\u015fmeye \u00e7al\u0131\u015fan cihazlar\u0131n say\u0131s\u0131n\u0131 belgeleyin.<\/li><li>Her cihaz\u0131n yetkili oldu\u011funu onaylay\u0131n.&nbsp;<\/li><li>Cihazlar\u0131n tehlikeye at\u0131lmad\u0131\u011f\u0131ndan emin olun.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">5. En az ayr\u0131cal\u0131kl\u0131 eri\u015fim ilkesi<\/h3>\n\n\n\n<p>En az ayr\u0131cal\u0131k, kullan\u0131c\u0131 izinlerinin mant\u0131kl\u0131 bir \u015fekilde y\u00f6netilmesi yoluyla kullan\u0131c\u0131lara yaln\u0131zca gerekti\u011fi kadar eri\u015fim sa\u011flar ve her kullan\u0131c\u0131n\u0131n savunmas\u0131z a\u011f segmentlerine maruz kalmas\u0131n\u0131 mutlak minimuma indirir. Mikro b\u00f6l\u00fcmlendirme ile birlikte, yanal hareketi en aza indirmek i\u00e7in en az ayr\u0131cal\u0131kl\u0131 eri\u015fim ilkeleri kullan\u0131l\u0131r.&nbsp;&nbsp;<\/p>\n\n\n\n<p>En az ayr\u0131cal\u0131kl\u0131 eri\u015fim, g\u00fcvenli bilgi ve \u00fcst\u00fcn verimlili\u011fi kolayla\u015ft\u0131rmak i\u00e7in tam zaman\u0131nda (JIT) sa\u011flama, yeterli y\u00f6netim (JEA), risk tabanl\u0131 uyarlanabilir politikalar ve veri koruma yoluyla kullan\u0131c\u0131 eri\u015fimini s\u0131n\u0131rlar. En az ayr\u0131cal\u0131k k\u0131s\u0131tlamalar\u0131 alt\u0131nda eri\u015fimin izlenmesi, kurumun tutars\u0131zl\u0131klar\u0131 an\u0131nda tespit etmesini ve bunlara tepki vermesini sa\u011flayan analitik ve raporlama sa\u011flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. \u00c7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA)<\/h3>\n\n\n\n<p>\u00c7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA) da s\u0131f\u0131r g\u00fcven modelinin temel ilkelerinden biridir. MFA, BT kaynaklar\u0131na eri\u015fim i\u00e7in iki veya daha fazla g\u00fcvenlik mekanizmas\u0131n\u0131 birle\u015ftirir.&nbsp;&nbsp;<\/p>\n\n\n\n<p>MFA, bir parolan\u0131n yan\u0131 s\u0131ra bir g\u00fcvenlik belirteci, mobil cihazdaki bir kimlik do\u011frulama uygulamas\u0131 veya parmak izi taramas\u0131 gibi ikincil bir mekanizma gerektiren iki fakt\u00f6rl\u00fc kimlik do\u011frulamaya (2FA) benzer. \u0130kisi aras\u0131ndaki temel fark, MFA&#8217;n\u0131n g\u00fcvenlik d\u00fczeyini art\u0131rmak i\u00e7in birden fazla ikincil kimlik do\u011frulama mekanizmas\u0131 gerektirebilmesidir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nas\u0131l \u00c7al\u0131\u015f\u0131r?&nbsp;<\/h2>\n\n\n\n<p>S\u0131f\u0131r g\u00fcvenin alt\u0131nda yatan model basittir: Hi\u00e7 kimseye g\u00fcvenmemek. Kullan\u0131c\u0131lar\u0131n eri\u015fim izni alacak kimlik bilgilerine sahip olmalar\u0131 halinde g\u00fcvende olduklar\u0131n\u0131 varsayan bir a\u011f \u00e7evresi etraf\u0131nda in\u015fa edilen geleneksel modelden olduk\u00e7a farkl\u0131d\u0131r. S\u0131f\u0131r g\u00fcven modeli, a\u011f\u0131n i\u00e7indekiler de dahil olmak \u00fczere t\u00fcm kimlikleri tehdit olarak kabul eder.&nbsp;&nbsp;<\/p>\n\n\n\n<p>\u015eirket i\u00e7inde, genel bulutta veya hibrit bir ortamda olmak \u00fczere her yerde etkinle\u015ftirilen g\u00fcvenlik, kimliklerin do\u011frulanmas\u0131na dayand\u0131\u011f\u0131nda daha g\u00fc\u00e7l\u00fcd\u00fcr.&nbsp;<\/p>\n\n\n\n<p><strong>Okuman\u0131z\u0131 \u00f6neririz:<\/strong> <a href=\"https:\/\/uzmanposta.com\/blog\/bulut-bilisim\/\">Bulut Bili\u015fim (Cloud Computing) Nedir? Dijital D\u00f6n\u00fc\u015f\u00fcmde Bulut Bili\u015fimin \u00d6nemi<\/a><\/p>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven ile uygulamalar ve hizmetler a\u011flar aras\u0131nda g\u00fcvenli bir \u015fekilde ileti\u015fim kurabilir ve kimlikler, bu varl\u0131klar ister insan, ister cihaz veya uygulama olsun, i\u015f politikalar\u0131na dayal\u0131 olarak ihtiya\u00e7 duyduklar\u0131 verilere ve uygulamalara eri\u015fim izni alabilir. S\u0131f\u0131r g\u00fcven mimarisi, a\u015fa\u011f\u0131dakiler de dahil olmak \u00fczere ba\u011flama ba\u011fl\u0131 olarak eri\u015fim ilkeleri uygulayarak onaylanmam\u0131\u015f eri\u015fimi ve yan etkinlikleri \u00f6nler:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Kullan\u0131c\u0131n\u0131n rol\u00fc ve konumu&nbsp;<\/li><li>Kullan\u0131c\u0131n\u0131n cihaz\u0131&nbsp;<\/li><li>Kullan\u0131c\u0131 taraf\u0131ndan talep edilen veriler&nbsp;<\/li><\/ul>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven \u00e7er\u00e7evesinin uygulanmas\u0131, kurumun kullan\u0131c\u0131lar\u0131n\u0131, verilerini ve sistemlerini her eri\u015fim noktas\u0131nda korumak i\u00e7in \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama, kimlik g\u00fcvenli\u011fi, u\u00e7 nokta g\u00fcvenli\u011fi ve dinamik bulut tabanl\u0131 hizmetler gibi yayg\u0131n ara\u00e7lar\u0131n bir kombinasyonunu sunar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">S\u0131f\u0131r G\u00fcven Mimarisi<\/h3>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven mimarisi, i\u015fletmenin en \u00f6nemli kaynaklar\u0131n\u0131 koruyan genel bir \u00e7er\u00e7evedir. T\u00fcm ba\u011flant\u0131lar\u0131n ve u\u00e7 noktalar\u0131n tehdit oldu\u011fu varsay\u0131ld\u0131\u011f\u0131ndan, s\u0131f\u0131r g\u00fcven mimarisi:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A\u011f eri\u015fimini y\u00f6netir ve k\u0131s\u0131tlar.<\/li><li>Uygulamalar\u0131 ve verileri varsay\u0131lan olarak eri\u015filemez hale getirir.<\/li><li>Eri\u015fim izni vermenin kurumun g\u00fcvenlik politikalar\u0131na uygun olup olmad\u0131\u011f\u0131na ba\u011fl\u0131 olarak her ba\u011flant\u0131y\u0131 do\u011frular ve yetkilendirir.&nbsp;<\/li><li>G\u00fcvenlik duvarlar\u0131nda oldu\u011fu gibi, vir\u00fcsl\u00fc dosyalar\u0131n ge\u00e7 tespit edilmesine neden olabilecek bir teslimat s\u0131ras\u0131nda inceleme yakla\u015f\u0131m\u0131 kullanmak yerine dosyalar\u0131n teslimattan \u00f6nce de\u011ferlendirilmesine izin vermek i\u00e7in her ba\u011flant\u0131y\u0131 sonland\u0131r\u0131r.<\/li><li>M\u00fcmk\u00fcn oldu\u011funca \u00e7ok veri kayna\u011f\u0131ndan gelen ba\u011flam\u0131 kullanarak t\u00fcm kurumsal a\u011f trafi\u011fini kaydeder, inceler ve izler.&nbsp;<\/li><li>A\u011f varl\u0131klar\u0131n\u0131 do\u011frular ve g\u00fcvence alt\u0131na al\u0131r.<\/li><\/ul>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven mimarisi, kullan\u0131c\u0131 eri\u015fimini yaln\u0131zca i\u015f i\u015flevleri i\u00e7in gerekli olanlarla s\u0131n\u0131rlayan en az ayr\u0131cal\u0131kl\u0131 eri\u015fime dayan\u0131r. \u00d6rne\u011fin, pazarlama alan\u0131nda \u00e7al\u0131\u015fan bir \u00e7al\u0131\u015fan\u0131n i\u015fletmenin <a href=\"https:\/\/uzmanposta.com\/blog\/crm-musteri-iliskileri-yonetimi\/\">m\u00fc\u015fteri ili\u015fkileri y\u00f6netimi (CRM)<\/a> yaz\u0131l\u0131m\u0131ndaki hassas m\u00fc\u015fteri verilerine eri\u015fmesi gerekmez.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r G\u00fcven Neden \u00d6nemlidir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-neden-onemlidir.jpeg\" alt=\"\" class=\"wp-image-3981\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-neden-onemlidir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-neden-onemlidir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-neden-onemlidir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-neden-onemlidir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/sifir-guven-neden-onemlidir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven, kullan\u0131c\u0131lar\u0131n ihtiya\u00e7 duyduklar\u0131 kaynaklara, ihtiya\u00e7 duyduklar\u0131 anda, tercih ettikleri cihazlardan eri\u015febilmelerini sa\u011flayarak hibrit i\u015f yerini desteklerken, kurumun g\u00fcvenli\u011fi g\u00fcncel tutmas\u0131na ve yeni tehditler tespit edildi\u011finde ve dijital d\u00f6n\u00fc\u015f\u00fcmler ger\u00e7ekle\u015fti\u011finde uyum sa\u011flamas\u0131na olanak tan\u0131r.&nbsp;<\/p>\n\n\n\n<p>S\u0131f\u0131r g\u00fcven sundu\u011fu g\u00fcncellenmi\u015f g\u00fcvenlik modeline ek olarak, i\u015fletmenin a\u015fa\u011f\u0131daki gibi de\u011fi\u015fen i\u015f ihtiya\u00e7lar\u0131n\u0131 da destekler:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Yenilik\u00e7i dijital deneyimler i\u00e7in m\u00fc\u015fteri tercih ve beklentilerini kar\u015f\u0131lamak.<\/li><li>BT ekibinin kontrol\u00fc d\u0131\u015f\u0131ndaki artan say\u0131da cihaz taraf\u0131ndan eri\u015filen kaynaklar sa\u011flamak.<\/li><li>BT ekiplerinin eski g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, geli\u015fen siber tehditler ve artan k\u00fcresel d\u00fczenlemeler nedeniyle manuel g\u00f6revler i\u00e7in harcad\u0131klar\u0131 zaman\u0131 y\u00f6netmek.<\/li><li>Liderlik ekiplerine g\u00fcvenlik politikalar\u0131 ve tehditlere m\u00fcdahale konusunda g\u00f6r\u00fcn\u00fcrl\u00fck ve i\u00e7g\u00f6r\u00fc sa\u011flamak.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r G\u00fcvenin \u0130\u015fletmelere Faydalar\u0131&nbsp;<\/h2>\n\n\n\n<p>S\u0131f\u0131r g\u00fcvenin ba\u015far\u0131l\u0131 bir \u015fekilde uygulanmas\u0131n\u0131n kurumlara sa\u011flad\u0131\u011f\u0131 avantajlar a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Modern BT ekosistemindeki bulut, u\u00e7 nokta ve veri yay\u0131l\u0131m\u0131 seviyesi nedeniyle hayati \u00f6nem ta\u015f\u0131yan y\u00fcksek etkili bulut g\u00fcvenli\u011fi, g\u00fcvenlik ekipleri i\u00e7in daha fazla g\u00f6r\u00fcn\u00fcrl\u00fck ve verimlilik&nbsp;<\/li><li>\u0130hlali tek bir mikro segmentle s\u0131n\u0131rland\u0131rarak i\u015fletmenin sald\u0131r\u0131 y\u00fczeyini azaltmak ve bir sald\u0131r\u0131 ger\u00e7ekle\u015fti\u011finde \u015fiddeti ve ilgili kurtarma masraflar\u0131n\u0131 s\u0131n\u0131rland\u0131rmak&nbsp;<\/li><li>Azalan alt a\u011f trafi\u011fi, kolayla\u015ft\u0131r\u0131lm\u0131\u015f g\u00fcnl\u00fck kayd\u0131 ve izleme ve a\u011f hatalar\u0131na odaklanmak i\u00e7in geli\u015ftirilmi\u015f yetenek sayesinde iyile\u015ftirilmi\u015f a\u011f performans\u0131&nbsp;<\/li><li>MFA gereksinimleri nedeniyle kullan\u0131c\u0131 kimlik bilgilerinin \u00e7al\u0131nmas\u0131 ve kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131n etkisinin azalt\u0131lmas\u0131 ve temel olarak geleneksel \u00e7evre tabanl\u0131 g\u00fcvenlik \u00f6nlemlerini atlatan tehditlerin hafifletilmesi&nbsp;<\/li><li>T\u00fcm eri\u015fim taleplerinin kimli\u011fini do\u011frulayarak, korunmas\u0131 ve g\u00fcncellenmesi zor olabilecek Nesnelerin \u0130nterneti (IoT) cihazlar\u0131 da dahil olmak \u00fczere cihazlarla ili\u015fkili riski azaltmak<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Zero Trust (S\u0131f\u0131r G\u00fcven) Kullan\u0131m Durumlar\u0131<\/h2>\n\n\n\n<p>Y\u0131llard\u0131r \u00f6nerilen bir model olan s\u0131f\u0131r g\u00fcven, artan siber tehditler ve kurumlar\u0131n g\u00fcvenli dijital d\u00f6n\u00fc\u015f\u00fcm\u00fc m\u00fcmk\u00fcn k\u0131lmak i\u00e7in artan ihtiya\u00e7lar\u0131 nedeniyle geli\u015fmekte ve resmile\u015fmektedir. S\u0131f\u0131r g\u00fcven i\u00e7in \u00f6nemli kullan\u0131m alanlar\u0131 \u015funlard\u0131r<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Mevzuata uygunluk ve ilgili denetim zorluklar\u0131, siber sigortay\u0131 s\u00fcrd\u00fcrme zorlu\u011fu, <a href=\"https:\/\/uzmanposta.com\/blog\/soc\/\">g\u00fcvenlik operasyon merkezi (SOC<\/a>) sorunlar\u0131 veya kullan\u0131c\u0131lar \u00fczerindeki \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama etkileri gibi kurumsal endi\u015felerin ele al\u0131nmas\u0131n\u0131 sa\u011flar.\u00a0<\/li><li>Sa\u011flam kimlik do\u011frulama ve yetkilendirme protokollerine sahip olmayan, a\u011fa ve kaynaklar\u0131n nas\u0131l ileti\u015fim kurdu\u011funa ili\u015fkin g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fc zay\u0131f olan veya a\u015f\u0131r\u0131 sa\u011flanan yaz\u0131l\u0131m ve hizmetlerden muzdarip olan i\u015fletmeler i\u00e7in kurumsal riski azalt\u0131r.<\/li><li>\u00c7ok kimlikli, bulut, \u00e7oklu bulut veya hibrit olan veya <a href=\"https:\/\/uzmanposta.com\/blog\/saas-software-as-a-service\/\">SaaS<\/a> uygulamalar\u0131, eski sistemler veya y\u00f6netilmeyen cihazlar\u0131 i\u00e7eren altyap\u0131 modellerinin korur.<\/li><li>Yeni \u00e7al\u0131\u015fanlar\u0131 h\u0131zl\u0131 ve g\u00fcvenli bir \u015fekilde i\u015fe alma ve i\u015ften \u00e7\u0131karman\u0131n yan\u0131 s\u0131ra kullan\u0131c\u0131lar rol de\u011fi\u015ftirdi\u011finde sorunsuz bir \u015fekilde eri\u015fim izni verme ve iptal etme yetene\u011fi sa\u011flar.<\/li><li>Uzaktan \u00e7al\u0131\u015fman\u0131n yan\u0131 s\u0131ra kurumsal BT ekipleri taraf\u0131ndan y\u00f6netilmeyen bilgisayarlar\u0131 kullanan y\u00fckleniciler ve di\u011fer \u00fc\u00e7\u00fcnc\u00fc taraflar gibi \u00e7al\u0131\u015fan olmayanlar\u0131 g\u00fcvenli bir \u015fekilde destekler.\u00a0<\/li><li>Veri ihlalleri, fidye yaz\u0131l\u0131mlar\u0131, i\u00e7eriden gelen tehditler, g\u00f6lge BT veya tedarik zinciri sald\u0131r\u0131lar\u0131 gibi mevcut tehditlerin ele al\u0131nmas\u0131n\u0131 sa\u011flar.<\/li><li>Veri yedekleri, kredi kart\u0131 bilgileri ve ki\u015fisel veriler gibi hassas bilgilerin etraf\u0131nda s\u0131f\u0131r g\u00fcven mikro segmentasyonu ile s\u0131n\u0131rlar olu\u015fturmak. Bu, yaln\u0131zca veri t\u00fcrlerinin uygun \u015fekilde kategorize edilmesini sa\u011flamakla kalmaz, ayn\u0131 zamanda denetimler s\u0131ras\u0131nda veya bir veri ihlali meydana gelirse daha iyi g\u00f6r\u00fcn\u00fcrl\u00fck ve y\u00f6netim sunar.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Zero Trust&#8217;\u0131n SASE&#8217;den Fark\u0131 Nedir?<\/h2>\n\n\n\n<p>Secure Access Service Edge (SASE), g\u00fcn\u00fcm\u00fczde pop\u00fcler olan ve yine uygulamalara ve verilere g\u00fcvenli eri\u015fim sa\u011flamak i\u00e7in geli\u015ftirilmi\u015f bir ba\u015fka g\u00fcvenlik \u00e7er\u00e7evesidir. SASE ilk olarak 2019 y\u0131l\u0131nda Gartner taraf\u0131ndan &#8220;yaz\u0131l\u0131m tan\u0131ml\u0131 WAN (SD-WAN), g\u00fcvenli web a\u011f ge\u00e7idi (SWG), bulut eri\u015fim g\u00fcvenlik arac\u0131lar\u0131 (CASB), hizmet olarak g\u00fcvenlik duvar\u0131 (FWaaS) ve S\u0131f\u0131r G\u00fcven A\u011f Eri\u015fimi (ZTNA) gibi temel yetenekleri i\u00e7eren, hassas verileri veya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 tan\u0131mlama ve risk ve g\u00fcven seviyeleri i\u00e7in oturumlar\u0131n s\u00fcrekli izlenmesiyle hat h\u0131z\u0131nda i\u00e7eri\u011fin \u015fifresini \u00e7\u00f6zme yetene\u011fine sahip yeni bir teknoloji paketi&#8221; olarak tan\u0131mlanm\u0131\u015ft\u0131r. Ba\u015fka bir deyi\u015fle, SASE, S\u0131f\u0131r G\u00fcven A\u011f Mimarisini i\u00e7eren \u015femsiye bir terimdir.<\/p>\n\n\n\n<p>Her ikisi de modern g\u00fcvenlik mimarisinin \u00f6nemli bile\u015fenleridir, ancak farkl\u0131d\u0131r. SASE, bir kullan\u0131c\u0131n\u0131n veya makinenin konumundan ba\u011f\u0131ms\u0131z olarak g\u00fc\u00e7l\u00fc dijital kimli\u011fe dayal\u0131 kapsaml\u0131, \u00e7ok y\u00f6nl\u00fc bir g\u00fcvenlik \u00e7er\u00e7evesi sunar. \u00d6te yandan, SASE&#8217;in bir bile\u015feni olan Zero Trust, yaln\u0131zca kaynak eri\u015fim politikalar\u0131na ve kontrollerine odaklan\u0131r. Birlikte kullan\u0131ld\u0131klar\u0131nda, g\u00fcn\u00fcm\u00fcz\u00fcn modern BT ekosistemini etkili bir \u015fekilde koruyabilen daha kapsaml\u0131 bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc sa\u011flayabilirler.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>S\u0131f\u0131r g\u00fcven, t\u00fcm kimliklerin (ki\u015filer, cihazlar veya kullan\u0131c\u0131 olarak belirlenen di\u011fer varl\u0131klar), kullan\u0131c\u0131 ister kurumun a\u011f\u0131n\u0131n i\u00e7inde ister d\u0131\u015f\u0131nda olsun, verilere ve uygulamalara eri\u015fmeden \u00f6nce ve eri\u015firken kimli\u011finin do\u011frulanmas\u0131n\u0131, yetkilendirilmesini ve s\u00fcrekli olarak do\u011frulanmas\u0131n\u0131 gerektiren bir BT g\u00fcvenlik \u00e7er\u00e7evesidir. Geleneksel BT a\u011f g\u00fcvenli\u011fi, a\u011fa girdikten sonra t\u00fcm kimliklere g\u00fcvenir, bu da i\u015fletmeleri g\u00fcn\u00fcm\u00fcz\u00fcn siber ortam\u0131nda [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3975,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86],"tags":[],"class_list":["post-3972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir? - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir? - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"S\u0131f\u0131r g\u00fcven, t\u00fcm kimliklerin (ki\u015filer, cihazlar veya kullan\u0131c\u0131 olarak belirlenen di\u011fer varl\u0131klar), kullan\u0131c\u0131 ister kurumun a\u011f\u0131n\u0131n i\u00e7inde ister d\u0131\u015f\u0131nda olsun, verilere ve uygulamalara eri\u015fmeden \u00f6nce ve eri\u015firken kimli\u011finin do\u011frulanmas\u0131n\u0131, yetkilendirilmesini ve s\u00fcrekli olarak do\u011frulanmas\u0131n\u0131 gerektiren bir BT g\u00fcvenlik \u00e7er\u00e7evesidir. Geleneksel BT a\u011f g\u00fcvenli\u011fi, a\u011fa girdikten sonra t\u00fcm kimliklere g\u00fcvenir, bu da i\u015fletmeleri g\u00fcn\u00fcm\u00fcz\u00fcn siber ortam\u0131nda [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-25T11:06:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-25T11:09:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-sifir-guven-modeli-nedir.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir? - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/zero-trust\/","og_locale":"tr_TR","og_type":"article","og_title":"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir? - Uzman Posta","og_description":"S\u0131f\u0131r g\u00fcven, t\u00fcm kimliklerin (ki\u015filer, cihazlar veya kullan\u0131c\u0131 olarak belirlenen di\u011fer varl\u0131klar), kullan\u0131c\u0131 ister kurumun a\u011f\u0131n\u0131n i\u00e7inde ister d\u0131\u015f\u0131nda olsun, verilere ve uygulamalara eri\u015fmeden \u00f6nce ve eri\u015firken kimli\u011finin do\u011frulanmas\u0131n\u0131, yetkilendirilmesini ve s\u00fcrekli olarak do\u011frulanmas\u0131n\u0131 gerektiren bir BT g\u00fcvenlik \u00e7er\u00e7evesidir. Geleneksel BT a\u011f g\u00fcvenli\u011fi, a\u011fa girdikten sonra t\u00fcm kimliklere g\u00fcvenir, bu da i\u015fletmeleri g\u00fcn\u00fcm\u00fcz\u00fcn siber ortam\u0131nda [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/zero-trust\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-12-25T11:06:09+00:00","article_modified_time":"2023-12-25T11:09:10+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-sifir-guven-modeli-nedir.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir?","datePublished":"2023-12-25T11:06:09+00:00","dateModified":"2023-12-25T11:09:10+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/"},"wordCount":2580,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-sifir-guven-modeli-nedir.jpeg","articleSection":["G\u00fcvenlik"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/","url":"https:\/\/uzmanposta.com\/blog\/zero-trust\/","name":"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir? - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-sifir-guven-modeli-nedir.jpeg","datePublished":"2023-12-25T11:06:09+00:00","dateModified":"2023-12-25T11:09:10+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-sifir-guven-modeli-nedir.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/12\/zero-trust-sifir-guven-modeli-nedir.jpeg","width":1000,"height":500,"caption":"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir?"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Zero Trust (S\u0131f\u0131r G\u00fcven) Modeli Nedir?"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3972"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3972\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3975"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}