1.2 Zero trust Flashcards

1
Q

Zero trust

A

-nothing is trusted
•covers every device, process, and person
•everything must be verified

-multi factor authentication, encryption, system permission, additional firewalls, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Planes of operation

A

-data plane
-control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data plane

A

-process planes, packets, and network data

-processing, forwarding, trunking, encrypting, NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control plane

A

-manages the actions of the data plane
-define policies and roles
-determines how packets should be forwarded
-routing tables, session tables, NAT tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Policy decision point

A

-process for making an authentication decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Policy engine

A

-evaluates each access decision based on policy and other sources

-grant, deny, revoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Policy administrator

A

-communicates with the policy enforcement point
- generates access tokens or credentials
-tells the PEP to allow or disallow access address
-make the authentication stronger if needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat scope reduction

A

-decrease the number of possible entry points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Policy driven access control

A

-combine the adaptive identity with a predefined set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly