1.2 Zero trust Flashcards
Zero trust
-nothing is trusted
•covers every device, process, and person
•everything must be verified
-multi factor authentication, encryption, system permission, additional firewalls, etc
Planes of operation
-data plane
-control plane
Data plane
-process planes, packets, and network data
-processing, forwarding, trunking, encrypting, NAT
Control plane
-manages the actions of the data plane
-define policies and roles
-determines how packets should be forwarded
-routing tables, session tables, NAT tables
Policy decision point
-process for making an authentication decision
Policy engine
-evaluates each access decision based on policy and other sources
-grant, deny, revoke
Policy administrator
-communicates with the policy enforcement point
- generates access tokens or credentials
-tells the PEP to allow or disallow access address
-make the authentication stronger if needed
Threat scope reduction
-decrease the number of possible entry points
Policy driven access control
-combine the adaptive identity with a predefined set of rules