2 Fundamentals of Security: Zero Trust Flashcards
demands verification for every device, user, and transaction within the
network, regardless of its origin
Zero Trust
To create a zero trust architecture, we need to use two different planes
Control
Data
Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
Control Plane
Control Plane typically encompasses several key elements
Adaptive Identity
Threat Scope Reduction
Policy Driven Access Control
Secured Zones
Relies on real-time validation that takes into account the user’s behavior, device, location, and more
Adaptive Identity
Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface
Threat Scope Reduction
Focused on minimizing the “blast radius” that could occur in the event of a breach
Threat Scope Reduction
Entails developing, managing, and enforcing user access policies based on their roles and responsibilities
Policy Driven Access Control
Isolated environments within a network that are designed to house sensitive data
Secured Zones
Ensures the policies are properly executed
Data plane
Data plane consists of the following
Subject/system
policy engine
policy admin
policy enforcement point
Refers to the individual or entity attempting to gain access
Subject/system
■ Cross-references the access request with its predefined policies
Policy Engineering
Used to establish and manage the access policies
Policy Admin
Where the decision to grant or deny access is actually
execute
Policy Enforcement Point