2.4 Network Security Models Flashcards

1
Q

Perimeter-based security

A

Mainframe computers could be accessed by only a relatively limited number of remote job entry (RJE) terminals that were directly connected in physically secured areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why perimeter-based security is insufficient

A
  • Fail to account for sophisticated cyberthreats to penetrate perimeter defenses.
  • Malicious users can gain access to the internal network and sensitive resources by using stolen credentials.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The primary issue with a perimeter-based network security

A

The assumption that everything on the internal network can be trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shortcomings of the broken trust model (such as port-based firewalls)

A
  • Definitively distinguish good applications from bad ones.
  • Adequately account for encrypted application traffic.
  • Accurately identify and control users.
  • Filter allowed traffic not only for known application-porne threats but also for unknown ones.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero Trust security

A

Essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Benefits of implementing a Zero Trust network

A
  • Clearly improved effectiveness in mitigating data loss.
  • Greater efficiency for achieving and maintaining compliance with security and privacy mandates.
  • Improved ability to securely enable transformative IT initiatives.
  • Lower total cost of ownership with a consolidated and fully integrated security operating platform.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Core Zero Trust design principles

A
  • Ensure that all resources are accessed securely, regardless of location.
  • Adopt a least privilege strategy and strictly enforce access control.
  • Inspect and log all traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Main components of a Zero Trust conceptual architecture

A
  • Zero Trust Segmentation Platform.
  • Trust zones (micro core and perimeter, MCAP)
  • Management infrastructure (centralized mgmt)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero Trust Segmentation Platform

A

Network segmentation gateway used to define internal trust boundaries.

Ability to:

  • Enable secure network access
  • Granularly control traffic flow to and from resources
  • Continuously monitor allowed sessions for any threat activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key Zero Trust criteria and capabilities

A
  • Secure access
  • Inspection of all traffic
  • Least privileges access control
  • Cyberthreat protection
  • Coverage for all security domains
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Implementing a Zero Trust design

A
  1. Collect traffic flows
  2. Define trust zones and incrementally establish corresponding trust boundaries based on relative risk and/or sensitivity.
    - Deploy devices in appropriate locations to establish internal trust boundaries for defined trust zones.
    - Configure the appropriate enforcement and inspection policies
  3. Establish trust zones and boundaries for other segments.
    - IT Mgmt
    - Partner resources (B2B)
    - High-profile customer-facing resources and connections(B2C)
    - Branch offices in risky countries
    - Guest access network
    - Campus networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly