Examining Zero Trust Architecture Flashcards
What is Zero Trust Architecture?
A security model that requires strict identity verification for every person and device trying to access resources.
What does the term ‘North-to-south’ refer to in traditional security?
Traditional perimeter-based security.
What does ‘East-to-west’ traffic require in a Zero Trust model?
Authentication beyond the firewall.
What principle is Zero Trust Architecture based on?
‘Never Trust, Always Verify’.
What are the fundamentals of Zero Trust?
Dynamic security, network segmentation, continuous monitoring.
How does Zero Trust differ from traditional security?
ZTA is a dynamic model versus a static security model.
What is an example of network segmentation?
Segmenting a corporate network into HR, finance, and operations, each with separate access controls.
What is Continuous Monitoring in Zero Trust?
A system that continuously checks a user’s behavior against their profile, flagging anomalies.
What is Policy-Based Authentication?
Modern identity verification using multifactor authentication.
What is dynamic authentication?
Access permissions change based on location, time, or device security status.
What is Adaptive risk assessment?
A user’s risk level is assessed based on unusual download patterns or access requests.
What is Role-Based Access Control (RBAC)?
Authorization based on an employee’s role.
What is Attribute-Based Access Control (ABAC)?
Access based on attributes like location or time of day.
What is real-time authorization?
Revoking user access to sensitive data the moment their role changes.
What does Continuous Re-validation involve?
Periodic checks prompting a user to re-authenticate at random intervals.
What is the Principle of Least Privilege?
Employees are given access only to the resources necessary for their job.
What are Just-In-Time and Just-Enough-Access?
Temporary access grants to a system for maintenance, restricting access to only what is needed.
How does least privilege mitigate risks?
Prevents malware infection from spreading beyond its entry point.
What are some transition challenges to Zero Trust Architecture?
Legacy systems compatibility issues.
What is a recommended best practice for transitioning to ZTA?
Start with a small, critical area of the network and gradually expand TA principles.