FUNDAMENTALS OF SECURITY Flashcards

ZERO TRUST

1
Q

DEFINE THE CONCEPT OF ZERO TRUST

A

ZERO TRUST DEMANDS VERIFICATION FOR EVERY DEVICE , USER AND TRANSACTION WITHIN THE NETWORK, RGARDLESS OF ITS ORIGIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HOW TO CREATE A ZERO TRUST ARCHITECTURE?

A

WE NEED
1. A CONTROL PLANE -> IT LAYS OUT THE POLICIES AND PROCEDURES. (ADAPTIVE IDENTITY,THREAT SCOPE REDUCTION, POLICY DRIVEN ACCESS CONTROL, SECURED ZONES)

  1. A DATA PLANE -> THE DATA PLANE ENSURES THIS POLICIES ARE PROPERLY EXECUTED(SUBJECT/ SYSTEM , POLICY ENFORCEMENT POINT)

THE SUBJECT/SYSTEM IS THE INDIVIDUAL OR ENTITY ATTEMPTING TO GAIN ACCESS

POLICY ENFORCEMENT POINT->ALLOW OR RESTRICT ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT TYPE OF POLICIES ARE USED BY THE CONTROL PANE?

A

POLICY ENGINE -> IT CROSS-REFERENCES THE ACCESS REQUEST WITH ITS PREDEFINE POLICIES

POLICY ADMINSTRATOR -> IT MANAGES THE ACCESS POLICIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly