FUNDAMENTALS OF SECURITY Flashcards
ZERO TRUST
1
Q
DEFINE THE CONCEPT OF ZERO TRUST
A
ZERO TRUST DEMANDS VERIFICATION FOR EVERY DEVICE , USER AND TRANSACTION WITHIN THE NETWORK, RGARDLESS OF ITS ORIGIN
2
Q
HOW TO CREATE A ZERO TRUST ARCHITECTURE?
A
WE NEED
1. A CONTROL PLANE -> IT LAYS OUT THE POLICIES AND PROCEDURES. (ADAPTIVE IDENTITY,THREAT SCOPE REDUCTION, POLICY DRIVEN ACCESS CONTROL, SECURED ZONES)
- A DATA PLANE -> THE DATA PLANE ENSURES THIS POLICIES ARE PROPERLY EXECUTED(SUBJECT/ SYSTEM , POLICY ENFORCEMENT POINT)
THE SUBJECT/SYSTEM IS THE INDIVIDUAL OR ENTITY ATTEMPTING TO GAIN ACCESS
POLICY ENFORCEMENT POINT->ALLOW OR RESTRICT ACCESS
3
Q
WHAT TYPE OF POLICIES ARE USED BY THE CONTROL PANE?
A
POLICY ENGINE -> IT CROSS-REFERENCES THE ACCESS REQUEST WITH ITS PREDEFINE POLICIES
POLICY ADMINSTRATOR -> IT MANAGES THE ACCESS POLICIES