GRC Course Flashcards
1
Q
The 5 Principles of ZTNA? I.D.A.D.I.N
A
Identities
- Identity and Access Management (IAM) services
- User behaviour analytics (UBA)
- Privileged Access Management (PAM)
- Endpoint protection
- Mobile device management (MDM)
- AD protection
- Honeypots
Applications
- Web Application Firewall (WAF)
- Application control and whitelisting (Airlocker)
- Runtime application self-protection (RASP)
- API security
Data
- Data Loss Prevention (DLP)
- Encryption and tokenization
- Data classification and tagging
- Database activity monitoring (DAM)
Infrastructure
- Network Access Control (NAC)
- Cloud Access Security Broker (CASB)
- Virtual Private Network (VPN) services
- Intrusion Detection and Prevention Systems (IDPS)
- Security Information and Event Management (SIEM) integration