Introduction to Zero Trust - Definitions, Concepts and Components Flashcards

1
Q

What does the ZT concept as a cybersecurity approach require according to the CSA?

A

ZT is a cybersecurity approach that requires the following:
1. Making no assumptions about the trustworthiness of an entity as it requests access to a resource
2. Starting with no pre-established entitlements, then relying on a construct which is used to add entitlements
3. Assuming breach and verifying all workforce, device, workload, network and data access, regardless of where, who, or to what resource with the assumption that breaches are impending or have already occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Tenet?

A

A principle generally held to be true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many tenets has ZT according to the USA Department of Defense Zero Trust Reference Architecture?

A

ZT has 5 major tenets:
1. Assume a hostile environment
2. Assume breach
3. Never trust, always verify
4. Scrutinize explicitly
5. Apply unified analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAAS stands for

A

Data, Applications, Assets and Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are several design principles of ZTA?

A
  1. Denying access until the requester has been thoroughly authenticated and authorized
  2. Allowing access to the network only when requesters (users, machines, processes) authenticate who they are
  3. Allowing access to resources only after the requesting entity has been authorized
  4. Enforcing least privilege, specifically, granting the least amount of access required
  5. Requiring continuous monitoring of existing security controls’ implementation and effectiveness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the seven pillars of a Zero Trust Architecture?

A

There are seven pillars of DoD ZTA:
1. Users/identities
2. Devices/endpoints
3. Network/Environment
4. Applications & Workload
5. Data
6. Visibility & Analytics
7. Automation & Orchestration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is in the Users pillar?

A
  • Securing/limiting/enforcing DAAS access for person, non-person, and federated entities through identity, credential and access management capabilities
  • MFA and continuous multi-factor authentication
  • Continuously authenticate, authorize, and monitor activity patterns
  • RBAC and ABAC for authorizing users to access applications/data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is in the Devices / endpoints pillar?

A
  • Identify, authenticate, authorize, inventory, isolate, secure, remediate and control all devices
  • Real-time device attestation and patching

E.g., using Mobile device managers or comply-to-connect (C2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is in the Network/environment pillar?

A

Logically and physically segment, isolate and control the on-premise and off-premises network/environment with granular access and policy restrictions:
- Control privileged access
- Manage internal and external data flows
- Prevent lateral movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is in the Application and Workload pillar?

A

Tasks on systems or services on-premises as well as applications or services in a cloud environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is in the Data pillar?

A

Data categorized in terms of mission criticality under a comprehensive data management strategy.
- Categorization of data
- Encryption at rest and in transit
- Technologies like DRM, DLP, software-defined storage and granular data-tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is in the Visibility and Analytics pillar?

A

Visibility on vital, contextual details to provide a greater understanding of performance, behavior and activity baselines across various ZT pillars. Other monitoring data for situational awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is in the Automation and Orchestration pillar?

A

Automated security processes to take policy-based actions across the enterprise with speed and at scale. For example Security Orchestration, Automation and Response, integrated with Security Information and Event Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does ZT stand for?

A

Zero Trust

ZT is a set of principles and practices designed for reducing cyber risk in dynamic IT environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three core components for a Zero Trust Architecture?

A
  1. Communication: a request for an entity to access a resource and the resulting access or session.
  2. Identity: The identity of the entity (e.g., user or device) requesting access to the resources
  3. Resources: any assets within the target environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two fundamental elements of Zero Trust?

A
  1. Policy: the governance rules that identify the who, what, when, how, why of access to the target resource
  2. Data sources: the contextual information providers can use to keep policies dynamically updated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary requirement of the Zero Trust model?

A

Strict authentication and verification for each person, device, or service trying to access an IT resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In Zero Trust, how is the security posture of a resource assessed?

A

Based on authentication and authorization controls in place, not by its location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What must occur prior to granting network access in a Zero Trust network?

A

Authentication and explicit authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False: Encrypting communications alone is sufficient for Zero Trust security.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a key aspect of Zero Trust regarding access verification?

A

Each individual flow must be confirmed as an authorized connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What percentage of attacks start with a breach via a phishing email?

A

90%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the steps typically involved in a phishing attack leading to data exfiltration?

A
  1. Breach via phishing email
  2. Creation or compromise of an administrative account
  3. Lateral movement of malware
  4. Exfiltration of enterprise data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does CSA define the Zero Trust concept as?

A

A cybersecurity approach that requires verification of all access requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What assumption does Zero Trust make about an entity’s trustworthiness?

A

No assumptions; trust is not pre-established

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Fill in the blank: Zero Trust starts with no pre-established _______.

A

entitlements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a recent trend in enterprise security related to Zero Trust?

A

Increasing number of remote users and assets based in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How are hardware manufacturers and software vendors responding to the shift towards Zero Trust?

A

Rapidly adopting the ZT model and validating their products for ZT implementation

29
Q

What does it mean to ‘assume breach’ in Zero Trust?

A

Most large enterprises experience daily cybersecurity attacks and may already be compromised

This tenet suggests managing resources with vigilance, as if an adversary has a foothold in the environment.

30
Q

What is the principle of ‘never trust, always verify’?

A

Deny access by default and authenticate every access request

This involves using least privilege, multiple attributes, and dynamic cybersecurity policies for access control.

31
Q

What does it mean to ‘scrutinize explicitly’?

A

Access resources in a secure manner using multiple attributes to determine confidence levels

Access is conditional and can change based on actions and confidence levels.

32
Q

What is the fifth major tenet of Zero Trust?

A

Apply unified analytics

This involves using analytics and behavioristics to monitor data, applications, assets, and services, and logging each transaction.

33
Q

Fill in the blank: A tenet is defined as a principle generally held to be _______.

34
Q

True or False: The Zero Trust model assumes that all users and devices are trusted by default.

A

False

The model assumes a hostile environment and treats all users and devices as untrusted.

35
Q

List the five major tenets of Zero Trust.

A
  • Assume a hostile environment
  • Assume breach
  • Never trust, always verify
  • Scrutinize explicitly
  • Apply unified analytics
36
Q

What is the first design principle of ZTA9?

A

Denying access until the requestor has been thoroughly authenticated and authorized

This includes inspecting, authenticating, and authorizing users, devices, or individual packets.

37
Q

What does ZTA require regarding access to resources?

A

Access to resources is temporary and reverification is required

The timespan of access is defined by policies.

38
Q

How does access change with Zero Trust (ZT)?

A

Requesters aren’t allowed access to anything until they authenticate who they are.

39
Q

What must happen before access to resources is granted?

A

The requesting entity must be authorized.

40
Q

What principle is enforced regarding access rights?

A

Enforcing least privilege

This means granting the least amount of access required.

41
Q

What is required for continuous security in ZTA?

A

Continuous monitoring of existing security controls’ implementation and effectiveness.

42
Q

What is the Zero Trust Architecture (ZTA)?

A

A work-in-progress concept with evolving boundaries and definitions

43
Q

How many fundamental pillars of a Zero Trust Architecture are emphasized by the CSA?

44
Q

What does the Users/identities pillar focus on?

A

Securing, limiting, and enforcing access for users and entities

This includes identity, credential, and access management capabilities like multi-factor authentication (MFA) and continuous multifactor authentication (CMFA).

45
Q

Name two access control methods mentioned in the Users/identities pillar.

A
  • Role-based access control (RBAC)
  • Attribute-based access control (ABAC)
46
Q

What is essential in the Device/endpoints pillar?

A

Identifying, authenticating, authorizing, inventorying, isolating, securing, remediating, and controlling all devices

47
Q

What are critical functions in the Device/endpoints pillar?

A
  • Real-time attestation
  • Patching of devices
48
Q

What should organizations do to their network/environment in a ZT approach?

A

Segment, isolate, and control both on-premise and off-premises networks

49
Q

What is the importance of macro-segmentation in a ZT approach?

A

Enables micro-segmentation for greater protections and controls

50
Q

What tasks should the Applications and workload pillar include?

A

Tasks on systems or services on-premises and cloud environments

51
Q

What should be central to ZT adoption concerning applications?

A

Securing and managing the application layer, compute containers, and virtual machines

52
Q

What is the purpose of categorizing DAAS in the Data pillar?

A

To develop a comprehensive data management strategy

53
Q

List three solutions for protecting critical data in the Data pillar.

A
  • Digital Rights Management (DRM)
  • Data Loss Prevention (DLP)
  • Granular data-tagging
54
Q

What does the Visibility and analytics pillar improve?

A

Detection of anomalous behavior and dynamic changes to security policies

55
Q

What is the role of Security Orchestration, Automation, and Response (SOAR) in ZT?

A

Improves security and decreases incident response times by automating responses to threats

56
Q

What is the purpose of governance in ZT?

A

To ensure successful implementation and control over goals and actions

57
Q

True or False: Automation and orchestration in ZT only focus on manual processes without policy-based actions.

58
Q

Fill in the blank: The _______ pillar involves the automation of manual security processes.

A

Automation and orchestration

59
Q

What are the three core components of Zero Trust Architecture (ZTA)?

A
  • Communication
  • Identity
  • Resources

These components are essential for making access decisions.

60
Q

What are the two additional fundamental elements of ZTA?

A
  • Policy
  • Data sources

These elements help define access governance and keep policies updated.

61
Q

What does the Policy Decision Point (PDP) consist of?

A
  • Policy administrator
  • Policy engine (PE)

The PDP determines the rules and communicates them to the PEP.

62
Q

What is the role of the Policy Enforcement Point (PEP)?

A

Acts as a gateway to ensure access to approved resources has been granted to the correct entity

The PEP enforces the rules defined by the PDP.

63
Q

How does NIST define the PDP?

A

As the control plane responsible for collecting, analyzing, and transforming data into rules for resource access

The PDP governs access to resources based on intelligence and rules.

64
Q

What is the function of the PEP in ZTA?

A

The data plane that enforces rules and provides access to resources based on input from the control plane

The PEP executes the access rules set by the PDP.

65
Q

What is the purpose of data sources in the context of ZTA?

A

To feed data into the PDP to maintain rules and keep the decision-making process updated

Various intelligence sources help refine access rules.

66
Q

List some possible information sources for the policy engine.

A
  • Intrusion detection system (IDS)/Intrusion detection and prevention system (IDPS)
  • Network devices (e.g., firewalls, proxies)
  • Threat intelligence feeds
  • Information sharing systems
  • Denylists and blocklists
  • Identity providers and access management systems
  • Legal and regulatory compliance requirements
  • Asset/device management systems
  • Public key infrastructure

These sources provide critical data for policy enforcement.

67
Q

True or False: Manual management of the access model is recommended in a Zero Trust environment.

A

False

Automation is encouraged to manage the increased number of PEPs effectively.

68
Q

Fill in the blank: The PDP and PEP regulate access to resources by being placed in the __________ of traffic.

A

access workflow

This integration helps enforce access control policies.

69
Q

What advantage does automation provide in a Zero Trust environment?

A

Supports both granular and global control

Automation helps manage complex access models efficiently.