Introduction to ZTA - Introduction Flashcards

1
Q

What does ZTA stand for?

A

Zero Trust Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which technology developments put increasing pressure on networks and security measures of organizations?

A

Developments leading to distributed environments like cloud computing, edge computing and IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a primary strategy for organizations adopting new technologies?

A

Organizations increasingly adopt new technologies through cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What has increased the complexity of networks and service architectures?

A

The creation of a distributed environment through the integration of on-premises IT services with public cloud services, sensors, and actuators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technological advancements have influenced organizations to adopt distributed environments?

A

Cloud computing, edge computing, IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which social behavior trend has contributed to the need for distributed environments in organizations?

A

Increased requests for mobility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a significant challenge organizations face regarding data protection?

A

Data residing in virtual environments outside physical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are traditional security architectures becoming ineffective?

A

Traditional security architectures focus on securing the physical network perimeter - which does no longer exist in a distributed environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the core principle of the ZT concept?

A

Never trust, always verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does ZTA approach the design of architectures?

A

From the inside out versus outside in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: ZTA creates virtual _______ and grants access to resources inside of that enclave.

A

enclaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: ZTA is only applicable to government organizations.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the evolution of social behavior in organizations emphasize?

A

Mobility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the (distributed) entities that need to be connected in modern networks?

A
  • Remote offices
  • Remote workers
  • Contractors
  • Smart objects
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who first coined the term Zero Trust (ZT)?

A

John Kindervag around 2010

John Kindervag was a principal analyst at Forrester.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the central concept behind Zero Trust according to Kindervag?

A

All network traffic is untrusted

Requests to access data or resources should be verified at each step.

17
Q

Which organizations previously researched the concept of Zero Trust before Kindervag?

A
  • Jericho Forum at the Open Group
  • U.S Defense Information Systems Agency (DISA)
  • Department of Defense (DOD)
18
Q

What was the earliest concept of Zero Trust based on?

A

Data-centric network design leveraging microsegmentation.

19
Q

What does microsegmentation aim to achieve in the context of Zero Trust?

A

Limit lateral movement of attackers.

20
Q

What significant development in 2013 was related to Zero Trust?

A

Initiation of Cloud Security Alliance’s Software-Defined Perimeter (SDP) concept.

21
Q

What is the primary goal of the Software-Defined Perimeter (SDP)?

A

Create an invisible perimeter requiring positive identification of network connections.

22
Q

What was the motivation behind Google’s implementation of Zero Trust for its employees in 2014?

A

The recognition that traditional perimeter security was no longer sufficient.

23
Q

What is the name of Google’s model that shifted access controls from the perimeter to individual devices and users?

A

BeyondCorp.

24
Q

What does the BeyondCorp model allow users to do?

A

Work securely from any untrusted network.

25
Q

Which report published in 2018 extended the original Zero Trust model?

A

Zero Trust eXtended (ZTX) Ecosystem report.

26
Q

What does the Zero Trust eXtended (ZTX) Ecosystem report encompass?

A

The original model was extended beyond its network focus to encompass today’s ever-expanding attack surface.

27
Q

When did NIST announce the final publication of Special Publication (SP) 800-207?

A

August 2020.

28
Q

What does Special Publication (SP) 800-207 discuss?

A

Core logical components of Zero Trust Architecture.

29
Q

True or False: The Zero Trust model is static and does not evolve.