Introduction to ZTA - Objectives of ZT Flashcards

1
Q

What is the primary objective of Zero Trust Architecture (ZTA)?

A

To address security risks inherent in the assumption of trust and lack of proper access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are typical approaches to addressing security risks in ZTA?

A

Reducing the attack surface and/or improving the effectiveness of security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the motivation behind Zero Trust Architecture?

A

To provide a holistic and consistent security approach for protecting an enterprise against malicious actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key differentiator in ZTA?

A

The ephemeral nature of any trust between data/computing resources and the principals requesting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does ZTA enhance an environment’s security posture?

A

Through dynamic policy enforcement and decisioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of attacks does ZTA protect against?

A

Both internal and external attacks that exploit and compromise exposed access mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the technical objectives of a ZT approach?

A

Establishes a framework for protecting resources, simplifies user experience, reduces attack surface size and complexity, enforces least privilege, improves control and resilience, localizes impact radius of a security failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the business objectives of Zero Trust?

A

Reduce risk, improve governance and regulatory compliance, align organization’s culture with risk appetite of its leadership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: A ZT approach aims to _______ the organization’s attack surface size and complexity.

A

reduce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: ZTA only addresses external threats.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ZT stand for?

A

Zero Trust

ZT is an approach to cybersecurity that does not inherently trust any entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the core premise of Zero Trust?

A

An organization should not inherently trust any entity that comes from within or beyond its boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the goal of the protective framework established by ZT?

A

To enable a shift of focus to more business-oriented goals and protect data based on its value and specific needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are aged cybersecurity techniques becoming ineffective?

A

They yield limited results and inadequate protection due to the increasing frequency and scale of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of approaches are no longer practical according to ZT?

A

Approaches based on physical objects and systems, and signature-based threat detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What factors necessitate a reconsideration of cybersecurity strategies?

A

Increasing frequency and scale of attacks, hyper-connected world, virtualized environments, and software-based organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: The protective framework established by ZT represents a _______ approach to cybersecurity.

A

novel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or False: Zero Trust allows organizations to trust internal entities by default.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What should organizations reconsider according to the ZT framework?

A

Everything from network configurations to detection and prevention approaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do organizations need to focus on regarding their data?

A

The value of the data and their specific protection needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does ZTA stand for?

A

Zero Trust Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does ZTA reduce management overhead?

A

By applying a consistent access model for all assets and handling access requests uniformly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the consistent interrogation model used in ZTA for access requests?

A

Who are you? Do you need this access now? Okay, you get this access to this resource for this period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

List the elements that ZTA models are absent of.

A
  • Complicated diagrams of nested groups using legacy access control lists (ACL)
  • Layers of groups managed by potentially irrelevant decision-makers
  • Stale and orphaned groups
  • Authorization mechanisms based on antiquated models/labels
  • Delays in provisioning, deprovisioning, or access revocation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

True or False: ZTA uses legacy access control lists (ACL) with allow and deny parameters.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a key feature of access handling in ZTA?

A

Every request is handled consistently, just-in-time by the PDPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Fill in the blank: ZTA reduces management overhead by applying a consistent _______ model.

A

[access]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are PDPs in the context of ZTA?

A

Policy Decision Points that handle access requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What types of groups does ZTA eliminate to reduce complexity?

A
  • Complicated nested groups
  • Stale and orphaned groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does ZTA aim to eliminate in the authorization process?

A

Authorization mechanisms based on antiquated models/labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the main difference between traditional security architecture and the Zero Trust (ZT) model regarding access decisions?

A

In traditional security architecture, access decisions are made at the network perimeter, while in the ZT model, each internal resource decides whether to grant access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What happens to denied traffic in traditional security architecture?

A

Denied traffic is dropped outside of the perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Why is internal traffic often not encrypted in traditional security architectures?

A

It is rare for organizations to encrypt internal traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What actions can an attacker perform once they penetrate the internal network in traditional security architecture?

A
  • Run port scans
  • Find vulnerabilities
  • Launch denial-of-service attacks
  • Steal additional credentials
  • Eavesdrop on privileged network traffic
  • Move laterally unobstructed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How does the Zero Trust model affect an attacker’s ability to exploit internal resources?

A

An attacker is no better off after penetrating external defenses, as each internal resource makes access decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Fill in the blank: In a traditional security architecture, the attack surface is every resource, while in the Zero Trust model, it contracts to only _______.

A

improperly secured resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

True or False: In the Zero Trust model, once an attacker gains access to the internal network, they can move laterally without restrictions.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does an organization’s ever-expanding digital footprint lead to?

A

An increasingly complex IT environment

This complexity arises from access decisions made in advance and unmanaged permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are orphaned objects in the context of IT access?

A

Objects with unmanaged permissions left behind by parties that granted access

These objects can pose security challenges as they may lead to unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is one of the biggest security challenges for organizations due to complexity?

A

Reduced visibility and increased vulnerabilities

This complexity makes it easier for malicious actors to infiltrate networks.

41
Q

How do newer IT paradigms like hybrid cloud and edge computing affect access control policy management?

A

They further complicate access control policy management

This results from the diverse environments and configurations involved.

42
Q

What does ZT (Zero Trust) assume about parties requesting application access?

A

All parties are malicious and should be untrusted

This assumption leads to a more secure approach to access management.

43
Q

What is the main strategy of ZT in managing security?

A

Creating islands of applications and data to protect

This strategy focuses on protecting specific areas rather than policing the entire network.

44
Q

What do ZT strategies require more of compared to standard security mechanisms?

A

Far more attributes

This requirement enhances security by providing more granular control.

45
Q

How does ZT help organizations striving for agility?

A

By reducing security architecture complexity

It achieves this by creating perimeters around applications and identities.

46
Q

What is the effect of ZT on the number of access points in an IT environment?

A

It reduces the number of access points

This results in tighter control over access levels and privileges.

47
Q

Fill in the blank: ZT provides a robust security mechanism to reduce _______ by creating perimeters around applications and identity.

A

security architecture complexity

This helps in managing access more effectively.

48
Q

True or False: ZT simplifies access management by assuming all parties are trustworthy.

A

False

ZT assumes all parties are untrusted to enhance security.

49
Q

What principle does ZT enforce regarding user privileges?

A

The principle of least privilege

This principle dictates that users and programs should only have the necessary privileges to complete their tasks.

50
Q

How does ZT manage user access?

A

Users get access to exactly what they need to conduct their business, when they need it

This approach aligns with the principle of least privilege.

51
Q

What is micro-segmentation in the context of ZT?

A

The creation of zones in an IT environment to isolate workloads for better security

This practice helps users connect to the right application and use only the services they require.

52
Q

What advantage does micro-segmentation provide in security operations?

A

It simplifies access provisioning

This simplification makes it easier to manage security operations and governance teams.

53
Q

What are purpose-based dedicated identities also known as?

A

Identity personas

These personas are created for a group of resources that address a common functionality.

54
Q

What is the purpose of creating identity personas in ZT?

A

To help limit the attack surface created by the compromise of an identity

This approach enhances security by managing how identities are utilized.

55
Q

What is the primary objective of Zero Trust (ZT)?

A

To enhance and bolster the resilience and the security posture of an enterprise’s IT infrastructure

56
Q

How does ZT reduce visibility for malicious actors?

A

By ensuring they have reduced visibility into the enterprise’s IT infrastructure and individual assets

57
Q

What does ZTA do to minimize the risk of cross-site attacks?

A

Restricts lateral movement within the organization

58
Q

What is the impact of containing external users within a small area of the network?

A

Any resulting security issues can be quickly contained and addressed

59
Q

How does ZT limit the impact radius of security incidents?

A

By enabling the swift return of systems to their earlier state

60
Q

What ensures that unauthorized scanning and mapping activities are unsuccessful?

A

The reduced attack surface within the ZT implementation

61
Q

What are the components of the two-layer architecture in ZT?

A

A separated control plane and data plane

62
Q

What must occur before access is granted to the organization’s network?

A

Users and their devices must be properly authenticated and authorized

63
Q

True or False: ZTA allows for unrestricted lateral movement within the organization.

64
Q

Fill in the blank: The two-layer architecture helps ensure that access is granted only after _______.

A

[users and their devices have been properly authenticated and authorized]

65
Q

What is a primary goal of Zero Trust Architecture (ZTA)?

A

To make the incident management process more effective and efficient.

This includes principles like ‘never trust, always verify’ and presuming an ongoing breach.

66
Q

What does the principle of ‘never trust, always verify’ entail?

A

It requires continuous behavioral monitoring of all system entities.

This principle is foundational in Zero Trust Architecture.

67
Q

How does micro-segmentation benefit incident containment?

A

It reduces the impact radius of potential breaches by restricting a cyber attacker’s lateral movement.

This segmentation confines damage to a limited area.

68
Q

What happens when a breach occurs in a Zero Trust environment?

A

Damage is limited to a confined area, allowing for effective containment, eradication, and remediation efforts.

This is crucial for managing the incident’s scope.

69
Q

How does continuous monitoring in ZTA improve incident management?

A

It allows for more effective identification of anomalies and incidents.

Continuous monitoring is a key feature of Zero Trust Architecture.

70
Q

What is the role of incident-related data in ZTA?

A

It is used to update the Policy Decision Point (PDP), allowing for dynamic policy definition and enforcement.

This process is critical for limiting impact across the organization’s network.

71
Q

True or False: Zero Trust Architecture assumes that breaches are impossible.

A

False.

ZTA operates under the presumption of an ongoing breach.

72
Q

Fill in the blank: The principle of continuous network access authorization in ZTA helps to _______.

A

reduce the impact radius of potential breaches.

73
Q

What is a primary business goal of Zero Trust Architecture (ZTA)?

A

Reduction of cyber risk

This goal is especially critical for organizations facing complexity from distributed computing infrastructures and migration to the public cloud.

74
Q

What are some technical goals related to risk reduction in ZTA?

A

Reducing the attack surface and achieving an improved security posture

These goals help organizations maintain resilience against cyber threats.

75
Q

List the types of risks ZTA aims to reduce.

A
  • Improper privilege escalation via lateral movement
  • Access beyond need to know requirements
  • Access beyond required time frame
  • Access by unsecure devices
  • Access via unsecured methods
  • Compromises via brute force, DDoS, or MITM attacks
  • Unauthorized lateral movement

These risks are critical for maintaining security in a connected enterprise.

76
Q

What does ZTA support to protect logins against common attacks?

A

Multi-Factor Authentication (MFA)

MFA helps defend against brute-force attacks, dictionary attacks, and stolen credentials.

77
Q

What principle is implemented in all ZTA variants to mitigate internal attacks?

A

Principle of least privilege

This principle ensures that users have the minimum level of access necessary to perform their tasks.

78
Q

How does ZTA prevent unauthorized access to resources?

A

By applying controls and policies to every protected resource for every access request

This level of granularity enhances security by limiting access.

79
Q

What is a critical requirement of ZTA for cyber risk reduction?

A

Continuous monitoring

Continuous monitoring helps maintain a strong security posture by investigating potential signs of compromise.

80
Q

How does ZTA mitigate the risk of unauthorized access by compromised accounts?

A

By using policy-based controls conditioned on user and device security posture

This approach enhances the security framework of the organization.

81
Q

What does the ZT model use to reduce the total risk of running a connected enterprise?

A

A unified framework provided by a limited number of vendors

This allows enterprises to address major threats with fewer solutions, reducing security flaws.

82
Q

True or False: ZTA does not require mutual authentication between the server and client.

A

False

Mutual authentication is essential for establishing secure connections.

83
Q

What is the primary objective of Zero Trust (ZT)?

A

To help organizations achieve and maintain an optimal compliance posture

This reduces both the financial and technical impact of compliance.

84
Q

What are the two key features of ZT that help in compliance management?

A
  • Discovery
  • Mapping out of all networked assets and related access controls
85
Q

Why is automatic discovery and validation of assets important in ZT?

A

Assets and data can only be protected if their presence is known.

86
Q

How does ZT help in segregating resources?

A

Based on relevant legal, regulatory, and contractual compliance requirements.

87
Q

What does proper implementation of ZT verify?

A

Authentication and authorization each time traffic moves laterally or inside/outside the network.

88
Q

What is a benefit of verifying authentication and authorization in ZT?

A

Prevents unauthorized access before data can be accessed, compromised, encrypted for ransom, or exfiltrated.

89
Q

What does ZT create to satisfy regulatory requirements?

A

An audit trail for record keeping and auditing.

90
Q

What are privacy-related regulations that define stringent requirements for processing PII?

A
  • General Data Protection Regulation (GDPR)
  • California Consumer Privacy Act (CCPA)
91
Q

What must organizations build to maintain control and visibility over PII?

A

An accountability framework that includes components like collection, processing, storage, and purpose.

92
Q

How does ZT enable organizations regarding regulatory compliance?

A

It helps better align with standard security practices integrated into existing regulatory requirements’ internal controls.

93
Q

Fill in the blank: ZT helps organizations achieve and maintain an optimal _______.

A

compliance posture

94
Q

What is the ZT model’s approach to security?

A

Never trust, always verify

This approach emphasizes continuous verification of resources and entities within the IT environment.

95
Q

What mindset change does the ZT model promote in organizations?

A

A coordinated, structured approach to cybersecurity

This change requires organizations to adopt new processes and procedures.

96
Q

What culture must organizations shift to according to the ZT model?

A

A culture based on processes and procedures that support continuous verification

This shift is necessary to trust entities within the IT environment.

97
Q

Fill in the blank: The ZT model requires enterprises to adopt a _______ approach to cybersecurity.

A

coordinated, structured

98
Q

True or False: The ZT model allows for trusting entities in the IT environment without verification.

A

False

The model emphasizes verification before trust.

99
Q

What is the key requirement for trusting entities in a company’s IT environment according to the ZT model?

A

Continuous verification