Introduction to ZTA - ZT use cases Flashcards
What is the primary purpose of Zero Trust (ZT) use cases?
To address secure access and risk mitigation in various industries
ZT use cases vary architecturally and in their risk mitigation efficacy and limitations.
What does the use case description for Remote Access & VPN Replacement entail?
Secure remote access to corporate networks has evolved from traditional VPNs to accommodate cloud services
Users now require access to services residing in clouds and associated environments.
What are the security risks associated with traditional VPN solutions?
Users gain extensive access post-authentication, risking violation of least privilege and potential malware infections
Device authentication is critical to prevent malicious software from impacting organizational assets.
What is a significant limitation of traditional VPNs in the context of cloud migration?
Substantial performance degradation when accessing cloud-based IT resources
Traditional VPNs terminate at the organization’s perimeter, limiting access to cloud services.
What technologies are being used to improve remote access to cloud services?
Cloud proxies and SASE (Secure Access Service Edge)
These technologies create encrypted tunnels to external enclaves for better access.
Fill in the blank: ZTA enhances the security posture of remote access by including ______ capabilities.
SDP (Software-Defined Perimeter) capabilities
Specifically, it includes SPA (Secure Access Protocol) in communications.
What does the principle of least privilege entail in the context of VPN access?
Users should only have access to the minimum resources necessary for their tasks
This principle helps mitigate security risks by limiting access.
True or False: Once authenticated via a VPN gateway, users have unrestricted access to all enterprise assets.
True
This unrestricted access can lead to security vulnerabilities if not managed properly.
What is the role of device authentication in remote access scenarios?
To validate that devices are free from malware before granting network access
This step is crucial to protect organizational assets.
What does ZTA stand for?
Zero Trust Architecture
How does ZTA mitigate VPN’s security gaps?
Through more granular, contextual security controls
What is a significant drawback of traditional VPN implementations?
High latency and a single point of failure/compromise
What is the role of the ZT gateway in ZTA?
Each service is separately protected by a ZT gateway
What must a client do before connecting to an application in ZTA?
Authenticate and authorize
What protocol is used for secure connections in ZTA?
mTLS (mutual Transport Layer Security)
What is split tunneling in the context of VPN?
A feature that divides internet traffic, sending some through an encrypted tunnel and the rest through an open network
What limitations are associated with a ZT environment?
Dependent on proven standards like mTLS, SAML, and X.509 certificates
What enhances the flexibility of a ZT environment?
It can be combined with supplemental security systems such as data encryption and remote attestation
True or False: ZTA applies the same policies and security controls to all users regardless of their location.
False
Fill in the blank: With VPN, users often experience delays, disconnections, and _______.
connectivity problems
What is the impact of VPN on user connectivity to the internet?
It is negatively impacted, even with split tunneling
What does ZTA provide a path for?
Evolution of security measures
What is micro-segmentation?
Micro-segmentation enforces the separation of connections between devices on a network
How does micro-segmentation prevent traffic from being visible to internal users?
By requiring granular, policy-based access for device-to-device connections
What is the purpose of creating dynamic, trusted network zones around applications?
To hide applications from unauthorized users and devices
What must every device do to communicate with servers in a micro-segmented network?
Initiate its own encrypted tunnel
How does micro-segmentation limit the impact of a cyber attack?
By ensuring device access is limited to validated, authorized entities
In what environments can micro-segmentation architectures be deployed?
Both cloud environments and on-premise data centers
Fill in the blank: Time-based segmentation policies and controls typically become more _______ over time.
[granular]
What are some common architectural patterns of micro-segmentation?
- Traditional network segmentation
- Data center (east-west) segmentation
- Application micro-segmentation
- Workload micro-segmentation
What happens once cyber attackers gain a foothold into the network?
They typically move laterally to compromise other machines
True or False: Network visibility is usually restricted to privileged users in VPN and corporate IT environments.
False
What is the security posture enhancement in ZT implementations?
Devices are completely hidden from unknown users
What type of request must trusted devices initiate to connect in a ZT environment?
SPA-based request
What is a key feature of connections in a micro-segmented network?
Each connection is a separate network impenetrable by other hosts
What is a key limitation in user/device interactions?
Stringent control is maintained over users and devices and their respective access to each application or resource.
Why is careful integration required in device architecture?
To reduce user/device validation-related latency.
What aspect of data flow between devices is not verified?
The data flowing between devices are not verified/validated.
What is verified/validated before a connection is granted?
The connecting device’s security posture and identity.
Fill in the blank: The architecture and interactions between the devices require careful _______ to reduce user/device validation-related latency.
[integration]
True or False: The data between devices is always validated.
False
What is the impact of the rise of cloud and SaaS deployment models on organizations?
Access to scalable IT resources, fuels innovation, and boosts productivity
However, it also introduces new IT security challenges beyond traditional corporate firewalls.
What are some challenges introduced by each SaaS solution?
Vendor risk management, data protection, access controls, user experience, auditing, monitoring, privileged access management
These challenges must be addressed to ensure security and compliance.
What is the shared responsibility model in SaaS?
A model where visibility, governance, and control are reduced, leading to varied security risks
SaaS solutions need to be understood, monitored, and reported for risk acceptance.
Why is risk acceptance critical in SaaS implementation?
Data protection compliance measures apply to SaaS providers
Additional controls may be required for risk mitigation.
What is ‘shadow IT’?
The procurement and use of SaaS applications without the knowledge or permission of IT
This significantly increases the risk of data breaches and security incidents.
What should corporate IT specify in their service level agreements/contracts?
Requirements for controls with conformance reporting standards
This helps manage the risks associated with SaaS applications.
Why are network-centric security architectures considered inadequate now?
Due to the rise of the mobile workforce and proliferation of cloud applications
Once a security perimeter is breached, threat actors can exploit vulnerabilities across systems.
What methods can breach a security perimeter?
Phishing, malware, compromised passwords
These exploits allow threat actors to move freely across security layers.
What has gained widespread adoption in the last decade alongside SaaS offerings?
Microservices and third-party APIs
These allow integration with existing systems through publicly supported APIs.
What risk does the integration of SaaS offerings through APIs introduce?
Supply chain risk into the ecosystem
Organizations can subscribe to these services instead of building them from scratch.
What is the ZT SaaS management model used for?
Mitigating cyber risks inherent in SaaS services
ZT stands for Zero Trust
What does the ZT SaaS management model enforce?
Policy-based access control in SaaS applications
This applies regardless of user/device location
What does the ZT SaaS model monitor?
All SaaS usage patterns
This helps in identifying potential security risks
How do organizations often enhance SaaS security?
With single sign-on security (e.g., SAML) and IP-based access control with a CASB
CASB stands for Cloud Access Security Broker
What are the potential drawbacks of using single sign-on and IP-based access control?
Increased latency and degraded performance
This can negatively impact the user experience
What advantage does the ZT model provide over traditional methods?
Stronger security for SaaS applications without impacting the user’s experience
What does ZT SaaS control depend on?
A SaaS mechanism to control corporate account access
What is a key requirement for ZT SaaS control?
Support of client SSO access lists for a SaaS service
What does disabling direct access to SaaS services achieve?
Bypassing the SSO access mechanism
What are the limitations of ZT and SDP regarding data flow?
Limited ability to control the data flow inside a SaaS instance or between different SaaS applications
What is a hybrid cloud?
A hybrid cloud combines on-premises solutions or private cloud(s) with one or more public cloud services
What technologies enable connectivity in hybrid clouds?
Technologies like site-to-site VPN and private or dedicated circuits
What is a multi-cloud strategy?
A strategy that leverages several cloud service providers, which can include public, hybrid, or private clouds
What do hybrid and multi-cloud deployments expand?
The organization’s attack surface
What varies among different public cloud providers?
IAM models, security controls, and connectivity methods between VPCs or between VPCs and private clouds
What does ZT stand for?
Zero Trust
How does the broad level of network access in hybrid and multi-cloud deployments conflict with ZT?
It conflicts with ZT’s least privilege access model
What is a potential default access level used by cloud providers?
The most open access levels to maintain interoperability
What is the primary benefit of applying ZT across cloud deployments?
Mitigating the security risks inherent in publicly exposed cloud services
Fill in the blank: A device/users connection point on a particular network should not determine which _______ are accessible.
cloud services
What should happen before users connect to cloud resources?
Users should be identified, authenticated, and authorized
Access to services and resources is granted based on what?
What the organization knows about the user/device
What security controls are applied to both private and public clouds?
Tunneling and encryption
What does ZTA do regarding services and resources?
Hides all the services and resources, regardless of their location
True or False: Users have access to resources before completing authentication and authorization.
False
What does ZTA enforce between the user device and the PEP?
A mutually encrypted tunnel
ZTA stands for Zero Trust Architecture.
What access model does ZTA enforce?
Least privilege access model
This model is based on granular and resource/service-based access policies.
How does ZT improve the user experience?
By eliminating single choke points
This distributed architecture prevents delays and single point failures.
What is a challenge in implementing a truly cloud and vendor agnostic ZT?
Varying design patterns of competing cloud providers
Different cloud providers may have distinct implementation requirements.
How does the implementation of SSO differ among cloud providers?
It varies; for example, Azure AD differs from Azure cloud
Google Cloud Platform (GCP) also differs from an OpenStack-based private cloud.
What is a limitation regarding interconnections in multi-cloud deployments?
They are vendor-dependent
There isn’t one standard protocol or implementation for these interconnections.
True or False: Best practices can guarantee a standard protocol for ZT implementation.
False
There is no single standard protocol or implementation for ZT.
What does OT stand for in an industrial context?
Operational Technology
OT primarily exists in industrial environments where processes are regulated to achieve desired outcomes.
What are the primary systems associated with the OT environment?
Industrial control systems (ICS) and IIoT devices
IIoT stands for Industrial Internet of Things.
How was the traditional OT environment characterized?
Closed, physically air-gapped networks and systems.
What do newer OT solutions offer compared to traditional ones?
Advanced features related to connectivity and automation
Examples include smart OT devices.
What is the trend regarding reliance on OT-generated data?
Increasing rapidly.
What must organizations do when adopting new OT technologies?
Plan for accessible, secure, and resilient deployments.
What risk is associated with exposing smart OT devices to the internet?
Introduction of external cyber threats into enterprise networks.
What do ZT security best practices mandate regarding connected entities?
Every connected entity must have an identity and be part of the ZT Framework.
What are the components that must be considered in the ZT Framework?
- Users
- Devices
- Virtual infrastructure
- Cloud assets
What is the definition of cyber-physical systems (CPS) according to NIST SP 1500-201?
Integration of physical components, networked systems, embedded computers, and software for information sharing.
What future applications are CPS foundational for?
- Smart services
- Smart cities
- Smart health care management
What is a key characteristic of CPS?
Cross-disciplinary in nature.
CPS provides seamless integration of which two types of systems?
Cyber and physical systems.
What does IoT stand for?
Internet of Things
IoT refers to a network of devices connected to the internet.
What are IoT devices equipped with?
Software and/or sensors
These are essential for collecting and transmitting data.
How do IoT devices connect to the internet?
Via wifi or other wireless/wired technology
This connectivity enables communication between devices.
Give two examples of home IoT devices.
- Home automation solutions
- Smart doorbells
These devices enhance convenience and security in homes.
Give two examples of industrial IoT devices.
- Smart farming devices
- Assembly line robots
These devices improve operational efficiency in industries.
What does IIoT stand for?
Industrial Internet of Things
IIoT is a specific subset of IoT focused on industrial applications.
What are the main benefits of IIoT systems for industrial enterprises?
- Improvements in efficiency
- Increases in productivity
- Automation
- Continuous monitoring
- Analysis
These benefits are crucial for enhancing industrial operations.
What does ICS stand for?
Industrial Control Systems
Name three types of control systems included in ICS.
- Supervisory Control and Data Acquisition (SCADA) systems
- Distributed Control Systems (DCS)
- Programmable Logic Controllers (PLC)
What are COTS devices?
Commercial-off-the-shelf networked devices
What topology do ICS systems typically consist of?
Bus topology
What is a significant risk introduced by connecting ICS to internal IT networks?
Cyber-physical risk
Which principles make up the CIA Triad?
- Confidentiality
- Integrity
- Availability
In ICS, which two principles of the CIA Triad are prioritized over confidentiality?
- Availability
- Integrity
Name two types of malicious actors with interest in ICS vulnerabilities.
- Terrorists
- State-sponsored actors
What is one common type of attack on ICS?
Attacks that plant malicious software
Fill in the blank: Over 400 ICS vulnerabilities were disclosed in ______.
2019
What is a common method used to gain initial access to OT networks?
Spear phishing
True or False: Security hardening and patching on ICS systems is straightforward.
False
What does ZT stand for in the context of risk mitigation?
Zero Trust
What does SDP stand for?
Software Defined Perimeter
What is the primary benefit of implementing ZT in IIoT devices?
Enforce stronger device integrity and data confidentiality
Name two types of authentication enforced by SDP for IIoT devices.
- IIoT device authentication
- Adaptive risk-based user authentication (e.g., MFA)
What is a key challenge when applying ZT to OT environments?
Device resource constraints
Fill in the blank: ICS systems rely on OT protocols such as ______ for control plane functionality.
ModBus or Profinet
What is one limitation of ZT related to IIoT devices?
Harder to patch and/or upgrade
What approach may be necessary for ZTA design due to device limitations?
Agentless micro-segmentation or external proxy-based approach
What type of inspection can be implemented to detect and block known attack types?
Deep packet inspection
What does 5G stand for?
Fifth generation wireless technology
What are some key applications of 5G technology?
Applications include smart cities, autonomous vehicles, remote healthcare, and more.
What are the three main types of communication that 5G provides?
- Enhanced mobile broadband (eMBB)
- Massive machine-type communications (mMTC)
- Ultra-reliable low-latency communications (uRLLC)
How does 5G improve connectivity in highly populated areas?
By using tiny cells as signal repeaters, enhancing speed, network capacity, and reliability.
What is the role of the core network in 5G?
It routes data and connects different portions of the access network.
What is mobile edge computing (MEC) in the context of 5G?
MEC places compute and storage resources closer to the customer to improve application performance.
What security risks are introduced by 5G’s open architecture?
It creates an expansive attack surface from user equipment to core nodes.
What technology does 5G leverage that can be vulnerable to attacks if not secured?
Software-defined networking (SDN) technologies.
Why is physical security crucial in 5G networks?
Because devices and infrastructure are closer to the end user, increasing the risk of physical tampering.
What type of malware is particularly concerning in 5G networks?
Lateral moving malware.
What role does ZT device protection play in 5G networks?
It verifies the authenticity of software downloads and updates in the system.
What kind of attacks are 5G networks vulnerable to due to their architecture?
Man-in-the-middle (MITM) attacks.
What does ZT data protection ensure in the context of IoT and 5G?
Only authenticated and authorized systems can access protected data.
What is a limitation in integrating ZT with 5G infrastructure?
Access to network drivers in 5G infrastructure equipment may be difficult to obtain.
What challenge does ZT face regarding identity and authorization in 5G?
It may be difficult to implement in devices with generic software process names.
What future development is needed for ZT to support 5G edge configurations?
An agentless approach to facilitate the myriad of edge configurations.