Introduction to ZTA - ZT use cases Flashcards

1
Q

What is the primary purpose of Zero Trust (ZT) use cases?

A

To address secure access and risk mitigation in various industries

ZT use cases vary architecturally and in their risk mitigation efficacy and limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the use case description for Remote Access & VPN Replacement entail?

A

Secure remote access to corporate networks has evolved from traditional VPNs to accommodate cloud services

Users now require access to services residing in clouds and associated environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the security risks associated with traditional VPN solutions?

A

Users gain extensive access post-authentication, risking violation of least privilege and potential malware infections

Device authentication is critical to prevent malicious software from impacting organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a significant limitation of traditional VPNs in the context of cloud migration?

A

Substantial performance degradation when accessing cloud-based IT resources

Traditional VPNs terminate at the organization’s perimeter, limiting access to cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technologies are being used to improve remote access to cloud services?

A

Cloud proxies and SASE (Secure Access Service Edge)

These technologies create encrypted tunnels to external enclaves for better access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: ZTA enhances the security posture of remote access by including ______ capabilities.

A

SDP (Software-Defined Perimeter) capabilities

Specifically, it includes SPA (Secure Access Protocol) in communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the principle of least privilege entail in the context of VPN access?

A

Users should only have access to the minimum resources necessary for their tasks

This principle helps mitigate security risks by limiting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Once authenticated via a VPN gateway, users have unrestricted access to all enterprise assets.

A

True

This unrestricted access can lead to security vulnerabilities if not managed properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of device authentication in remote access scenarios?

A

To validate that devices are free from malware before granting network access

This step is crucial to protect organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does ZTA stand for?

A

Zero Trust Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does ZTA mitigate VPN’s security gaps?

A

Through more granular, contextual security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a significant drawback of traditional VPN implementations?

A

High latency and a single point of failure/compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of the ZT gateway in ZTA?

A

Each service is separately protected by a ZT gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What must a client do before connecting to an application in ZTA?

A

Authenticate and authorize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protocol is used for secure connections in ZTA?

A

mTLS (mutual Transport Layer Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is split tunneling in the context of VPN?

A

A feature that divides internet traffic, sending some through an encrypted tunnel and the rest through an open network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What limitations are associated with a ZT environment?

A

Dependent on proven standards like mTLS, SAML, and X.509 certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What enhances the flexibility of a ZT environment?

A

It can be combined with supplemental security systems such as data encryption and remote attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: ZTA applies the same policies and security controls to all users regardless of their location.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fill in the blank: With VPN, users often experience delays, disconnections, and _______.

A

connectivity problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the impact of VPN on user connectivity to the internet?

A

It is negatively impacted, even with split tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does ZTA provide a path for?

A

Evolution of security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is micro-segmentation?

A

Micro-segmentation enforces the separation of connections between devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does micro-segmentation prevent traffic from being visible to internal users?

A

By requiring granular, policy-based access for device-to-device connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the purpose of creating dynamic, trusted network zones around applications?

A

To hide applications from unauthorized users and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What must every device do to communicate with servers in a micro-segmented network?

A

Initiate its own encrypted tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does micro-segmentation limit the impact of a cyber attack?

A

By ensuring device access is limited to validated, authorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In what environments can micro-segmentation architectures be deployed?

A

Both cloud environments and on-premise data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Fill in the blank: Time-based segmentation policies and controls typically become more _______ over time.

A

[granular]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are some common architectural patterns of micro-segmentation?

A
  • Traditional network segmentation
  • Data center (east-west) segmentation
  • Application micro-segmentation
  • Workload micro-segmentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What happens once cyber attackers gain a foothold into the network?

A

They typically move laterally to compromise other machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

True or False: Network visibility is usually restricted to privileged users in VPN and corporate IT environments.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the security posture enhancement in ZT implementations?

A

Devices are completely hidden from unknown users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What type of request must trusted devices initiate to connect in a ZT environment?

A

SPA-based request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a key feature of connections in a micro-segmented network?

A

Each connection is a separate network impenetrable by other hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a key limitation in user/device interactions?

A

Stringent control is maintained over users and devices and their respective access to each application or resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Why is careful integration required in device architecture?

A

To reduce user/device validation-related latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What aspect of data flow between devices is not verified?

A

The data flowing between devices are not verified/validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is verified/validated before a connection is granted?

A

The connecting device’s security posture and identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Fill in the blank: The architecture and interactions between the devices require careful _______ to reduce user/device validation-related latency.

A

[integration]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

True or False: The data between devices is always validated.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the impact of the rise of cloud and SaaS deployment models on organizations?

A

Access to scalable IT resources, fuels innovation, and boosts productivity

However, it also introduces new IT security challenges beyond traditional corporate firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are some challenges introduced by each SaaS solution?

A

Vendor risk management, data protection, access controls, user experience, auditing, monitoring, privileged access management

These challenges must be addressed to ensure security and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the shared responsibility model in SaaS?

A

A model where visibility, governance, and control are reduced, leading to varied security risks

SaaS solutions need to be understood, monitored, and reported for risk acceptance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Why is risk acceptance critical in SaaS implementation?

A

Data protection compliance measures apply to SaaS providers

Additional controls may be required for risk mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is ‘shadow IT’?

A

The procurement and use of SaaS applications without the knowledge or permission of IT

This significantly increases the risk of data breaches and security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What should corporate IT specify in their service level agreements/contracts?

A

Requirements for controls with conformance reporting standards

This helps manage the risks associated with SaaS applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Why are network-centric security architectures considered inadequate now?

A

Due to the rise of the mobile workforce and proliferation of cloud applications

Once a security perimeter is breached, threat actors can exploit vulnerabilities across systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What methods can breach a security perimeter?

A

Phishing, malware, compromised passwords

These exploits allow threat actors to move freely across security layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What has gained widespread adoption in the last decade alongside SaaS offerings?

A

Microservices and third-party APIs

These allow integration with existing systems through publicly supported APIs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What risk does the integration of SaaS offerings through APIs introduce?

A

Supply chain risk into the ecosystem

Organizations can subscribe to these services instead of building them from scratch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the ZT SaaS management model used for?

A

Mitigating cyber risks inherent in SaaS services

ZT stands for Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does the ZT SaaS management model enforce?

A

Policy-based access control in SaaS applications

This applies regardless of user/device location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What does the ZT SaaS model monitor?

A

All SaaS usage patterns

This helps in identifying potential security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How do organizations often enhance SaaS security?

A

With single sign-on security (e.g., SAML) and IP-based access control with a CASB

CASB stands for Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are the potential drawbacks of using single sign-on and IP-based access control?

A

Increased latency and degraded performance

This can negatively impact the user experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What advantage does the ZT model provide over traditional methods?

A

Stronger security for SaaS applications without impacting the user’s experience

58
Q

What does ZT SaaS control depend on?

A

A SaaS mechanism to control corporate account access

59
Q

What is a key requirement for ZT SaaS control?

A

Support of client SSO access lists for a SaaS service

60
Q

What does disabling direct access to SaaS services achieve?

A

Bypassing the SSO access mechanism

61
Q

What are the limitations of ZT and SDP regarding data flow?

A

Limited ability to control the data flow inside a SaaS instance or between different SaaS applications

62
Q

What is a hybrid cloud?

A

A hybrid cloud combines on-premises solutions or private cloud(s) with one or more public cloud services

63
Q

What technologies enable connectivity in hybrid clouds?

A

Technologies like site-to-site VPN and private or dedicated circuits

64
Q

What is a multi-cloud strategy?

A

A strategy that leverages several cloud service providers, which can include public, hybrid, or private clouds

65
Q

What do hybrid and multi-cloud deployments expand?

A

The organization’s attack surface

66
Q

What varies among different public cloud providers?

A

IAM models, security controls, and connectivity methods between VPCs or between VPCs and private clouds

67
Q

What does ZT stand for?

A

Zero Trust

68
Q

How does the broad level of network access in hybrid and multi-cloud deployments conflict with ZT?

A

It conflicts with ZT’s least privilege access model

69
Q

What is a potential default access level used by cloud providers?

A

The most open access levels to maintain interoperability

70
Q

What is the primary benefit of applying ZT across cloud deployments?

A

Mitigating the security risks inherent in publicly exposed cloud services

71
Q

Fill in the blank: A device/users connection point on a particular network should not determine which _______ are accessible.

A

cloud services

72
Q

What should happen before users connect to cloud resources?

A

Users should be identified, authenticated, and authorized

73
Q

Access to services and resources is granted based on what?

A

What the organization knows about the user/device

74
Q

What security controls are applied to both private and public clouds?

A

Tunneling and encryption

75
Q

What does ZTA do regarding services and resources?

A

Hides all the services and resources, regardless of their location

76
Q

True or False: Users have access to resources before completing authentication and authorization.

77
Q

What does ZTA enforce between the user device and the PEP?

A

A mutually encrypted tunnel

ZTA stands for Zero Trust Architecture.

78
Q

What access model does ZTA enforce?

A

Least privilege access model

This model is based on granular and resource/service-based access policies.

79
Q

How does ZT improve the user experience?

A

By eliminating single choke points

This distributed architecture prevents delays and single point failures.

80
Q

What is a challenge in implementing a truly cloud and vendor agnostic ZT?

A

Varying design patterns of competing cloud providers

Different cloud providers may have distinct implementation requirements.

81
Q

How does the implementation of SSO differ among cloud providers?

A

It varies; for example, Azure AD differs from Azure cloud

Google Cloud Platform (GCP) also differs from an OpenStack-based private cloud.

82
Q

What is a limitation regarding interconnections in multi-cloud deployments?

A

They are vendor-dependent

There isn’t one standard protocol or implementation for these interconnections.

83
Q

True or False: Best practices can guarantee a standard protocol for ZT implementation.

A

False

There is no single standard protocol or implementation for ZT.

84
Q

What does OT stand for in an industrial context?

A

Operational Technology

OT primarily exists in industrial environments where processes are regulated to achieve desired outcomes.

85
Q

What are the primary systems associated with the OT environment?

A

Industrial control systems (ICS) and IIoT devices

IIoT stands for Industrial Internet of Things.

86
Q

How was the traditional OT environment characterized?

A

Closed, physically air-gapped networks and systems.

87
Q

What do newer OT solutions offer compared to traditional ones?

A

Advanced features related to connectivity and automation

Examples include smart OT devices.

88
Q

What is the trend regarding reliance on OT-generated data?

A

Increasing rapidly.

89
Q

What must organizations do when adopting new OT technologies?

A

Plan for accessible, secure, and resilient deployments.

90
Q

What risk is associated with exposing smart OT devices to the internet?

A

Introduction of external cyber threats into enterprise networks.

91
Q

What do ZT security best practices mandate regarding connected entities?

A

Every connected entity must have an identity and be part of the ZT Framework.

92
Q

What are the components that must be considered in the ZT Framework?

A
  • Users
  • Devices
  • Virtual infrastructure
  • Cloud assets
93
Q

What is the definition of cyber-physical systems (CPS) according to NIST SP 1500-201?

A

Integration of physical components, networked systems, embedded computers, and software for information sharing.

94
Q

What future applications are CPS foundational for?

A
  • Smart services
  • Smart cities
  • Smart health care management
95
Q

What is a key characteristic of CPS?

A

Cross-disciplinary in nature.

96
Q

CPS provides seamless integration of which two types of systems?

A

Cyber and physical systems.

97
Q

What does IoT stand for?

A

Internet of Things

IoT refers to a network of devices connected to the internet.

98
Q

What are IoT devices equipped with?

A

Software and/or sensors

These are essential for collecting and transmitting data.

99
Q

How do IoT devices connect to the internet?

A

Via wifi or other wireless/wired technology

This connectivity enables communication between devices.

100
Q

Give two examples of home IoT devices.

A
  • Home automation solutions
  • Smart doorbells

These devices enhance convenience and security in homes.

101
Q

Give two examples of industrial IoT devices.

A
  • Smart farming devices
  • Assembly line robots

These devices improve operational efficiency in industries.

102
Q

What does IIoT stand for?

A

Industrial Internet of Things

IIoT is a specific subset of IoT focused on industrial applications.

103
Q

What are the main benefits of IIoT systems for industrial enterprises?

A
  • Improvements in efficiency
  • Increases in productivity
  • Automation
  • Continuous monitoring
  • Analysis

These benefits are crucial for enhancing industrial operations.

104
Q

What does ICS stand for?

A

Industrial Control Systems

105
Q

Name three types of control systems included in ICS.

A
  • Supervisory Control and Data Acquisition (SCADA) systems
  • Distributed Control Systems (DCS)
  • Programmable Logic Controllers (PLC)
106
Q

What are COTS devices?

A

Commercial-off-the-shelf networked devices

107
Q

What topology do ICS systems typically consist of?

A

Bus topology

108
Q

What is a significant risk introduced by connecting ICS to internal IT networks?

A

Cyber-physical risk

109
Q

Which principles make up the CIA Triad?

A
  • Confidentiality
  • Integrity
  • Availability
110
Q

In ICS, which two principles of the CIA Triad are prioritized over confidentiality?

A
  • Availability
  • Integrity
111
Q

Name two types of malicious actors with interest in ICS vulnerabilities.

A
  • Terrorists
  • State-sponsored actors
112
Q

What is one common type of attack on ICS?

A

Attacks that plant malicious software

113
Q

Fill in the blank: Over 400 ICS vulnerabilities were disclosed in ______.

114
Q

What is a common method used to gain initial access to OT networks?

A

Spear phishing

115
Q

True or False: Security hardening and patching on ICS systems is straightforward.

116
Q

What does ZT stand for in the context of risk mitigation?

A

Zero Trust

117
Q

What does SDP stand for?

A

Software Defined Perimeter

118
Q

What is the primary benefit of implementing ZT in IIoT devices?

A

Enforce stronger device integrity and data confidentiality

119
Q

Name two types of authentication enforced by SDP for IIoT devices.

A
  • IIoT device authentication
  • Adaptive risk-based user authentication (e.g., MFA)
120
Q

What is a key challenge when applying ZT to OT environments?

A

Device resource constraints

121
Q

Fill in the blank: ICS systems rely on OT protocols such as ______ for control plane functionality.

A

ModBus or Profinet

122
Q

What is one limitation of ZT related to IIoT devices?

A

Harder to patch and/or upgrade

123
Q

What approach may be necessary for ZTA design due to device limitations?

A

Agentless micro-segmentation or external proxy-based approach

124
Q

What type of inspection can be implemented to detect and block known attack types?

A

Deep packet inspection

125
Q

What does 5G stand for?

A

Fifth generation wireless technology

126
Q

What are some key applications of 5G technology?

A

Applications include smart cities, autonomous vehicles, remote healthcare, and more.

127
Q

What are the three main types of communication that 5G provides?

A
  • Enhanced mobile broadband (eMBB)
  • Massive machine-type communications (mMTC)
  • Ultra-reliable low-latency communications (uRLLC)
128
Q

How does 5G improve connectivity in highly populated areas?

A

By using tiny cells as signal repeaters, enhancing speed, network capacity, and reliability.

129
Q

What is the role of the core network in 5G?

A

It routes data and connects different portions of the access network.

130
Q

What is mobile edge computing (MEC) in the context of 5G?

A

MEC places compute and storage resources closer to the customer to improve application performance.

131
Q

What security risks are introduced by 5G’s open architecture?

A

It creates an expansive attack surface from user equipment to core nodes.

132
Q

What technology does 5G leverage that can be vulnerable to attacks if not secured?

A

Software-defined networking (SDN) technologies.

133
Q

Why is physical security crucial in 5G networks?

A

Because devices and infrastructure are closer to the end user, increasing the risk of physical tampering.

134
Q

What type of malware is particularly concerning in 5G networks?

A

Lateral moving malware.

135
Q

What role does ZT device protection play in 5G networks?

A

It verifies the authenticity of software downloads and updates in the system.

136
Q

What kind of attacks are 5G networks vulnerable to due to their architecture?

A

Man-in-the-middle (MITM) attacks.

137
Q

What does ZT data protection ensure in the context of IoT and 5G?

A

Only authenticated and authorized systems can access protected data.

138
Q

What is a limitation in integrating ZT with 5G infrastructure?

A

Access to network drivers in 5G infrastructure equipment may be difficult to obtain.

139
Q

What challenge does ZT face regarding identity and authorization in 5G?

A

It may be difficult to implement in devices with generic software process names.

140
Q

What future development is needed for ZT to support 5G edge configurations?

A

An agentless approach to facilitate the myriad of edge configurations.