Zero Trust 1.2 Flashcards
[…] is the approach to security where someone must authenticate each time they want to gain access to a particular resource
Zero Trust
Zero trust is implemented by using a combination of […]
- Multifactor Authentication
- Encryption
- Firewalls
- Monitoring / Analytics
[…] separates the network into different functional planes and applies to physical, virtual, and cloud components
Planes of Operation
The […] Plane is the part of the device that performs the actual security process. Anything that moves data from one part of the network to another.
Data Plane
The […] Plane manages the actions of the Data Plane
- Defines policies / rules
- Determines how packets should be forwarded
Ex: Routing Tables, Firewall Rules
Control Plane
[…] determines what level of authentication is needed for an individual based on the risk of a breach and makes it stronger if needed. Risk indicators include:
- Relationship to Org
- Physical Location
- IP Address
Adaptive Authentication
[…] limits how many places can be used to gain access to the network
Threat Scope Reduction
[…] combines the Adaptive Identity with a predefined set of rules. Determines what type of authentication process will be used to determine if the person trying to gain access is really who they say they are
Policy Driven Access Control
[…] look at where you are connecting from and where you are trying to connect to and allows you to define rules to determine access
- Untrusted zone to a trusted zone (DENY)
- Trusted zone to Internal zone (ALLOW)
Security Zones
All traffic must pass through the […] so that you can determine if traffic should be allowed or denied
Policy Enforcement Point
The Policy Enforcement Point does not provide the decision on whether traffic should be allowed or disallowed, but gathers all of the information about the traffic and gives it to the […], which is responsible for the decision
Policy Decision Point
The […], which is part of the Policy Decision Point, evaluates each request coming in and decides based on policy if it grants, denies, or revokes access.
Policy Engine
The […] communicates with the Policy Enforcement Point the decision of the Policy Engine and tells it to either allow or disallow access. Also generates access tokens or credentials to give to the Policy Enforcement Point.
Policy Administrator
The subject is part of the […] Plane
Data Plane
The System is part of the […] Plane
Data Plane