Zero Trust 1.2 Flashcards

1
Q

Describe ZERO TRUST

A
  • A holistic approach to network security in which the users must be provide authenticate every time they’re trying to access a resource.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Through a ZERO TRUST policy, what are some SECURITY CHECKS that can be implemented?

A
  • multi-factor authentication, encyrption, system permissions, additional firewalls, monitoring and analytics, and security policies and controls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of SEPARATE FUNCTIONAL PLANES OF OPERATIONS?

A
  • Breaking down a security device or system into smaller individual components.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the DATA PLANE.

A
  • The part that is performing the actual security processes.
  • Manages the processes of frames, packets, and network data.
  • Manages the process of moving data from one network to another.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the CONTROL PLANE.

A
  • Manages the actions of the data plane.
  • Defines policies and rules.
  • Determines how packets should be forwarded.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can security controls be evaluated using ADAPTIVE IDENTITY?

A
  • Examining the identity of individual and other information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some considerations when using ADAPTIVE IDENTITY?

A
  • Consider the source and the requested resources.
  • Multiple risk indicators - relationship to the organization, physical location, type of connection, IP addresses, etc.
  • Make the authentication stronger, if needed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is ZERO TRUST controlled using THREAD SCOPE REDUCTION?

A
  • limit how many places can be used to get into the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of POLICY DRIVEN ACCESS CONTROL?

A
  • Examines all data end points and determines the type of authentication process.
  • Combines the adaptive identity with a predefined set of rules.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can establishing SECURITY ZONES assist in authenticate users?

A
  • Security zones validate the location from where the user is accessing a system and where the data is being sent to.
  • Allows setting rules for a particular zone or location.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the purpose of a POLICY ENFORCEMENT POINT (PEP)

A
  • Sets the policy and procedures.
  • Is set up within the data flow pathway.
  • Acts as a gatekeeper to allow or disallow specific types of traffic.
  • Is comprised of multiple systems or devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of SUBJECTS AND SYSTEMS that are managed by the PEP?

A
  • End users, applications, non-human entities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the POLICY ENFORCEMENT POINT (PEP) determine which traffic is allowed or disallowed?

A
  • All traffic is managed through a POLICY DECISION POINT which gathers all the information and determines what traffic is allowed on the system.
  • Comprised of a POLICY ENGINE and a POLICY ADMINISTRATOR.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the POLICY ENGINE?

A
  • Gathers all requests and evaluates them against some predefined security policies.
  • Determines if the access is granted, denied, or revoked.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the POLICY ADMINISTRATOR?

A
  • Receives the decision from the POLICY ENGINE.
  • Generates a token or additional credentials, and will communicate to the PEP to allow or disallow access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly