Zero Trust Flashcards

1
Q

Zero trust

A

Security framework requiring all assets workflows to be authenticated authorized and continuously validated before being granted or keeping access to application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data plane

A

Data plane is used for communication (moving data) between software components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy administrator

A

Policy administrator generates session specific authentication and authorization token or credentials used to access an enterprise resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy decision point (PDP)

A

Policy decision point is a gatekeeper in policy engine and policy administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Control plan

A

Is used by infrastructure components to maintain and configure assets, assets control, communication security. In zero trust requests for access are made through control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Policy Enforcement Point (PEP)

A

Policy enforcement point is responsible for enabling, maintaining and eventually terminating connections between a subject and enterprise resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Policy Engine

A

Policy engineer is responsible for ultimate decision to grant access to resource for a given subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero trust architecture

A

Zero trust Authorization
Control plane = Policy Engine- policies
Policy administrator - decision point
Data plane
Subject => system —> untrusted request—>=> policy enforcement point—>trusted=>enterprise resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero trust planes of operation

A

1.split network into functional planes
2. Data plane => performing actual security process, process the frames, packets, network data
3.control plane => management and control plane, managing all actions, configured policies, rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data plane versus control plane

A

On physicals switch - we want to break out different planes of operations. Down of the switch we have interfaces to move data from one part network to another and this is our data plane.so all inputting switches are data plane.
Configuration of switch to help data to be trunk and this is control plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Adaptive identity

A

This is where we examining the identity of individual, and applying security controls based on based on what the user is telling on but also based on other informations. Examinations of source of connection, where employee is sitting in the organization etc. Based on that info we can do authentication stronger. Elimination of inputs (people on building and people connected via VPN). Policy driven access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security zones

A

Looking at where we are connecting from, and where we are going on. Setting zones : untrusted and trusted.
Untrusted zone - access denied, put zones as automatic trust where employee is is into internal traffic zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Policy enforcement point

A

Evaluation point, this is gatekeeper. All traffic must go via PEP. Provides identification of the users and traffic, gathers all info. Do not give access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

policy decision point

A

This is decision maker, decides to grant or not the access. Evaluated each decision based on policy and other informations. Police engine is evaluating access decision based on policy. Policy administrator communicates with policy engine , generates access token and peels policy enorced point to allow or disallow the access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly