Zero Trust Flashcards

1
Q

What is Zero Trust

A

Zero Trust demands verification for every device, user, and transaction within the
network, regardless of its origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do we implement a zero trust architecture

A

Control Plane
● Refers to the overarching framework and set of components responsible
for defining, managing, and enforcing the policies related to user and
system access within an organization

■ Data Plane
● Ensures the policies are properly executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the elements of Control Plane in a zero trust architecture

A

○ Adaptive Identity
■ Relies on real-time validation that takes into account the
user’s behavior, device, location, and more

○ Threat Scope Reduction
■ Limits the users’ access to only what they need for their
work tasks because this reduces the network’s potential
attack surface
■ Focused on minimizing the “blast radius” that could occur
in the event of a breach

○ Policy-Driven Access Control
■ Entails developing, managing, and enforcing user access
policies based on their roles and responsibilities

○ Secured Zones
■ Isolated environments within a network that are designed
to house sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the elements of Data Plane in a zero trust architecture

A

○ Subject/System
■ Refers to the individual or entity attempting to gain access

○ Policy Engine
■ Cross-references the access request with its predefined
policies

○ Policy Administrator
■ Used to establish and manage the access policies

○ Policy Enforcement Point
■ Where the decision to grant or deny access is actually
execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly