Zero Trust Flashcards
What is Zero Trust
Zero Trust demands verification for every device, user, and transaction within the
network, regardless of its origin
How do we implement a zero trust architecture
Control Plane
● Refers to the overarching framework and set of components responsible
for defining, managing, and enforcing the policies related to user and
system access within an organization
■ Data Plane
● Ensures the policies are properly executed
What are the elements of Control Plane in a zero trust architecture
○ Adaptive Identity
■ Relies on real-time validation that takes into account the
user’s behavior, device, location, and more
○ Threat Scope Reduction
■ Limits the users’ access to only what they need for their
work tasks because this reduces the network’s potential
attack surface
■ Focused on minimizing the “blast radius” that could occur
in the event of a breach
○ Policy-Driven Access Control
■ Entails developing, managing, and enforcing user access
policies based on their roles and responsibilities
○ Secured Zones
■ Isolated environments within a network that are designed
to house sensitive data
What are the elements of Data Plane in a zero trust architecture
○ Subject/System
■ Refers to the individual or entity attempting to gain access
○ Policy Engine
■ Cross-references the access request with its predefined
policies
○ Policy Administrator
■ Used to establish and manage the access policies
○ Policy Enforcement Point
■ Where the decision to grant or deny access is actually
execute