Zero Trust Flashcards

1
Q

What is trust?

A

a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What shouldn’t be trusted and always verified? (4)

A
  1. packets
  2. identities
  3. devices
  4. services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does eliminating trust help to achieve? (3)

A
  1. prevent successful data breaches
  2. simplify operations through automation and a reduced rulebase
  3. simplify regulatory compliance and audits because Zero Trust environments are designed for compliance and easy auditing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does DAAS stand for?

A
  • Data
  • Applications
  • Assets
  • Services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What question needs to be asked when it comes to data?

A

What data needs to be protected?

proprietary code or processes, personally identifiable information (PII), payment card information (PCI), and personal health information (PHI) such as Health Insurance Portability and Accountability Act (HIPAA) information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What questions needs to be asked when it comes to applications? (2)

A
  1. Which applications consume sensitive information?
  2. Which applications are critical for business functions?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What question needs to be asked when it comes to assets?

A

Which assets are the most sensitive?

Supervisory Control and Data Acquisition (SCADA) controls, POS terminals, medical equipment, manufacturing equipment, and groups of critical servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What question needs to be asked when it comes to services?

A

Which services can attackers exploit to disrupt IT operations and negatively impact the business?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 5 steps of Zero Trust?

A
  1. Define your protect surface
  2. Map the protect surface transaction flows
  3. Architect a Zero Trust network
  4. Create the Zero Trust Policy
  5. Monitor and maintain the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the protect surface?

A

what is valuable to the business—DAAS elements that need to be protected to ensure normal business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is defining the protect surface important?

A

enables to focus on defending what really matters to the business instead of trying to identify and protect the entire attack surface or focusing on just the perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is the protect surface easier to protect than the perimeter?

A

it is much smaller than the perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does mapping the protect surface transaction flows entail?

A

mapping the transaction flows or interactions between critical DAAS elements and users to understand their interdependencies - who has business reasons to access each element, in what manner, and at what time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is mapping the protect surface transaction flows important?

A

helps to understand how to create a Security policy that allows only authorized users access to specific data and assets using the specified applications - helps to enforce the principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the ways to map the transaction flows? (9)

A
  1. leverage existing flow diagrams if available
  2. work with application, network, and enterprise architects, as well as business representatives, to understand the purpose of applications and the transaction flow they envision
  3. insert one or more FWs transparently into network in virtual wire mode to gain visibility into traffic
  4. use third-party tools from Palo Alto Networks integrated partners
  5. use log information from the Cortex Data Lake to gain visibility into, and map, transaction flows
  6. map the flow of application data across the network, the computing objects required for each application, and who uses each application
  7. find out who uses the data, where you collect, store, use, and transfer the data, and how the data is stored, encrypted, archived, or destroyed after use
  8. for each asset, find out its location, who uses it, when they use it, and where the asset fits into workflows
  9. map the service workflows across the environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When should you begin to architect a zero trust network?

A

after understanding of your protect surface and transaction flows

17
Q

What is the cornerstone of the zero trust architecture?

A

segmentation gateways—physical or virtual Palo Alto Networks next-generation firewalls that connect network segments and enforce Layer 7 policy

18
Q

What are the rules for using segmentation gateways effectively? (3)

A
  1. run all traffic through a segmentation gateway
  2. place segmentation gateways as close as possible to the resources they protect,
  3. use them in conjunction with other Palo Alto Networks capabilities to automate as much as possible
19
Q

What should be kept in mind when designing a zero trust network?

A

ease of operation and maintenance, as well as flexibility to accommodate protect surface and business changes

20
Q

What should be done to set a best-practice configuration baseline and measure progress towards Zero Trust goals?

A

run tool to set a best-practice configuration baseline and measure progress toward your Zero Trust goals

21
Q

What are the roles of a NGFW in a zero trust network?

A
  1. create a microperimeter in Layer 7 policy around each protect surface
  2. aggregate security capabilities into a single control point for all traffic entering and exiting the protect surface
22
Q

Why is creating a microperimeter in Layer 7 policy around each protect surface useful?

A

prevents lateral movement because the microperimeter provides granular policy controls for who (User-ID) accesses what applications (App-ID) and resources in what manner (Content-ID) and at what time through the segmentation gateway

23
Q

On which method is the zero trust policy based on?

A

Kipling Method

24
Q

What are the Rudyard Kipling’s six-tuple questions?

A
  1. who
  2. what
  3. when
  4. where
  5. why
  6. how