Zero Trust Flashcards
Security+
What is the core principle of Zero Trust?
Nothing is inherently trusted; everything must be verified.
What is a common security issue in traditional networks?
Once inside the firewall, there are few security controls.
What approach does Zero Trust take towards network security?
It is a holistic approach that covers every device, process, and person.
Name a method used to verify identities in a Zero Trust model.
Multi-factor authentication.
What does the data plane do?
Processes frames, packets, and network data, including forwarding and encrypting.
What is the role of the control plane?
Manages actions of the data plane and defines policies and rules.
What elements are included in a control plane?
Routing tables, session tables, and NAT tables.
What does adaptive identity consider in Zero Trust?
The source and requested resources, along with multiple risk indicators.
What is a Policy Enforcement Point (PEP)?
The gatekeeper that allows, monitors, and terminates connections.
Who can be subjects in a Zero Trust framework?
End users, applications, and non-human entities.
How does Zero Trust enhance network security?
By implementing additional layers such as encryption and monitoring.
What is the significance of monitoring in Zero Trust?
It helps detect unauthorized access and potential security breaches.
What is a Policy Decision Point (PDP)?
A process for making an authentication decision.
What is the role of a Policy Engine?
Evaluates access decisions based on policy and other information sources, granting, denying, or revoking access.
What does a Policy Administrator do?
Communicates with the Policy Enforcement Point, generates access tokens or credentials, and instructs the PEP to allow or disallow access.