Zero Trust Flashcards
SY0-701
Zero Trust
Trust nothing, verify everything. Verifying devices, users, transactions within the network
Control Plane
framework and components responsible for defining, managing, and enforcing policies
Adaptive Identiy
Rely on real time validation takes into account the users behavior, device, and location
Threat scope reduction
Limit the users access to only what they need for their task
Policy driven access control
developing, managing, enforcing users access policies based on rolse
Secured zones
Isolated environments in a network that are designed to house sensitive data
Policy engine
Cross reference access request with defined policies
Policy admin
Establishes and manages access policies
Subject/system
Refers to individual or entity attempting to gain access, ie employee, workstation, or software
Policy enforcement point
allow, restrict access and will act as a gatekeeper to sensitive systems or info