Zero Trust Flashcards
Demands verification for every device, user, and transaction within the network, regardless of its origin
Zero Trust
2 planes used for zero trust architecture
Control plane and data plane
Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
Control Plane
Adaptive Identity, Threat Scope Reduction, Policy-Driven Access Control, Secured Zones,
Key elements that encompasses the control plane
Relies on real-time validation that takes into account the
user’s behavior, device, location, and more
Adaptive Identity
Limits the users’ access to only what they need for their
work tasks because this reduces the network’s potential
attack surface
Focused on minimizing the “blast radius” that could occur
in the event of a breach
Threat Scope Reduction
Entails developing, managing, and enforcing user access
policies based on their roles and responsibilities
Policy-Driven Access Control
Isolated environments within a network that are designed
to house sensitive data
Secured Zones
Uses a Policy Engine and a Policy Administrator to make
decisions about access
Control Plane
Cross-references the access request with its predefined
policies
Policy Engine
Used to establish and manage the access policies
Policy Administrator
This consist of Subject/System, Policy Enforcement Point,
Data Plane