Zero Trust Flashcards
What is Zero Trust?
Centers on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
Zero Trust : Centers on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead ——— trying to connect to its systems before granting access.
Centers on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
What is the premise of Zero Trust?
Trust is never granted implicitly but mast be continually evaluated.
Zero trust architecture is an ——– approach to enterprise resource and data security that encompasses identity (person and nonperson entities), credentials, access management, operations, endpoints, hosting environments,
and the interconnecting infrastructure
Zero trust architecture is an end-to-end approach to enterprise resource and data security that encompasses identity (person and nonperson entities), credentials, access management, operations, endpoints, hosting environments,
and the interconnecting infrastructure
Why has unauthorized lateral movement within the environmnet been one of the biggest challenges for federal agencies?
Traditionally, agencies (and enterprise networks in general) have
focused on perimeter defense and authenticated subjects are given authorized access to a broad
collection of resources once on the internal network. Meaning) Perimeter defense typically involves security measures designed to protect the network from outside threats, such as firewalls, intrusion detection systems, and other security tools placed at the network’s boundary.
The passage suggests that traditionally, once someone (authenticated user or subject) gains access past this “perimeter” (such as by logging in or passing a security check), they are often granted broad access to internal resources within the network. This model assumes that the perimeter defense is the main line of defense, and once you’re inside, trust is automatically granted.
How is access to enterprise resource given to subjects?
They are given by PDP and PEP
What is PDP and PEP?
PDP(Policy Decision Point) / PEP(Policy Enforcement Point)
What does PDP/PEP do?
The PDP/PEP
passes proper judgment to allow the subject to access the resource.
The PDP/PEP
passes proper judgment to allow the subject to access the resource. This implies that zero trust
applies to two basic areas:
authentication and authorization.
What does “implicit trust zone” mean?
The “implicit trust zone” represents an area where all the entities are trusted to at least the level
of the last PDP/PEP gateway. For example, consider the passenger screening model in an airport.
All passengers pass through the airport security checkpoint (PDP/PEP) to access the boarding
gates. The passengers, airport employees, aircraft crew, etc., mill about in the terminal area, and
all the individuals are considered trusted. In this model, the implicit trust zone is the boarding
area.
What does being agnostic mean?
denoting or relating to hardware or software that is compatible with many types of platforms or operating systems.
What the two planes of the ZTA logical components?
Data Plane and Control Plane
What are teh two logical components of PDP?
Policy Engine and Policy Administrator
What is communicated on a data plane?
Application data is communicated on a data plane
What is policy enforcement point?
Responsible for enabling, monitoring, and eventually terminating connections between a subject and an enterprise resource