1.2e - Zero Trust: Professor Messer (Security+)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Zero Trust

A security model requiring strict verification and authentication for resource access, applied to every device, user, and process.

2
New cards

Data Plane

The part of a network that carries user traffic and is responsible for forwarding network data (packets) to their destination.

3
New cards

Control Plane

Network component that manages actions such as port forwarding policies and controls over what data traverses the network.

4
New cards

Adaptive Identity

Examination of an individual’s identity based on gathered information during authentication, using proper credentials and contextual data.

5
New cards

Limiting Access Points

Restricting the ways individuals can access internal resources, such as connection to specific IP addresses or VPNs.

6
New cards

Policy-Driven Access Control

Enforces security policies determining who can access which resources based on predefined criteria.

7
New cards

Security Zones

Specific areas within a network to minimize the attack surface by separating and controlling access based on security requirements.

8
New cards

Implicit Trust

Use of a security zone to provide access based on pre-established criteria.

9
New cards

Policy Enforcement Point (PEP)

A component in Zero Trust architecture that validates user identities and device security before granting access.

10
New cards

Policy Decision Point (PDP)

Component in Zero Trust architecture that makes authentication decisions and forwards them to the Policy Enforcement Point.

11
New cards

Policy Administrator

Communicates with the Policy Enforcement Point to manage access and generates access tokens or credentials.

12
New cards

Policy Engine

Evaluates and makes authentication decisions based on security policies.