1/19
Vocabulary flashcards covering key terms from the zero trust architectures lesson.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Zero Trust Architecture
A cybersecurity approach that assumes no user or device is trusted by default and requires continuous verification of every access request, regardless of origin.
Perimeter-based cybersecurity
Traditional security model that relies on a strong outer boundary (firewalls, IDS) to keep threats out.
Deperimeterization
Shifting focus from a fixed network perimeter to protecting data and resources wherever they reside.
Deep perimeterization
Security strategy for dispersed networks where assets are spread across cloud, mobile, and remote locations, requiring controls beyond a single boundary.
Control plane
The centralized framework that defines, manages, and enforces access policies across the organization.
Data plane
The layer that enforces policy decisions and controls data flow once access is granted.
Adaptive identity
Real-time, contextual verification of a user or device using factors like behavior, device, and location.
Threat scope reduction
Limiting user access to only what is needed to reduce the potential attack surface.
Policy-driven access control
Access decisions are driven by predefined policies tied to roles, responsibilities, and security rules.
Secured zones
Isolated, access-controlled segments within a network designed to protect sensitive data.
Subject system
An entity (user, device, or application) requesting access; must be authenticated and authorized.
Policy engine
The component that assesses access requests against defined policies to determine permissions.
Policy administrator
Entity responsible for creating and maintaining access policies in line with security objectives.
Policy enforcement point
The mechanism that enforces access decisions at the data plane, gating access to resources.
Trust but verify
A traditional saying; in Zero Trust, verification is extended to continuous, everywhere verification.
Continuous verification
Ongoing validation of identity and permission at every access attempt and data transaction.
Blast radius
The potential extent of damage from a breach; Zero Trust aims to minimize it.
Least privilege (Need-to-know)
Granting users only the minimum permissions necessary to perform their tasks.
Role-based access control (RBAC)
Access permissions assigned based on a user’s role within the organization.
Authentication vs Authorization
Authentication verifies identity; Authorization grants access according to policies.