Zero Trust

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Zero Trust

Unlike traditional “moat and castle” or defense-in-depth designs, ____ presumes that there is no trust boundary and no network edge

2
New cards

Subjects

are the users, services, or systems that request access or attempt to use rights

3
New cards

Policy Engines

make policy decisions based on both rules and external systems

4
New cards

Policy Administrators

are not individuals. Rather they are components that establish or remove the communication path between subjects and resources, including creating session-specific authentication tokens or credentials as needed

5
New cards

Policy Enforcement Points

communicate with Policy Administrators to forward requests from subjects and to receive instruction from the policy administrators about connections to allow or end

6
New cards

The Control Plane is composed of four components

  • Adaptive identity (often called adaptive authentication), which leverages context-based authentication. Adaptive authentication methods may then request additional identity validation if requirements are not met or may decline authentication if policies do not allow for additional validation

  • Threat scope reduction, sometimes described as “limited blast radius”, is a key component in Zero Trust design. Limiting the scope of what a subject can do as well or what access is permitted to a resource limits what can go wrong if an issue does occur

  • Policy-driven access control

  • The Policy Administrator

7
New cards

The Data Plane includes

  • Implicit trust zones

  • Subjects and systems

  • Policy Enforcement Points