Zero Trust

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

What is the core principle of Zero Trust security?

Never trust, always verify.” Every request must be authenticated, authorized, and continuously validated—no implicit trust is granted to any user, device, or application.

2
New cards

How is Zero Trust different from traditional perimeter-based security?

Traditional security trusts internal users once inside the network.

Zero Trust assumes every user/device could be compromised—trust is never assumed, even inside the network.

3
New cards

What are the three core components of the Zero Trust model?

Verify explicitly – use strong authentication

Use least privilege access – give only what’s necessary

Assume breach – design as if attackers already have access

4
New cards

What types of technologies support Zero Trust architecture?

MFA (Multi-Factor Authentication)

Identity and Access Management (IAM)

Microsegmentation

Encryption

Continuous monitoring and analytics

5
New cards

What is microsegmentation in Zero Trust?

t’s the practice of dividing a network into smaller segments and controlling access between them, limiting lateral movement of attackers.

6
New cards

What role does identity play in Zero Trust?

Identity becomes the new perimeter—every user and device must be authenticated and authorized at every step.

7
New cards

How does Zero Trust handle remote access?

Zero Trust treats remote and internal access the same—both must pass strict authentication and authorization policies.

8
New cards

What is the principle of least privilege, and how does it relate to Zero Trust?

It ensures users only have the minimum access they need—this limits damage from a compromised account.

9
New cards

What does continuous verification mean in Zero Trust?

Even after access is granted, users and devices are continuously monitored for signs of compromise or policy violations.

10
New cards

Why is Zero Trust considered a security strategy, not just a product?

Because it involves processes, policies, and technologies that work together—it's a mindset shift, not just a tool.