1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the core principle of Zero Trust security?
Never trust, always verify.” Every request must be authenticated, authorized, and continuously validated—no implicit trust is granted to any user, device, or application.
How is Zero Trust different from traditional perimeter-based security?
Traditional security trusts internal users once inside the network.
Zero Trust assumes every user/device could be compromised—trust is never assumed, even inside the network.
What are the three core components of the Zero Trust model?
Verify explicitly – use strong authentication
Use least privilege access – give only what’s necessary
Assume breach – design as if attackers already have access
What types of technologies support Zero Trust architecture?
MFA (Multi-Factor Authentication)
Identity and Access Management (IAM)
Microsegmentation
Encryption
Continuous monitoring and analytics
What is microsegmentation in Zero Trust?
t’s the practice of dividing a network into smaller segments and controlling access between them, limiting lateral movement of attackers.
What role does identity play in Zero Trust?
Identity becomes the new perimeter—every user and device must be authenticated and authorized at every step.
How does Zero Trust handle remote access?
Zero Trust treats remote and internal access the same—both must pass strict authentication and authorization policies.
What is the principle of least privilege, and how does it relate to Zero Trust?
It ensures users only have the minimum access they need—this limits damage from a compromised account.
What does continuous verification mean in Zero Trust?
Even after access is granted, users and devices are continuously monitored for signs of compromise or policy violations.
Why is Zero Trust considered a security strategy, not just a product?
Because it involves processes, policies, and technologies that work together—it's a mindset shift, not just a tool.