Zero Trust

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Zero trust

Policy requiring authentication for access to every network resource

Everything is subject to security checks

Includes firewalls, encryption, mfa, system perms, monitoring/analytics, etc

2
New cards

Planes of operation

Split security devices (physical, virtual and cloud) into separate components

3
New cards

Data plane

Device performing security process such as switch, router or firewall

  • Process frames, packets and network data and processing forwarding, trunking, encrypting, NAT (helps move data between networks)

  • Physical ports on a router, switch or firewall

4
New cards

Control Plane

Manages actions of data plane (policies or rules for data moving across the network. Routing, session and NAT tables). Forwarding policies or how data should be routed

  • Configuration of router, switch or firewall

5
New cards
6
New cards
7
New cards

Adaptive Identity

Security controls based on info gathered during identification process.

  • Looking at source of request such as geographical location

  • Risk indicators such as relationship to organization such as full/part time, employee/contractor, type of connection, IP address, etc

  • Strengthen authentication if needed

8
New cards

threat scope reduction

Limit number of possible entry points into network such as restricting access unless in the building or going through a VPN

9
New cards

Policy driven access control

Combine data from adaptive identity and threat scope reduction to form a security policy for that user/device.

10
New cards

Security zones

Where user is connecting from and where they are trying to connect

  • Coming from untrusted to trusted or internal to external (deny access coming from an untrusted zone)

  • Create VPNs/groups for each department within the organization and set access rules for each VPN/group

  • Implicitly Trusted - Device/user coming from a trusted zone going to an internal zone has implicit trust

11
New cards

PEP

Policy Enforcement Point (enforces established rules) - Gatekeeper between data coming from a system requesting access to a resource. Can be multiple components working together. Club bouncer ensuring only qualified personnel are allowed entry.

  • Allow, monitor and terminate connections

<p>Policy Enforcement Point (enforces established rules) - Gatekeeper between data coming from a system requesting access to a resource. Can be multiple components working together. <strong>Club bouncer ensuring only qualified personnel are allowed entry.</strong></p><ul><li><p>Allow, monitor and terminate connections</p></li></ul><p></p>
12
New cards

Policy Engine

(creates established rules) Examines requests and makes access decision based on predefined policies. Creates rules for bouncer to enforce

<p>(creates established rules) Examines requests and makes access decision based on predefined policies. <strong>Creates rules for bouncer to enforce</strong></p>
13
New cards

Policy Admin

Provides info from Policy Engine to PEP. Ensures PEP is following established rules. Supervisor ensuring bouncer is following protocol

<p>Provides info from Policy Engine to PEP. Ensures PEP is following established rules. <strong>Supervisor ensuring bouncer is following protocol</strong></p>
14
New cards