Zero Trust - CompTIA Security+ SY0-701 - 1.2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:49 AM on 3/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

7 Terms

1
New cards

Zero trust

Many networks are relatively open on the inside

- Once you're through the firewall, there are few

security controls

• Zero trust is a holistic approach to network security

- Covers every device, every process, every person

• Everything must be verified

- Nothing is trusted

- Multifactor authentication, encryption, system

permissions, additional firewalls, monitoring and

analytics, etc.

2
New cards

Planes of operation

-Split the network into functional planes

-Applies to physical, virtual, and cloud components

Data plane

- Process frames, packets and network data

- Processing forwarding trunking, encrypting, NAT

Control Plane

- Manages the actions on the data plane

- Define policies and rules

- Determines how packets should be forwarded

- Routing tables

<p>-Split the network into functional planes</p><p>-Applies to physical, virtual, and cloud components</p><p>Data plane</p><p>- Process frames, packets and network data</p><p>- Processing forwarding trunking, encrypting, NAT</p><p>Control Plane</p><p>- Manages the actions on the data plane</p><p>- Define policies and rules</p><p>- Determines how packets should be forwarded</p><p>- Routing tables</p>
3
New cards

Controlling trust

Adaptive identity

- Consider the source and the requested resources

- Multiple risk indicators - relationship to the

organization, physical location, type of connection, IP

4
New cards

Security zones

Security is more than a one-to-one relationship

- Broad categorizations provide a security-related

foundation

Where are you coming from and where

are you going

- Trusted, untrusted

- Internal network, external network

- VPN 1, VPN 5, VPN 11

- Marketing, IT, Accounting, Human Resources

Using the zones may be enough by itself to deny

access

- For example, Untrusted to Trusted zone traffic

Some zones are implicitly trusted

- For example, Trusted to Internal zone traffic

5
New cards

Policy enforcement point

Subjects and Systems- End users, applications, non-human entities.

Policy enforcement point (PEP)

- The gatekeeper

Allow, monitor, and terminate connections.

- Can consist of multiple components working together.

6
New cards

Applying trust in planes

Policy Decision Point

- There's a process for making an authentication decision

• Policy Engine

- Evaluates each access decision based on policy and other

information sources

- Grant, deny, or revoke

• Policy Administrator

- Communicates with the Policy Enforcement Point

- Generates access tokens or credentials

- Tells the PEP to allow or disallow access address, etc.

- Make the authentication stronger, if needed

• Threat scope reduction

- Decrease the number of possible entry points

• Policy-driven access control

- Combine the adaptive identity with a predefined set of rules

7
New cards

Zero Trust Across Planes

knowt flashcard image

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)