Zero Trust - CompTIA Security+ SY0-701 - 1.2.5

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Zero Trust

A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network.

2
New cards

Zero trust security

- Every person and every device that accesses a network must be secured

• Within the organization

• Outside of the organization

- Least-privilege access

• User is only given access needed to perform job

- Microsegmentation

• Break up security perimeters into small zones

• Maintain separate access

- Multifactor authentication (MFA)•Single access method is not adequate

3
New cards

Planes of Operation

Defined as splitting networks into functional planes

- Physical

- Virtual

- Cloud Components

4
New cards

Data plane

Used for Tunneling, User data and application data

- Process the frames, packets, and network data

- Processing, forwarding, trunking, encrypting, NAT

<p>Used for Tunneling, User data and application data</p><p>- Process the frames, packets, and network data</p><p>- Processing, forwarding, trunking, encrypting, NAT</p>
5
New cards

Control Plane

The process of decision making, such as routing, blocking, and forwarding, that is performed by protocols.

- Manages the actions of the data plane

- Define policies and rules

- Determines how packets should be forwarded

- Routing tables, session tables, NAT tables

<p>The process of decision making, such as routing, blocking, and forwarding, that is performed by protocols.</p><p>- Manages the actions of the data plane</p><p>- Define policies and rules</p><p>- Determines how packets should be forwarded</p><p>- Routing tables, session tables, NAT tables</p>
6
New cards

Adaptive Identity

- Consider the source and the requested resources

- Multiple risk indicators - relationship to the organization, physical location, type of connection, IP address, etc

- Make the authentication stronger, if needed

7
New cards

Threat Scope Reduction

Decrease the number of possible entry points

8
New cards

Policy-Driven Access Control

Entails developing, managing, and enforcing user access policies based on their roles and responsibilities

9
New cards

security zone

A method of isolating a system from other systems or networks.

Can be implemented by creating different groups of the following

- Trusted zone, untrusted zone

- Internal network, external network

- VPN 1, VPN 5, VPN 11

- Marketing, IT, Accounting, HR

10
New cards

Policy Enforcement Point (PEP)

Part of ABAC Architecture.

Protects the resources being access.

Generates authorization request and send to the PDP.

11
New cards

Policy decision point

a process for making an authentication decision

12
New cards

Policy Engine

It is a security component that validates whether an actor is allowed to access a protected resource, following the requirements in an access policy.

13
New cards

Policy administrator

An employee responsible for the creation, revision, distribution, and storage of a policy in an organization.

14
New cards

Zero Trust Model/Architecture

Replaces Trust, but verify as security design principle by asserting that all activities attempted, by all users or entities, must be subject to control, authentication, authorization, and management at the most granular level possible. NIST and others have proposed zero trust architectures as guidance frameworks for organizations to use as they combine microsegmentation, access control, behavior modeling, and threat intelligence (among other techniques) in moving toward a zero trust implementation.