What is Zero Trust slogan?
“Trust nothing and verify everything”
What two planes do we need to zero trust implementation?
Control Plane, Data Plane
Control Plane
Policies and procedures. The overwatching framework and set of components responsible for defining, managing and enforcing policies related to user and system access within an organization
Data Plane
Ensures policies and procedures are properly executed
What are elements of control plane?
Adaptive identity, Threat scope reduction, Policy-driven access control, Secured zones
Adapted Identity
Rely on real-time validation, that takes int account user’s behavior, device, location and more
Threat scope reduction
Reduce user access to only what they need to do their work tasks
Policy-driven access control
Developing, managing and enforcing user access policies based on their roles and responsibilities
Secured zones
Isolated environments within network that store sensitive data
Policy Engine in Control Plane
Checks the access request against predefined policies. “Is this request allowed by rules?”
Policy Administrator in Control Plane
Establish and manage access policies
What Control Plane consist of?
Policy Engine and Policy Administrator
What Data Plane consist of?
Subject/System and Policy Enforcement Point
Subject/System in Data Plane
Individual or Entity attempting to gain access
Policy Enforcement Point in Data Plane
Allow or restrict access. Acts as gatekeeper to the sensitive areas of system or network. This is were decision about access or denial is made.
What is Zero Trus?
Cybersecurity approach that assumes no user or system is trusted by default and requires continuous verification for access to organizational resources