Describe ZERO TRUST
Through a ZERO TRUST policy, what are some SECURITY CHECKS that can be implemented?
What is the purpose of SEPARATE FUNCTIONAL PLANES OF OPERATIONS?
Describe the DATA PLANE.
Describe the CONTROL PLANE.
How can security controls be evaluated using ADAPTIVE IDENTITY?
What are some considerations when using ADAPTIVE IDENTITY?
How is ZERO TRUST controlled using THREAD SCOPE REDUCTION?
What is the purpose of POLICY DRIVEN ACCESS CONTROL?
How can establishing SECURITY ZONES assist in authenticate users?
Describe the purpose of a POLICY ENFORCEMENT POINT (PEP)
What are some examples of SUBJECTS AND SYSTEMS that are managed by the PEP?
How does the POLICY ENFORCEMENT POINT (PEP) determine which traffic is allowed or disallowed?
What is the purpose of the POLICY ENGINE?
What is the purpose of the POLICY ADMINISTRATOR?