Zero Trust
Zero Trust → A security model that assumes no user or device should be trusted by default, requiring continuous verification and strict access control for every connection or request.
Policy-Based Authentication
Policy-Based Authentication → Access decisions are made dynamically based on predefined policies such as user identity, device type, location, and time of request.
Adaptive Identity
Adaptive Identity → Continuously evaluates user behavior and context to adjust authentication requirements, such as adding multifactor authentication if activity seems unusual.
Policy-Driven Access Control
Policy-Driven Access Control → Restricts access to network resources using centralized policies that define who can access what, when, and under what conditions.
Authentication
Authentication → The process of verifying a user’s or device’s identity before granting network access, often through passwords, certificates, or multifactor methods.
Authorization
Authorization → Determines what resources an authenticated user or device is allowed to access based on their assigned privileges or roles.
Accounting
Accounting → Tracks and records user activity and resource usage on the network for auditing, monitoring, and compliance purposes.
Least Privilege Access
Least Privilege Access → A security principle that grants users the minimum level of access required to perform their tasks, reducing the risk of misuse or breaches.
SASE
Secure Access Service Edge → A next-generation VPN model combining network security functions like Zero Trust, firewall, and secure web gateway into a single cloud-based service.