Zero Trust Flashcards

(16 cards)

1
Q

Zero Trust

A

It is a holistic approach to network security that covers every device, every process, every person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

More facts about zero trust

A

Everything must be verified, nothing is inherently trusted. Multi-factor authentication, encryption, system permissions, additional firewalls, monitoring and analytics, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Planes of Operation

A

Split the network into functional planes. Applies to physical, virtual, and cloud components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data plane

A

-Process the frames, packets, and network data
-Processing, forwarding, trunking, encrypting, NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Control Plane

A

-Manages the actions of the data plane
-Defines policies and rules
-Determines how packets should be forwarded
-Routing tables, session tables, NAT tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adaptive identity

A

-Consider the source and the requested resources
-Multiple risk indicators - relationship to the organization, physical location, type of connection, IP address, etc
-Make the authentication stronger, if needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat Scope Reduction

A

-Decrease the number of possible entry points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Policy-Driven Access Control

A

-Combine the adaptive identity with a predefined set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security zones

A

Security is more than a one-to-one relationship. Broad categorizations provide a security-related foundation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are you coming from and where are you going?

A

-Trusted, untrusted
-internal network, external network
-VPN 1, VPN 5, VPN 11
-Marketing, IT, Accounting, Human Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zones

A

Using the zones may be enough by itself to deny access. For example: Untrusted to Trusted zone traffic. Some zones are implicitly trusted. For example: Trusted to Internal zone traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policy Enforcement Point

A

You can think of it as a gatekeeper.
Subjects and Systems
-End users, applications, non-human entities
-Allow, monitor, and terminate connections can consist of multiple connections working together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PEP

A

Policy enforcement point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PDP

A

Policy Decision Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Applying trust in planes

A

-Policy Decision Point
There’s a process for making an authentication decision
-Policy Engine
Evaluates each access decision based on policy and other information sources. Grant, deny, revoke
-Policy Administrator
Communicates with the policy enforcement point, generates access tokens or credentials. Tells the PEP to allow or disallow access