Zero Trust
Zero trust → security model that assumes no implicit trust and requires continuous verification for every access request.
MFA
Multifactor authentication (MFA) → authentication method requiring two or more verification factors.
Planes of Operation
Planes of operation → logical layers in zero trust architecture that separate data processing and control decisions.
Data Plane
Data plane → handles the actual transmission of data between systems.
Control Plane
Control plane → manages access decisions, policies, and traffic control.
Adaptive Identity
Adaptive identity → dynamic authentication based on user behavior, context, and risk.
Threat Scope Reduction
Threat scope reduction → shrinks the potential attack surface by limiting access, isolating elements, and enforcing strict controls. Often a key part of Zero Trust architecture
Policy-Driven Access Control
Policy-driven access control → enforces access decisions based on predefined security policies.
Security Zones
Security zones → segmented network areas that isolate resources based on trust levels.
Examples: Public (internet), Internal (LAN), DMZ (Web Servers), etc. they all have their own rules and permissions based on needed security
PEP
Policy enforcement point (PEP) → component that enforces access decisions.
The bouncer at a party
PDP
Policy decision point (PDP) → component that evaluates access requests against policies. Tells the PEP whether to allow or deny access.
The guest list at a party
Policy Engine and Policy Administrator
Policy engine and policy administrator → systems that evaluate policies and manage enforcement actions.