2.2 - Zero trust Flashcards
(9 cards)
What is Zero Trust?
It is a security framework that requires all subjects, assets, and workflows to be authenticated, authorised and continuously validated before allowing access to applications and data
What are the main principles of zero trust
Continuous verification - always verify access
Access Limitation - Access is granted on per-session basis (has a time limit)
Limit the ‘blast radius’ - Minimise impact if internal or external resources are breached (e.g. segmentation, least privilege
Automate - Context, collection, and response are meant to be automatically collected (e.g. credentials, workloads, endpoints SIEMS, Threat intelligence
What are the ZT components
Policy Decision Point (PDP)
Policy Engine (PE)
Policy Administrator (PA)
Policy Enforcement Point (PEP)
What is a control plane
It is a system that management and coordinates access to resources, handles authentication, authorisation and policy enforcement
What is the data plane
This is where the application and service communication flows, it handles the actual data transfer and processing (moves data between software components
What is the Policy Decision Point (PDP)?
PDP has two logical components Policy engine and policy administrator
What is the Policy Engine (PE)?
Policy Engine (PE) - responsible for the ultimate decision to grant access to the given subject
What is the Policy Administrator (PA)?
Generates any session-specific authentication, authentication token, or credential used to access an enterprise resource
What is the Policy Enforcement Point (PEP)?
Responsible for enabling monitoring, and eventually termination connections between a subject and an enterprise resource