Introduction to Zero Trust - Definitions, Concepts and Components Flashcards
(69 cards)
What does the ZT concept as a cybersecurity approach require according to the CSA?
ZT is a cybersecurity approach that requires the following:
1. Making no assumptions about the trustworthiness of an entity as it requests access to a resource
2. Starting with no pre-established entitlements, then relying on a construct which is used to add entitlements
3. Assuming breach and verifying all workforce, device, workload, network and data access, regardless of where, who, or to what resource with the assumption that breaches are impending or have already occurred
What is a Tenet?
A principle generally held to be true
How many tenets has ZT according to the USA Department of Defense Zero Trust Reference Architecture?
ZT has 5 major tenets:
1. Assume a hostile environment
2. Assume breach
3. Never trust, always verify
4. Scrutinize explicitly
5. Apply unified analytics
DAAS stands for
Data, Applications, Assets and Services
What are several design principles of ZTA?
- Denying access until the requester has been thoroughly authenticated and authorized
- Allowing access to the network only when requesters (users, machines, processes) authenticate who they are
- Allowing access to resources only after the requesting entity has been authorized
- Enforcing least privilege, specifically, granting the least amount of access required
- Requiring continuous monitoring of existing security controls’ implementation and effectiveness
What are the seven pillars of a Zero Trust Architecture?
There are seven pillars of DoD ZTA:
1. Users/identities
2. Devices/endpoints
3. Network/Environment
4. Applications & Workload
5. Data
6. Visibility & Analytics
7. Automation & Orchestration
What is in the Users pillar?
- Securing/limiting/enforcing DAAS access for person, non-person, and federated entities through identity, credential and access management capabilities
- MFA and continuous multi-factor authentication
- Continuously authenticate, authorize, and monitor activity patterns
- RBAC and ABAC for authorizing users to access applications/data
What is in the Devices / endpoints pillar?
- Identify, authenticate, authorize, inventory, isolate, secure, remediate and control all devices
- Real-time device attestation and patching
E.g., using Mobile device managers or comply-to-connect (C2C)
What is in the Network/environment pillar?
Logically and physically segment, isolate and control the on-premise and off-premises network/environment with granular access and policy restrictions:
- Control privileged access
- Manage internal and external data flows
- Prevent lateral movement
What is in the Application and Workload pillar?
Tasks on systems or services on-premises as well as applications or services in a cloud environment
What is in the Data pillar?
Data categorized in terms of mission criticality under a comprehensive data management strategy.
- Categorization of data
- Encryption at rest and in transit
- Technologies like DRM, DLP, software-defined storage and granular data-tagging
What is in the Visibility and Analytics pillar?
Visibility on vital, contextual details to provide a greater understanding of performance, behavior and activity baselines across various ZT pillars. Other monitoring data for situational awareness.
What is in the Automation and Orchestration pillar?
Automated security processes to take policy-based actions across the enterprise with speed and at scale. For example Security Orchestration, Automation and Response, integrated with Security Information and Event Management.
What does ZT stand for?
Zero Trust
ZT is a set of principles and practices designed for reducing cyber risk in dynamic IT environments.
What are the three core components for a Zero Trust Architecture?
- Communication: a request for an entity to access a resource and the resulting access or session.
- Identity: The identity of the entity (e.g., user or device) requesting access to the resources
- Resources: any assets within the target environment.
What are two fundamental elements of Zero Trust?
- Policy: the governance rules that identify the who, what, when, how, why of access to the target resource
- Data sources: the contextual information providers can use to keep policies dynamically updated
What is the primary requirement of the Zero Trust model?
Strict authentication and verification for each person, device, or service trying to access an IT resource
In Zero Trust, how is the security posture of a resource assessed?
Based on authentication and authorization controls in place, not by its location
What must occur prior to granting network access in a Zero Trust network?
Authentication and explicit authorization
True or False: Encrypting communications alone is sufficient for Zero Trust security.
False
What is a key aspect of Zero Trust regarding access verification?
Each individual flow must be confirmed as an authorized connection
What percentage of attacks start with a breach via a phishing email?
90%
What are the steps typically involved in a phishing attack leading to data exfiltration?
- Breach via phishing email
- Creation or compromise of an administrative account
- Lateral movement of malware
- Exfiltration of enterprise data
What does CSA define the Zero Trust concept as?
A cybersecurity approach that requires verification of all access requests