Introduction to ZTA - Benefits of ZT Flashcards
(71 cards)
What are the benefits of Zero Trust
- Reduced Risk of Compromise
- Increased Trustworthiness of Access
- Increased Visibility and Analytics
- Improved Compliance
- and additional benefits
What is one of the main benefits of Zero Trust (ZT)?
Reduces risk of compromise
This is achieved by reducing the attack surface, limiting the radius of impact, and decreasing the time to detect and contain breaches.
What principle is at the core of reducing the attack surface?
Principle of least privilege and ‘never trust, always verify’
These principles dictate that resources are accessed based on various attributes and context.
How does Zero Trust Architecture (ZTA) implement resource hiding?
Resources are only visible to authenticated, authorized users
This concept varies depending on the ZTA implementation technique.
What is the role of the Policy Enforcement Point (PEP) in ZTA?
Forwards requests to the Policy Decision Point (PDP) for authorization
The PEP checks if the user has been authenticated and authorized by policy.
What does the PDP do after receiving a request from the PEP?
Checks if the user has been authenticated and authorized by policy
The PDP then sends its response back to the PEP.
What is the goal of using vetted, compartmentalized applications in ZTA?
To protect applications from potentially compromised hosts
This involves running only approved applications in a sandboxed environment.
What is micro-segmentation in the context of Zero Trust?
Restricts lateral movement inside an enterprise IT environment
Each access attempt is authenticated and authorized, regardless of origin.
How does ZTA improve the detection of breaches?
Centralized authentication and policy enforcement increases visibility
This visibility helps in detecting malicious access attempts in real-time.
What kinds of threats can ZTA help detect early?
- Phishing attempts
- Privilege elevation
- Use of stolen credentials
Early detection can stop attackers from launching successful intrusions.
Fill in the blank: The PEP will refuse requests from _______.
[other applications running on the server]
True or False: ZTA allows unrestricted access to resources regardless of authentication.
False
Access is always authenticated and authorized.
What is the significance of dynamic access policies in ZTA?
Enables organizations to detect malicious access attempts in real-time
This capability helps in mitigating attacks before they cause damage.
What does ZTA stand for?
Zero Trust Architecture
What is the fundamental capability of ZTA regarding identity access management?
Consolidated identity access management (IAM) and policy solutions
What is the principle of least privilege in ZTA?
Access to resources is based on the principles of least privilege and need to know
What are some methods used in ZTA to increase trustworthiness of access?
Single Packet Authorization (SPA)
What security measures are enforced before access is granted in ZTA?
Strong authentication, including MFA, session timeouts, re-authentication requests, and validation
Fill in the blank: Access to any data in ZTA is protected _______ based on its sensitivity.
cryptographically
What is the role of Multi-Factor Authentication (MFA) in ZTA?
To enforce strong authentication before access is granted
List two benefits of implementing ZTA.
- Granular access and permissions
- Continuous validation of identity, authentication, and authorization to resources
True or False: In ZTA, user authentication is decentralized.
False
What happens to the first SPA packet sent by the client?
It is rejected