Introduction to ZTA - Introduction Flashcards

(29 cards)

1
Q

What does ZTA stand for?

A

Zero Trust Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which technology developments put increasing pressure on networks and security measures of organizations?

A

Developments leading to distributed environments like cloud computing, edge computing and IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a primary strategy for organizations adopting new technologies?

A

Organizations increasingly adopt new technologies through cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What has increased the complexity of networks and service architectures?

A

The creation of a distributed environment through the integration of on-premises IT services with public cloud services, sensors, and actuators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technological advancements have influenced organizations to adopt distributed environments?

A

Cloud computing, edge computing, IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which social behavior trend has contributed to the need for distributed environments in organizations?

A

Increased requests for mobility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a significant challenge organizations face regarding data protection?

A

Data residing in virtual environments outside physical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are traditional security architectures becoming ineffective?

A

Traditional security architectures focus on securing the physical network perimeter - which does no longer exist in a distributed environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the core principle of the ZT concept?

A

Never trust, always verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does ZTA approach the design of architectures?

A

From the inside out versus outside in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: ZTA creates virtual _______ and grants access to resources inside of that enclave.

A

enclaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: ZTA is only applicable to government organizations.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the evolution of social behavior in organizations emphasize?

A

Mobility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the (distributed) entities that need to be connected in modern networks?

A
  • Remote offices
  • Remote workers
  • Contractors
  • Smart objects
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who first coined the term Zero Trust (ZT)?

A

John Kindervag around 2010

John Kindervag was a principal analyst at Forrester.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the central concept behind Zero Trust according to Kindervag?

A

All network traffic is untrusted

Requests to access data or resources should be verified at each step.

17
Q

Which organizations previously researched the concept of Zero Trust before Kindervag?

A
  • Jericho Forum at the Open Group
  • U.S Defense Information Systems Agency (DISA)
  • Department of Defense (DOD)
18
Q

What was the earliest concept of Zero Trust based on?

A

Data-centric network design leveraging microsegmentation.

19
Q

What does microsegmentation aim to achieve in the context of Zero Trust?

A

Limit lateral movement of attackers.

20
Q

What significant development in 2013 was related to Zero Trust?

A

Initiation of Cloud Security Alliance’s Software-Defined Perimeter (SDP) concept.

21
Q

What is the primary goal of the Software-Defined Perimeter (SDP)?

A

Create an invisible perimeter requiring positive identification of network connections.

22
Q

What was the motivation behind Google’s implementation of Zero Trust for its employees in 2014?

A

The recognition that traditional perimeter security was no longer sufficient.

23
Q

What is the name of Google’s model that shifted access controls from the perimeter to individual devices and users?

24
Q

What does the BeyondCorp model allow users to do?

A

Work securely from any untrusted network.

25
Which report published in 2018 extended the original Zero Trust model?
Zero Trust eXtended (ZTX) Ecosystem report.
26
What does the Zero Trust eXtended (ZTX) Ecosystem report encompass?
The original model was extended beyond its network focus to encompass today's ever-expanding attack surface.
27
When did NIST announce the final publication of Special Publication (SP) 800-207?
August 2020.
28
What does Special Publication (SP) 800-207 discuss?
Core logical components of Zero Trust Architecture.
29
True or False: The Zero Trust model is static and does not evolve.
False.