Introduction to ZTA - Objectives of ZT Flashcards
(99 cards)
What is the primary objective of Zero Trust Architecture (ZTA)?
To address security risks inherent in the assumption of trust and lack of proper access controls.
What are typical approaches to addressing security risks in ZTA?
Reducing the attack surface and/or improving the effectiveness of security controls.
What is the motivation behind Zero Trust Architecture?
To provide a holistic and consistent security approach for protecting an enterprise against malicious actors.
What is a key differentiator in ZTA?
The ephemeral nature of any trust between data/computing resources and the principals requesting access.
How does ZTA enhance an environment’s security posture?
Through dynamic policy enforcement and decisioning.
What types of attacks does ZTA protect against?
Both internal and external attacks that exploit and compromise exposed access mechanisms.
What are the technical objectives of a ZT approach?
Establishes a framework for protecting resources, simplifies user experience, reduces attack surface size and complexity, enforces least privilege, improves control and resilience, localizes impact radius of a security failure.
What are the business objectives of Zero Trust?
Reduce risk, improve governance and regulatory compliance, align organization’s culture with risk appetite of its leadership.
Fill in the blank: A ZT approach aims to _______ the organization’s attack surface size and complexity.
reduce
True or False: ZTA only addresses external threats.
False
What does ZT stand for?
Zero Trust
ZT is an approach to cybersecurity that does not inherently trust any entity.
What is the core premise of Zero Trust?
An organization should not inherently trust any entity that comes from within or beyond its boundaries.
What is the goal of the protective framework established by ZT?
To enable a shift of focus to more business-oriented goals and protect data based on its value and specific needs.
Why are aged cybersecurity techniques becoming ineffective?
They yield limited results and inadequate protection due to the increasing frequency and scale of attacks.
What types of approaches are no longer practical according to ZT?
Approaches based on physical objects and systems, and signature-based threat detection.
What factors necessitate a reconsideration of cybersecurity strategies?
Increasing frequency and scale of attacks, hyper-connected world, virtualized environments, and software-based organizations.
Fill in the blank: The protective framework established by ZT represents a _______ approach to cybersecurity.
novel
True or False: Zero Trust allows organizations to trust internal entities by default.
False
What should organizations reconsider according to the ZT framework?
Everything from network configurations to detection and prevention approaches.
What do organizations need to focus on regarding their data?
The value of the data and their specific protection needs.
What does ZTA stand for?
Zero Trust Architecture
How does ZTA reduce management overhead?
By applying a consistent access model for all assets and handling access requests uniformly
What is the consistent interrogation model used in ZTA for access requests?
Who are you? Do you need this access now? Okay, you get this access to this resource for this period
List the elements that ZTA models are absent of.
- Complicated diagrams of nested groups using legacy access control lists (ACL)
- Layers of groups managed by potentially irrelevant decision-makers
- Stale and orphaned groups
- Authorization mechanisms based on antiquated models/labels
- Delays in provisioning, deprovisioning, or access revocation