Introduction to ZTA - ZT use cases Flashcards
(140 cards)
What is the primary purpose of Zero Trust (ZT) use cases?
To address secure access and risk mitigation in various industries
ZT use cases vary architecturally and in their risk mitigation efficacy and limitations.
What does the use case description for Remote Access & VPN Replacement entail?
Secure remote access to corporate networks has evolved from traditional VPNs to accommodate cloud services
Users now require access to services residing in clouds and associated environments.
What are the security risks associated with traditional VPN solutions?
Users gain extensive access post-authentication, risking violation of least privilege and potential malware infections
Device authentication is critical to prevent malicious software from impacting organizational assets.
What is a significant limitation of traditional VPNs in the context of cloud migration?
Substantial performance degradation when accessing cloud-based IT resources
Traditional VPNs terminate at the organization’s perimeter, limiting access to cloud services.
What technologies are being used to improve remote access to cloud services?
Cloud proxies and SASE (Secure Access Service Edge)
These technologies create encrypted tunnels to external enclaves for better access.
Fill in the blank: ZTA enhances the security posture of remote access by including ______ capabilities.
SDP (Software-Defined Perimeter) capabilities
Specifically, it includes SPA (Secure Access Protocol) in communications.
What does the principle of least privilege entail in the context of VPN access?
Users should only have access to the minimum resources necessary for their tasks
This principle helps mitigate security risks by limiting access.
True or False: Once authenticated via a VPN gateway, users have unrestricted access to all enterprise assets.
True
This unrestricted access can lead to security vulnerabilities if not managed properly.
What is the role of device authentication in remote access scenarios?
To validate that devices are free from malware before granting network access
This step is crucial to protect organizational assets.
What does ZTA stand for?
Zero Trust Architecture
How does ZTA mitigate VPN’s security gaps?
Through more granular, contextual security controls
What is a significant drawback of traditional VPN implementations?
High latency and a single point of failure/compromise
What is the role of the ZT gateway in ZTA?
Each service is separately protected by a ZT gateway
What must a client do before connecting to an application in ZTA?
Authenticate and authorize
What protocol is used for secure connections in ZTA?
mTLS (mutual Transport Layer Security)
What is split tunneling in the context of VPN?
A feature that divides internet traffic, sending some through an encrypted tunnel and the rest through an open network
What limitations are associated with a ZT environment?
Dependent on proven standards like mTLS, SAML, and X.509 certificates
What enhances the flexibility of a ZT environment?
It can be combined with supplemental security systems such as data encryption and remote attestation
True or False: ZTA applies the same policies and security controls to all users regardless of their location.
False
Fill in the blank: With VPN, users often experience delays, disconnections, and _______.
connectivity problems
What is the impact of VPN on user connectivity to the internet?
It is negatively impacted, even with split tunneling
What does ZTA provide a path for?
Evolution of security measures
What is micro-segmentation?
Micro-segmentation enforces the separation of connections between devices on a network
How does micro-segmentation prevent traffic from being visible to internal users?
By requiring granular, policy-based access for device-to-device connections