Statements (31)
Predicate | Object |
---|---|
gptkbp:instanceOf |
concept
|
gptkbp:appliesTo |
IoT devices
enterprise networks remote access cloud environments |
gptkbp:component |
gptkb:security
|
gptkbp:contrastsWith |
perimeter-based security
|
gptkbp:emphasizes |
monitoring and analytics
minimizing implicit trust verification of users and devices |
gptkbp:focusesOn |
access control
identity management trust relationships |
gptkbp:goal |
improve security posture
reduce risk |
https://www.w3.org/2000/01/rdf-schema#label |
Trust Architecture
|
gptkbp:influencedBy |
least privilege
network segmentation continuous authentication Zero Trust principles |
gptkbp:relatedTo |
gptkb:Zero_Trust_Architecture
cybersecurity |
gptkbp:requires |
continuous monitoring
strong authentication authorization policies |
gptkbp:standardizedBy |
gptkb:NIST_SP_800-207
|
gptkbp:usedIn |
information security
|
gptkbp:bfsParent |
gptkb:Freescale_QorIQ_LS1043A
gptkb:Freescale_QorIQ_LS2084A gptkb:Freescale_QorIQ_LS2088A |
gptkbp:bfsLayer |
7
|