Statements (31)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:concept
|
| gptkbp:appliesTo |
IoT devices
enterprise networks remote access cloud environments |
| gptkbp:component |
gptkb:security
|
| gptkbp:contrastsWith |
perimeter-based security
|
| gptkbp:emphasizes |
monitoring and analytics
minimizing implicit trust verification of users and devices |
| gptkbp:focusesOn |
access control
identity management trust relationships |
| gptkbp:goal |
improve security posture
reduce risk |
| gptkbp:influencedBy |
least privilege
network segmentation continuous authentication Zero Trust principles |
| gptkbp:relatedTo |
gptkb:Zero_Trust_Architecture
cybersecurity |
| gptkbp:requires |
continuous monitoring
strong authentication authorization policies |
| gptkbp:standardizedBy |
gptkb:NIST_SP_800-207
|
| gptkbp:usedIn |
information security
|
| gptkbp:bfsParent |
gptkb:Freescale_QorIQ_LS1043A
gptkb:Freescale_QorIQ_LS2084A gptkb:Freescale_QorIQ_LS2088A |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Trust Architecture
|