Statements (41)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:security
|
gptkbp:adoptedBy |
gptkb:Google
gptkb:Microsoft gptkb:U.S._federal_government |
gptkbp:alsoKnownAs |
gptkb:Zero_Trust_Architecture
|
gptkbp:appliesTo |
data protection
network security identity management endpoint security |
gptkbp:component |
micro-segmentation
network segmentation monitoring and logging least privilege access continuous authentication device verification |
gptkbp:contrastsWith |
perimeter-based security
|
gptkbp:focusesOn |
eliminating implicit trust
|
gptkbp:goal |
reduce attack surface
protect sensitive data limit lateral movement improve breach containment |
https://www.w3.org/2000/01/rdf-schema#label |
Zero Trust
|
gptkbp:originatedIn |
gptkb:Forrester_Research
gptkb:John_Kindervag 2010 |
gptkbp:principle |
never trust, always verify
|
gptkbp:relatedTo |
cybersecurity
identity and access management Zero Trust Network Access multi-factor authentication BeyondCorp |
gptkbp:requires |
access control
real-time monitoring identity verification policy enforcement |
gptkbp:standardizedBy |
gptkb:NIST_SP_800-207
|
gptkbp:usedIn |
cloud security
enterprise IT remote work security |
gptkbp:bfsParent |
gptkb:Microsoft_Pluton
|
gptkbp:bfsLayer |
6
|