Statements (41)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security
|
| gptkbp:adoptedBy |
gptkb:Google
gptkb:Microsoft gptkb:U.S._federal_government |
| gptkbp:alsoKnownAs |
gptkb:Zero_Trust_Architecture
|
| gptkbp:appliesTo |
data protection
network security identity management endpoint security |
| gptkbp:component |
micro-segmentation
network segmentation monitoring and logging least privilege access continuous authentication device verification |
| gptkbp:contrastsWith |
perimeter-based security
|
| gptkbp:focusesOn |
eliminating implicit trust
|
| gptkbp:goal |
reduce attack surface
protect sensitive data limit lateral movement improve breach containment |
| gptkbp:originatedIn |
gptkb:Forrester_Research
gptkb:John_Kindervag 2010 |
| gptkbp:principle |
never trust, always verify
|
| gptkbp:relatedTo |
cybersecurity
identity and access management Zero Trust Network Access multi-factor authentication BeyondCorp |
| gptkbp:requires |
access control
real-time monitoring identity verification policy enforcement |
| gptkbp:standardizedBy |
gptkb:NIST_SP_800-207
|
| gptkbp:usedIn |
cloud security
enterprise IT remote work security |
| gptkbp:bfsParent |
gptkb:Microsoft_Pluton
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Zero Trust
|