Statements (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:security
|
gptkbp:adoptedBy |
gptkb:NIST
|
gptkbp:alsoKnownAs |
gptkb:Zero_Trust
|
gptkbp:appliesTo |
data protection
network security cloud security identity management endpoint security |
gptkbp:component |
security analytics
identity and access management data security application security continuous monitoring network segmentation policy enforcement device security |
gptkbp:contrastsWith |
perimeter-based security
|
gptkbp:documentedIn |
gptkb:NIST_SP_800-207
|
gptkbp:focusesOn |
least privilege access
continuous verification eliminating implicit trust |
gptkbp:goal |
reduce attack surface
limit lateral movement improve breach containment |
https://www.w3.org/2000/01/rdf-schema#label |
Zero Trust Architecture
|
gptkbp:introduced |
gptkb:Forrester_Research
|
gptkbp:introducedIn |
2010
|
gptkbp:originatedIn |
gptkb:John_Kindervag
|
gptkbp:principle |
never trust, always verify
|
gptkbp:recommendation |
gptkb:Google
gptkb:Microsoft gptkb:CISA gptkb:Gartner |
gptkbp:relatedTo |
Zero Trust Network Access
Multi-factor authentication Micro-segmentation Least privilege principle Adaptive access control Continuous authentication Identity-centric security Security posture assessment |
gptkbp:requires |
gptkb:government_agency
encryption authentication monitoring micro-segmentation |
gptkbp:usedBy |
gptkb:government_agency
cloud service providers enterprises |
gptkbp:bfsParent |
gptkb:Identity_and_Access_Management
gptkb:SP_800-207 |
gptkbp:bfsLayer |
6
|