Statements (55)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security
|
| gptkbp:adoptedBy |
gptkb:NIST
|
| gptkbp:alsoKnownAs |
gptkb:Zero_Trust
|
| gptkbp:appliesTo |
data protection
network security cloud security identity management endpoint security |
| gptkbp:component |
security analytics
identity and access management data security application security continuous monitoring network segmentation policy enforcement device security |
| gptkbp:contrastsWith |
perimeter-based security
|
| gptkbp:documentedIn |
gptkb:NIST_SP_800-207
|
| gptkbp:focusesOn |
least privilege access
continuous verification eliminating implicit trust |
| gptkbp:goal |
reduce attack surface
limit lateral movement improve breach containment |
| gptkbp:introduced |
gptkb:Forrester_Research
|
| gptkbp:introducedIn |
2010
|
| gptkbp:originatedIn |
gptkb:John_Kindervag
|
| gptkbp:principle |
never trust, always verify
|
| gptkbp:recommendation |
gptkb:Google
gptkb:Microsoft gptkb:CISA gptkb:Gartner |
| gptkbp:relatedTo |
Zero Trust Network Access
Multi-factor authentication Micro-segmentation Least privilege principle Adaptive access control Continuous authentication Identity-centric security Security posture assessment |
| gptkbp:requires |
gptkb:government_agency
encryption authentication monitoring micro-segmentation |
| gptkbp:usedBy |
gptkb:government_agency
cloud service providers enterprises |
| gptkbp:bfsParent |
gptkb:Identity_and_Access_Management
gptkb:Zero_Trust_Security gptkb:SP_800-207 gptkb:Attribute-Based_Access_Control_(ABAC) gptkb:SASE_(Secure_Access_Service_Edge) |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Zero Trust Architecture
|