Zero Trust Architecture

GPTKB entity

Statements (52)
Predicate Object
gptkbp:instanceOf gptkb:security
gptkbp:adoptedBy gptkb:NIST
gptkbp:alsoKnownAs gptkb:Zero_Trust
gptkbp:appliesTo data protection
network security
cloud security
identity management
endpoint security
gptkbp:component security analytics
identity and access management
data security
application security
continuous monitoring
network segmentation
policy enforcement
device security
gptkbp:contrastsWith perimeter-based security
gptkbp:documentedIn gptkb:NIST_SP_800-207
gptkbp:focusesOn least privilege access
continuous verification
eliminating implicit trust
gptkbp:goal reduce attack surface
limit lateral movement
improve breach containment
https://www.w3.org/2000/01/rdf-schema#label Zero Trust Architecture
gptkbp:introduced gptkb:Forrester_Research
gptkbp:introducedIn 2010
gptkbp:originatedIn gptkb:John_Kindervag
gptkbp:principle never trust, always verify
gptkbp:recommendation gptkb:Google
gptkb:Microsoft
gptkb:CISA
gptkb:Gartner
gptkbp:relatedTo Zero Trust Network Access
Multi-factor authentication
Micro-segmentation
Least privilege principle
Adaptive access control
Continuous authentication
Identity-centric security
Security posture assessment
gptkbp:requires gptkb:government_agency
encryption
authentication
monitoring
micro-segmentation
gptkbp:usedBy gptkb:government_agency
cloud service providers
enterprises
gptkbp:bfsParent gptkb:Identity_and_Access_Management
gptkb:SP_800-207
gptkbp:bfsLayer 6