gptkbp:instanceOf
|
gptkb:security
|
gptkbp:adoptedBy
|
gptkb:Google
gptkb:Microsoft
gptkb:U.S._federal_government
|
gptkbp:alsoKnownAs
|
gptkb:Zero_Trust_Architecture
|
gptkbp:appliesTo
|
data
users
networks
applications
devices
|
gptkbp:contrastsWith
|
perimeter-based security
|
gptkbp:firstReleased
|
2010
|
gptkbp:focusesOn
|
least privilege access
continuous verification
eliminating implicit trust
|
gptkbp:goal
|
reduce attack surface
improve compliance
protect sensitive data
increase visibility
limit lateral movement
|
https://www.w3.org/2000/01/rdf-schema#label
|
Zero Trust Security
|
gptkbp:implementedIn
|
gptkb:security_information_and_event_management_(SIEM)
gptkb:endpoint_detection_and_response_(EDR)
gptkb:network_access_control_(NAC)
gptkb:privileged_access_management_(PAM)
identity providers
zero trust network access (ZTNA)
micro-segmentation tools
software-defined perimeters
|
gptkbp:originatedIn
|
gptkb:Forrester_Research
gptkb:John_Kindervag
|
gptkbp:principle
|
never trust, always verify
|
gptkbp:recommendation
|
gptkb:NIST
gptkb:CISA
gptkb:Gartner
|
gptkbp:relatedTo
|
cybersecurity
data protection
identity and access management
cloud security
multi-factor authentication
endpoint security
network segmentation
|
gptkbp:requires
|
gptkb:government_agency
authentication
continuous monitoring
least privilege
micro-segmentation
|
gptkbp:standardizedBy
|
gptkb:NIST_SP_800-207
|
gptkbp:bfsParent
|
gptkb:Cisco_Catalyst_9000
|
gptkbp:bfsLayer
|
6
|