Statements (49)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security
|
| gptkbp:adoptedBy |
gptkb:Google
gptkb:Microsoft gptkb:U.S._federal_government |
| gptkbp:alsoKnownAs |
zero trust security
|
| gptkbp:appliesTo |
network security
access control identity management |
| gptkbp:category |
cybersecurity
information security |
| gptkbp:contrastsWith |
perimeter-based security
|
| gptkbp:documentation |
gptkb:NIST_SP_800-207
|
| gptkbp:emphasizes |
data protection
user verification application verification device verification |
| gptkbp:focusesOn |
continuous verification
eliminating implicit trust |
| gptkbp:goal |
improve security posture
limit lateral movement reduce risk of data breaches |
| gptkbp:influenced |
gptkb:DevSecOps
cloud security endpoint security network segmentation identity and access management (IAM) modern cybersecurity strategies |
| gptkbp:originatedIn |
gptkb:Forrester_Research
gptkb:John_Kindervag 2010 |
| gptkbp:platform |
assume breach
monitor continuously segment networks use least privilege access verify explicitly |
| gptkbp:principle |
never trust, always verify
|
| gptkbp:relatedTo |
gptkb:NIST_SP_800-207
Zero Trust Architecture (ZTA) |
| gptkbp:requires |
continuous monitoring
micro-segmentation strong authentication least privilege access |
| gptkbp:standardizedBy |
gptkb:NIST
|
| gptkbp:usedIn |
cloud computing
enterprise IT remote work environments |
| gptkbp:bfsParent |
gptkb:Private_Cloud_Compute
|
| gptkbp:bfsLayer |
9
|
| https://www.w3.org/2000/01/rdf-schema#label |
zero trust
|