Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:security
|
gptkbp:adoptedBy |
gptkb:Google
gptkb:Microsoft gptkb:U.S._federal_government |
gptkbp:alsoKnownAs |
zero trust security
|
gptkbp:appliesTo |
network security
access control identity management |
gptkbp:category |
cybersecurity
information security |
gptkbp:contrastsWith |
perimeter-based security
|
gptkbp:documentation |
gptkb:NIST_SP_800-207
|
gptkbp:emphasizes |
data protection
user verification application verification device verification |
gptkbp:focusesOn |
continuous verification
eliminating implicit trust |
gptkbp:goal |
improve security posture
limit lateral movement reduce risk of data breaches |
https://www.w3.org/2000/01/rdf-schema#label |
zero trust
|
gptkbp:influenced |
gptkb:DevSecOps
cloud security endpoint security network segmentation identity and access management (IAM) modern cybersecurity strategies |
gptkbp:originatedIn |
gptkb:Forrester_Research
gptkb:John_Kindervag 2010 |
gptkbp:platform |
assume breach
monitor continuously segment networks use least privilege access verify explicitly |
gptkbp:principle |
never trust, always verify
|
gptkbp:relatedTo |
gptkb:NIST_SP_800-207
Zero Trust Architecture (ZTA) |
gptkbp:requires |
continuous monitoring
micro-segmentation strong authentication least privilege access |
gptkbp:standardizedBy |
gptkb:NIST
|
gptkbp:usedIn |
cloud computing
enterprise IT remote work environments |
gptkbp:bfsParent |
gptkb:Private_Cloud_Compute
|
gptkbp:bfsLayer |
6
|