sentenz / convention

General articles, conventions, and guides.
https://sentenz.github.io/convention/
Apache License 2.0
4 stars 2 forks source link

Create an article about `Zero Trust Architecture` #283

Open sentenz opened 1 year ago

sentenz commented 1 year ago

Zero Trust Architecture

A Zero Trust Architecture (ZTA) uses Zero Trust principles to design industry and enterprise infrastructure and workflows. Zero Trust assumes that no implicit trust is granted to assets or user accounts solely because of their physical location or network (e.g., local area networks vs. the Internet) or because of asset (corporate or personal) ownership.

TODO Zero Trust

1. Category

1.1. De-Perimeterization

De-perimeterization addresses decoupling of trust from location. Users operate from a variety of locations and endpoints, accessing resources from one or more operational environments, including cloud and Software-as-a-Service (SaaS) solutions, often not owned or controlled by the enterprise IT organization.

1.2. Least Privilege

Least privilege refers to the practice of restricting access to only those resources absolutely necessary i.e. the least privileges necessary for an activity. Each request for access to a resource needs to be dynamically validated using identity management and risk-based, context-aware access controls.

1.2.1. Privileged Access Management (PAM)

2. References