Report on Zero Trust Architecture PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This report details Zero Trust Architecture, a security framework that changes the paradigm of network security. It focuses on never trusting any device or user and continuous verification for accessing resources. It emphasizes data protection and access control. The report elaborates on multiple aspects of Zero Trust, discussing its architecture, components, and principles.
Full Transcript
SubfetItoduton to Cyben Seuntty Subjet Code i- BETCK205I Taptc& Zno Tat Archttete Subuttedl Tó Submitted byi MY TRnanl. Stlharch. Umesh 1st Sen. Bsec B58. ...
SubfetItoduton to Cyben Seuntty Subjet Code i- BETCK205I Taptc& Zno Tat Archttete Subuttedl Tó Submitted byi MY TRnanl. Stlharch. Umesh 1st Sen. Bsec B58. akaa Key Conclatan and (0. ases. Use and Seanasta Trust o Wbrd Real -06 D5 mets. Faviron Cloud Tust n Zu Proteton. 5 Tnplt Tnplauy O6 AAcssManemed. O3-0 05. Trust. Zus Conponents O4 Foaples Trust. Zeus 2 Ol-02 Ayhtectuse. Irust Zn what s O2. Archotectusei Zn-Trust Ya:No CONTENTS SR.No. INDEX& ZsTust Avitectwe (ZTA) Sowes as a peruln- wAs SecushRty achrtetne whek fundaudhly shfts the hodel. Tt ts based on the paniple neve deste and all attty nionttorl. T otnuouay looks fer Padtcatous bresche andl profecte asse haoyh reut usu athntaboa anel authort |What s ZonoThest Ahetectuse. ZuTYust Arhetetwe es a Metodolot as a whoe. Instead of asst that svuytag nside a netok ts duatwovty andl assumes hat no wse,devce or netwok onneeton Can be fapletty truste Evey veseat or acas to Heaoes, eganallss ts Voefatron ond atotabo before beiy grantd accesS. No laplst TrustiZus truat operata on he putnple of'neven trust , always Vuify'; meantng that wey Aesowce access vy oSuinzo Kesst Prleye Aeeeas:- Utes anol devtes pofora thes backes. wss , dlotes and Assume BAench '- Zo Tuat Arehtetuse es based on Ihe honta thet ase the can be Pasde anol oulsle an oygautsa ltoui netwok puitn buit upon a set fundamal prnples thet ftele ts tuplamaton uss.Thse dhet hene fs a and sene nooel aceu contol and faforne Bo say: espust toy acess lo uouus, Sote Veifiel and authentratl bifore e%, rantol ace acess.This prtaple enswes ht only acesso kens?tv |cata a l acess V&us and olwtus shoud be puyf thur mintneLhe ind osks.¬Ths pna ple helps breaches acess Conrt-AwaneAsssTrust consos vasous contertual fatos, Such aslhe csens loatron,devtu, acuss lvels.This ptn uple heles o wnden appropktet crumsances. 02 Koy CBponea of Zo Thut Zos Thust& nat a but ahn a coaphehuusve Seuwy rmeJBk that coussts voy tniportnt aspet g zuo Tust, gtnc tt comes kudy handy Epnb to wtablih an what lael acceAs hey have t hesohus. It avolus peisstoh authest Netwok Sestty Zre Tust aeslutres a ro bust netO8Yk a y appack do protut the pategy tue oealls , tnlostor deletrou systes and network Semanhton to prevent wnathoizad acess. repires dada loss preventon encypton melha and aceas cotbol mahant hnolga, acess Sensrttue oata. o Sas lo6 preend wnathowzad Qcuss Lo resoutees. bas that Ts ensues that Gnly authortaad frtdals and dous ase aLess to SenstAve oata and pleatons. Wulle- faclan uthentaton MFA pra vtoles a exta dhe wens o prourde nultple fony d authetaton, suh os as pass word , one-tme cod or Thss helas lo pevant wnadhoriad aceess breetdc SCan. This even tf a passord s compro nisedl. O3 Stttie systemes and ata by anagthy and audbta t acttes wsers, &uch a admtts tratos. Tt Aelps to prevendwnauthowzd acceus and mesuse prgy aciounts. adhen tale once and gle Spn- On>Sso alous cuces oneeoltag whout ltple appltatos applater.s oo e-ento acss stmplfes he thes crelentals eack opplatn. for eack Lanplemedig Zono Tust iNeuork SenthTa ZonTust ntroent, netuok &esPty beomes a as the traoltronal pontn- baseol opproach wth a ore grarubr , cbtxt an pproach. potet the tatet he netwoyk and ts usonea. Bygntaou't nulwok and ouade world, blodeaat nadhovsd ass to prtenl AesOhes. Luson Deteton Systen's(IDS):- Ah TDS non? tovs netvotk ate for Susprtoue acHes and adnn's tralos to Ruteventrou and Netwsk Sgmenlatom It obnds the nitok inlo Snalen, Qccess and solaidl sgnent , loty hesoes boeaches. phevent nauthsWsed Qcus, dat brehes and oota loss. Dad Cncsplou Da os Preventon CDLp) It peenta Snstttve at ron anutny he oyyontsa as netsok wthhoud popen Quthozaton. D souttons montor lata os and Can blok D alt adwatie tatos in Cae suptefous acotes. Acess Contals euts acceus lo spelfte cat bad on wsen ols and pytlys that ony authatsd ndvtdala Can ns snstA Senseve nformoton he tsk cwnathoAzed access. doud ayntfantl changad Zhe wy oyyantatros Prvolve esouen and data t tthvd p t pro vils. shog CodAeass ContolTnplnt tnsng palea cloud gesoures thet wtt a pemiaston Can wse a cean cloud sevie or daa. Cloud Sewty Festue Manpemens|t It contnuoay ontto Loud envhonmes , tdenttf vulheab? iks. Covd Data Enugela Erpt data at rut and bat pholet fon wnauthorzedl aceas , Ven he cloul potder comprontsed. 05 Cloud Notaugyk Stgedron Dnde cloud asosfnl Bly brlaches. Realwoyld Zeo Tuut Searastos and Use Cases adaptedt se caes. Th e to ite acoacs Valous Brdusties and ab UUy o oddn the chalhugs odann seuwtty Such as renote ntvennets,Such wovk, loud compy and Aobile olavts potcay toud apps, Gnail and docmanta. Mnasts zes odpotat bst ndel tneludea: Tdnty vetfuaton, tuofato athelratton fon fenal accias, e vetfathon, Accass veraton Soue vefatrou. profeta corporat relouHs Moble aute SeuwsyiZos TrestConpronsd nmobrle deutus, om acces by wnalhortzl aen senstve enssng Zhat onby autlhozad leutes can oata. Alataz Tsard BtsoniThe prson was les'gned wtta wsthze hat o One cod be husteol. ind, assumty Vistos and had o Jeet cheekpotats and proudunes do acans the pso't Wblnt:- Walmard shdytny wgys fo taretton o a b- bust plan and o oleh paswods allgether. It Okta 's tdentty and Qcess ther cloud and Sn-pre enivonmenta. applateon basd archtetse, shiet data acss protools, eost -pMlaged alcess and conthollay nsanctoned opps fa The Wannaly Aanseehe llack n 20|7 20| afeted the NHS Compuitas fn Wnted Kiygdom. 06 ZosTat Avkrteca not just a seuty eysantsaons approah secustt ta wrld the oYe anl leaus prlage acuss, zus Tust provds vebost ad adapable seayfamesovk hat etvly protet ogantstro fon modon seunty Ne Tuplt Trust ZTA linales the aswmptor Prherant trust Rn ser,, dewte or nitwole connetory vestny contruous vetaton and athortzatron lo ppoack conmbning vatous thnolgiea and contoa lo protet Sens?tve dada ad applutrons at nlte potnl. Aaptabl and Sa lable i- TA s adaptable Araks and teknolaes , allotg rgansatos o as thetr needs