Which element of ZT focuses on the governance rules that define
the "who, what, when, how, and why" aspects of accessing target
resources?
Policy is the element of ZT that focuses on the governance rules that define the ''who, what, when, how, and why'' aspects of accessing target resources. Policy is the core component of a ZTA that determines the access decisions and controls for each request based on various attributes and factors, such as user identity, device posture, network location, resource sensitivity, and environmental context. Policy is also the element that enables the ZT principles of ''never trust, always verify'' and ''scrutinize explicitly'' by enforcing granular, dynamic, and data-driven rules for each access request.
Reference=
Certificate of Competence in Zero Trust (CCZT) prepkit, page 14, section 2.2.2
What Is Zero Trust Architecture (ZTA)? - F5, section ''Policy Engine''
Zero Trust Architecture Project - NIST Computer Security Resource Center, slide 9
[Zero Trust Frameworks Architecture Guide - Cisco], page 4, section ''Policy Decision Point''
Nan
19 days agoMike
20 days agoMeaghan
21 days agoCarissa
24 days agoCyril
3 days agoViki
6 days agoReena
9 days agoColene
14 days agoJolanda
27 days agoMaybelle
30 days agoLorrine
3 days agoSon
14 days agoGlendora
1 months agoQuinn
1 months agoDallas
6 days agoCherry
9 days agoFlo
20 days agoGwenn
1 months agoJamal
6 days agoCorinne
7 days agoMargot
14 days agoGregoria
17 days agoBlossom
1 months agoPaola
2 months agoLaine
2 months ago