According to NIST, what are the key mechanisms for defining,
managing, and enforcing policies in a ZTA?
According to NIST, the key mechanisms for defining, managing, and enforcing policies in a ZTA are the policy decision point (PDP), the policy enforcement point (PEP), and the policy information point (PIP). The PDP is the component that evaluates the policies and the contextual data collected from various sources and generates an access decision. The PEP is the component that enforces the access decision on the resource. The PIP is the component that provides the contextual data to the PDP, such as the user identity, the device posture, the network location, the resource attributes, and the environmental factors.
Reference=
Zero Trust Architecture Project - NIST Computer Security Resource Center, slide 9
What Is Zero Trust Architecture (ZTA)? - F5, section ''Policy Engine''
Zero Trust Frameworks Architecture Guide - Cisco, page 4, section ''Policy Decision Point''
Alline
24 days agoFranchesca
5 days agoGeorgene
6 days agoHelga
14 days agoLettie
26 days agoMargot
1 months agoLezlie
1 months agoLorrie
1 months agoWava
1 months agoDelfina
8 days agoRaelene
15 days agoKeena
17 days agoRory
2 months agoSimona
Felton
2 days agoGerri
6 days agoChery
7 days agoCharlene
2 months agoBette
26 days agoDouglass
29 days agoMarguerita
1 months agoQuentin
2 months agoMarkus
2 months agoLeontine
25 days agoKina
26 days agoLouisa
28 days agoCathrine
1 months agoPeggy
1 months agoCatina
1 months agoSerina
2 months agoLuisa
2 months ago