According to NIST, what are the key mechanisms for defining,
managing, and enforcing policies in a ZTA?
According to NIST, the key mechanisms for defining, managing, and enforcing policies in a ZTA are the policy decision point (PDP), the policy enforcement point (PEP), and the policy information point (PIP). The PDP is the component that evaluates the policies and the contextual data collected from various sources and generates an access decision. The PEP is the component that enforces the access decision on the resource. The PIP is the component that provides the contextual data to the PDP, such as the user identity, the device posture, the network location, the resource attributes, and the environmental factors.
Reference=
Zero Trust Architecture Project - NIST Computer Security Resource Center, slide 9
What Is Zero Trust Architecture (ZTA)? - F5, section ''Policy Engine''
Zero Trust Frameworks Architecture Guide - Cisco, page 4, section ''Policy Decision Point''
Alline
2 months agoBulah
12 days agoFranchesca
1 months agoGeorgene
1 months agoHelga
1 months agoLettie
2 months agoMargot
2 months agoLezlie
2 months agoJusta
20 days agoFloyd
21 days agoReed
25 days agoLorrie
2 months agoWava
2 months agoDelfina
1 months agoRaelene
1 months agoKeena
1 months agoRory
2 months agoSimona
26 days agoFelton
28 days agoGerri
1 months agoChery
1 months agoCharlene
3 months agoBette
2 months agoDouglass
2 months agoMarguerita
2 months agoQuentin
3 months agoMarkus
3 months agoLeontine
2 months agoKina
2 months agoLouisa
2 months agoCathrine
2 months agoPeggy
2 months agoCatina
2 months agoSerina
3 months agoLuisa
3 months ago