According to NIST, what are the key mechanisms for defining,
managing, and enforcing policies in a ZTA?
According to NIST, the key mechanisms for defining, managing, and enforcing policies in a ZTA are the policy decision point (PDP), the policy enforcement point (PEP), and the policy information point (PIP). The PDP is the component that evaluates the policies and the contextual data collected from various sources and generates an access decision. The PEP is the component that enforces the access decision on the resource. The PIP is the component that provides the contextual data to the PDP, such as the user identity, the device posture, the network location, the resource attributes, and the environmental factors.
Reference=
Zero Trust Architecture Project - NIST Computer Security Resource Center, slide 9
What Is Zero Trust Architecture (ZTA)? - F5, section ''Policy Engine''
Zero Trust Frameworks Architecture Guide - Cisco, page 4, section ''Policy Decision Point''
Rex
3 months agoLuis
3 months agoJames
3 months agoViva
4 months agoBea
4 months agoThurman
4 months agoLemuel
4 months agoStefany
4 months agoLynelle
5 months agoTheron
5 months agoMarquetta
5 months agoLashawnda
5 months agoCecily
5 months agoMelodie
5 months agoAlline
1 year agoBulah
1 year agoFranchesca
1 year agoGeorgene
1 year agoHelga
1 year agoLettie
1 year agoMargot
1 year agoLezlie
1 year agoJusta
1 year agoFloyd
1 year agoReed
1 year agoLorrie
1 year agoWava
1 year agoDelfina
1 year agoRaelene
1 year agoKeena
1 year agoRory
1 year agoSimona
1 year agoFelton
1 year agoGerri
1 year agoChery
1 year agoCharlene
1 year agoBette
1 year agoDouglass
1 year agoMarguerita
1 year agoQuentin
1 year agoMarkus
1 year agoLeontine
1 year agoKina
1 year agoLouisa
1 year agoCathrine
1 year agoPeggy
1 year agoCatina
1 year agoSerina
1 year agoLuisa
1 year ago