A comprehensive catalogue of all transactions, dependencies, and services with associated IDs is a potential outcome of an effective ZT implementation because it helps to map the data flows and interactions among the assets and entities in the ZTA. This catalogue enables the ZTA to enforce granular and dynamic policies based on the context and attributes of the transactions, dependencies, and services. It also facilitates the monitoring and auditing of the ZTA activities and performance.
References = Certificate of Competence in Zero Trust (CCZT) - Cloud Security Alliance, Zero Trust Training (ZTT) - Module 3: ZTA Architecture and Components
Question # 18
In SaaS and PaaS, which access control method will ZT help define
ABAC is an access control method that uses attributes of the requester, the resource, the environment, and the action to evaluate and enforce policies. ABAC allows for fine-grained and dynamic access control based on the context of the request, rather than predefined roles or privileges. ABAC is suitable for SaaS and PaaS, where the features within a service may vary depending on the customer’s needs, preferences, and subscription level. ABAC can help implement ZT by enforcing the principle of least privilege and verifying every request based on multiple factors.
References =
Attribute-Based Access Control (ABAC) Definition
General Access Control Guidance for Cloud Systems
A Guide to Secure SaaS Access Control Within an Organization