When preparing to implement ZTA, some changes may be required.
Which of the following components should the organization
consider as part of their checklist to ensure a successful
implementation?
Answer : B
Governance: This refers to the establishment of a clear vision, strategy, and roadmap for ZTA, as well as the definition of roles, responsibilities, and authorities for ZTA stakeholders. Governance also involves the alignment of ZTA with the organization's mission, goals, and objectives, and the communication and collaboration among ZTA teams and other business units.
Compliance: This refers to the adherence to the relevant laws, regulations, standards, and policies that apply to the organization's ZTA. Compliance also involves the identification and mitigation of any legal or contractual risks or issues that may arise from ZTA implementation, such as data privacy, security, and sovereignty.
Risk management: This refers to the assessment and management of the risks associated with ZTA implementation, such as technical, operational, financial, or reputational risks. Risk management also involves the development and implementation of risk mitigation strategies, controls, and metrics, as well as the monitoring and reporting of risk status and performance.
Operations: This refers to the execution and maintenance of the ZTA processes, technologies, and services, as well as the integration and interoperability of ZTA with the existing IT infrastructure and systems. Operations also involve the optimization and improvement of ZTA efficiency and effectiveness, as well as the resolution of any operational issues or incidents.
Reference=
Zero Trust Architecture: Governance
Zero Trust Architecture: Acquisition and Adoption
Which activity of the ZT implementation preparation phase ensures
the resiliency of the organization's operations in the event of
disruption?
Answer : B
Business continuity and disaster recovery are the activities of the ZT implementation preparation phase that ensure the resiliency of the organization's operations in the event of disruption. Business continuity refers to the process of maintaining or restoring the essential functions of the organization during and after a crisis, such as a natural disaster, a cyberattack, or a pandemic. Disaster recovery refers to the process of recovering the IT systems, data, and infrastructure that support the business continuity. ZT implementation requires planning and testing the business continuity and disaster recovery strategies and procedures, as well as aligning them with the ZT policies and controls.
Reference=
Zero Trust Planning - Cloud Security Alliance, section ''Monitor & Measure''
Zero Trust Implementation, section ''Outline Zero Trust Architecture (ZTA) implementation steps''
Scenario: An organization is conducting a gap analysis as a part of
its ZT planning. During which of the following steps will risk
appetite be defined?
Answer : D
During the define requirements step of ZT planning, the organization will define its risk appetite, which is the amount and type of risk that it is willing to accept in pursuit of its objectives. Risk appetite reflects the organization's risk culture, tolerance, and strategy, and guides the development of the ZT policies and controls. Risk appetite should be aligned with the business priorities and needs, and communicated clearly to the stakeholders.
Reference=
Certificate of Competence in Zero Trust (CCZT) prepkit, page 7, section 1.3
Risk Appetite Guidance Note - GOV.UK, section ''Introduction''
For ZTA, what should be used to validate the identity of an entity?
Answer : B
Multifactor authentication is a method of validating the identity of an entity by requiring two or more factors, such as something the entity knows (e.g., password, PIN), something the entity has (e.g., token, smart card), or something the entity is (e.g., biometric, behavioral). Multifactor authentication enhances the security of Zero Trust Architecture (ZTA) by reducing the risk of identity compromise and unauthorized access.
Of the following, which option is a prerequisite action to understand the organization's protect surface clearly?
Answer : A
Data and asset classification is a prerequisite action to understand the organization's protect surface clearly because it helps to identify the most critical and sensitive data and assets that need to be protected by Zero Trust principles. Data and asset classification also helps to define the appropriate policies and controls for different levels of data and asset sensitivity.
To ensure a successful ZT effort, it is important to
Answer : C
To ensure a successful ZT effort, it is important to engage stakeholders across the organization and at all levels, including functional areas. This helps to align the ZT vision and goals with the business priorities and needs, gain buy-in and support from the leadership and the users, and foster a culture of collaboration and trust. Engaging stakeholders also enables the identification and mapping of the critical assets, workflows, and dependencies, as well as the communication and feedback mechanisms for the ZT transformation.
Reference=
Certificate of Competence in Zero Trust (CCZT) prepkit, page 7, section 1.3
Zero Trust Planning - Cloud Security Alliance, section ''Scope, Priority, & Business Case''
In a ZTA, the logical combination of both the policy engine (PE) and
policy administrator (PA) is called
Answer : A
In a ZTA, the logical combination of both the policy engine (PE) and policy administrator (PA) is called the policy decision point (PDP). The PE is the component that evaluates the policies and the contextual data collected from various sources and generates an access decision. The PA is the component that establishes or terminates the communication between a subject and a resource based on the access decision. The PDP communicates with the policy enforcement point (PEP), which enforces the access decision on the resource.
Reference=
Certificate of Competence in Zero Trust (CCZT) prepkit, page 14, section 2.2.2
Zero Trust Architecture Project - NIST Computer Security Resource Center, slide 9
Zero Trust Frameworks Architecture Guide - Cisco, page 4, section ''Policy Decision Point''