You are viewing an old version of this page. View the current version.
Compare with Current View Page History
« Previous Version 3 Current »
Contexts
Computer Science, IAM
Term
Zero-Trust Access
Version
1.1
Definitions
A cloud-based VPN solution that attempts to address two issues of traditional VPNs:
The additional network hop created by VPN concentrators located in data-centers to access cloud-based services, causing latency.
The increased attack surface created by the same VPN concentrators.
ZTA resides in the cloud, and access is only granted to the application the user needs.
Two flavors of ZTA are:
Identity-Aware Proxy (Dictionary Entry)
Software-Defined Perimeter (Dictionary Entry)
Sources
Turner, 2020
See Also
Identity-Aware Proxy (Dictionary Entry) Specialized Term
Specialized Term
Software-Defined Perimeter (Dictionary Entry) Specialized Term
Virtual Private Network (Dictionary Entry) Related Term
Related Term
ZTA (Dictionary Entry) Acronym
Acronym