Zero-Trust Access

Contexts

Computer Science, IAM

Term

Zero-Trust Access

Version

1.1

Definitions

A cloud-based VPN solution that attempts to address two issues of traditional VPNs:

  • The additional network hop created by VPN concentrators located in data-centers to access cloud-based services, causing latency.

  • The increased attack surface created by the same VPN concentrators.

ZTA resides in the cloud, and access is only granted to the application the user needs.

Two flavors of ZTA are:

Sources

See Also


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.