Elements of zero trust architecture are

Assignment Help Management Information Sys
Reference no: EM133540486

Assignment:

In a Microsoft Word document.

The Word document must have a title page at the beginning, your answer to the scenario & a reference page at the end.

You are the security analyst for company ABC. Your company has a data center with several services (file, database, and application services) on site and use of Azure for other services (email, web portal, Azure DB and Azure AD). Your supervisor has tasked you with finding out what Zero Trust is (specifically what the 7 elements are) and what technology you would recommend (zScaler, etc.).

1. Explain in business terms what the 7 elements of Zero Trust Architecture (ZTA) are. View the YouTube video below for more information:

What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained

2. Determine how the company can implement ZTA using zScaler or another product. Review the video below for more information:

The Zscaler Tech Sessions: Seven Elements of Zero Trust

3. Would your solution provide Zero Trust? What other solutions would you need?

Reference no: EM133540486

Questions Cloud

Discuss enterprise resource planning : A local book store is adopting a ERP (enterprise resource planning) system to better manage various aspects of a business, including inventory, track sales.
Problem based on business need in your practicum setting : Based on the identified business need in your practicum setting, develop two or three goals. Ensure they are written using SMART: Specific, Measurable.
What are the primary duties of the speaker of the house : What are the primary duties of the Speaker of the House? What are your thoughts on McCarthy being removed?
Importance of system security : You are expected to provide a brief about the importance of system security and its implications in the 21st century for the above scenario.
Elements of zero trust architecture are : Determine how the company can implement ZTA using zScaler or another product.
Why are people demonstrating in birmingham : Consequences: Why are people demonstrating in Birmingham? What are some of the consequences they may face as protesters?
How industrial development impacted the way people worked : How industrial development impacted the way people worked and lived. The ways immigration altered the national population and shaped politics.
Examples of unnecessary ports being open : Perform a vulnerability scan and list some examples of unnecessary ports being open. Do you have a code that needs to be patched up?
Identify one historic fact that you were unaware of : Identify one historic fact that you were unaware of. Discuss the impact of this event and explain how it relates to the United States today.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain how you would implement each of the three plans

Describe a minimum of three types of police plans (such as a reactive plan) which could be utilized in the above scenario. Explain how you would implement each of the three plans. Justify your reasoning.

  Define the term stickiness as used in electronic commerce

Define the term "stickiness" as used in electronic commerce. In one or two paragraphs, explain why it is important for advertising-supported Web sites to have this characteristic.

  Determine and list your entities

Determine and list your entities. Then create relationship sentence pairs between those entities that are related.

  Advantages of having touch screen devices in the workplace

Touch screens are becoming extremely popular input devices for phones and tablets. Assess the value of touch screen devices related to human-computer interaction systems. Identify at least four advantages and four disadvantages of having touch scr..

  Create a one-day training course

Create a one-day training course that highlights the important elements of what you have just learned within the past ten (10) weeks.

  Relationship of value and cost according to the porter model

Explain the relationship of value and cost according to the Porter model. When does it make sense to add cost to a business process

  Do you use a different method to determine trustworthiness

Do you use a different method to determine trustworthiness when you walk into a store and need to use a credit card for a purchase?

  Discuss the areas of vulnerability

Write a 2-3 page paper discussing the areas of vulnerability that were exploited and what security principles failed.

  Explain the ways in which software can be supported

Describe the methods whereby training materials can be delivered to the users of the software system. Explain the ways in which software can be supported after it is implemented/released.

  Describe the key components of a data communication system

Describe the key components of a data communication system and Next, discuss the overall manner in which a company uses data communication in order to reduce its operations cost

  Identify emergency situations that may occur

Identify emergency situations that may occur during a recovery.

  What is your understanding of entity integrity

What is your understanding of Entity Integrity Vs Referential Integrity. Illustrated with simple examples for ease of understanding of the concepts. From your reading of the lecture, describe various types of keys (Primary, Foreign, Superkeyetc) w..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd