Skip to content

mjarah/Lab-6-Zero-Trust

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Lab 6: Zero Trust Architecture (ZTA) Policy Profile

Project Overview

This project demonstrates the core principles of Zero Trust Architecture (ZTA) applied to a Critical Infrastructure (CI) scenario. As a Security Architect for the Golden State Water Treatment Facility, I designed a policy profile to protect sensitive Human Resources PII data.

Key Learning Objectives

  • Component Definition: Defining the roles of the Policy Engine (PE), Policy Administrator (PA), and Policy Enforcement Point (PEP).
  • Verify Explicitly: Applying the core ZT principle that requires continuous verification of every access request, regardless of network location.
  • Signal Evaluation: Creating a policy table that uses Identity, Device Posture, and Network Context as signals for the Policy Engine.

Files in this Lab

  • ZT-Policy-Profile.md: The complete policy documentation and definitions.
  • proof.png: Screenshot verification of the local development environment.

About

Zero Trust Architecture (ZTA) policy profile and security signal analysis for the Golden State Water Treatment Facility.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors