Zero Trust Architecture Types - Global
ZT.08 Application Access Broker
Zero Trust Architecture classification code ZT.08 covers "Application Access Broker" at level 2 of the Zero Trust Architecture hierarchy.
Level 2
Is your business really a ZT.08?Classify itWhere ZT.08 sits in the Zero Trust Architecture hierarchy
- >ZT Zero Trust Architecture Types
- >>ZT.08 Application Access Broker
- >>ZT.08 Application Access Broker
Other Zero Trust Architecture codes under ZT.08 Application Access Broker
- ZT.01Identity-Centric Security
- ZT.02Micro-Segmentation
- ZT.03Software-Defined Perimeter
- ZT.04Continuous Verification
- ZT.05Least Privilege Access
- ZT.06Device Trust Evaluation
- ZT.07Network Access Control
- ZT.09Data-Centric Security
- ZT.10Conditional Access Policy
- ZT.11Session Trust Scoring
- ZT.12Zero Trust Network Access (ZTNA)
- ZT.13Policy Engine
- ZT.14Policy Decision Point
- ZT.15Policy Enforcement Point
Frequently asked questions
- What is Zero Trust Architecture ZT.08?
- Zero Trust Architecture ZT.08 is "Application Access Broker". Zero Trust Architecture code ZT.08 covers "Application Access Broker" at level 2 of the Zero Trust Architecture hierarchy.
- What is the parent category of ZT.08?
- ZT.08 Application Access Broker sits under ZT.08 Application Access Broker in the Zero Trust Architecture hierarchy.
Classify my business
Describe your business in plain English and get matching codes across Zero Trust Architecture and other major systems.
Interactive browser
Open ZT.08 in the full interactive explorer with tree view, search, and drill-downs.