Zero Trust Architecture

Zero Trust Architecture
Trust nothing; verify everything.

Logical components of Zero Trust Architecture

  1. 1

    Continuous Diagnostics and Mitigation (CDM)

  2. 2

    Threat intelligence feed(s)

  3. 3

    Network and system activity logs

  4. 4

    Security Information and Event Management (SIEM)

  • Continuous Diagnostics and Mitigation (CDM)
    PLURA‑EDR & WAF
    Collect all OS‑level information
    Event logs via audit policies
    Collect web header and body logs
    Verify that OS patches are current and
    whether intrusion has reached internal assets — real‑time diagnostics and response
  • Threat Intelligence Feed (TI)
    PLURA‑SIEM
    CTAS intelligence from KISA
    Intelligence on attacker indicators aggregated from the PLURA SECaaS XDR platform


  • Network and System Activity Logs
    PLURA‑WAF & Datos & EDR
    Web packets (including bodies)
    Host resource usage (CPU, Memory, Network Traffic, etc.)
    Real‑time monitoring of security posture via audit policies
    Real‑time activity logging of attacker behavior
  • Security Information and Event Management (SIEM)
    PLURA‑SIEM
    Collect logs from network and security devices
    Collect server and PC logs
    Collect web and application logs
    Detect anomalies via unified correlation and
    detect APT attacks based on MITRE ATT&CK
    Provide proactive response to cyberattacks