Logo Zero-Trust Architect-Design (ZTAD) Report Card

Zero-Trust Architect-Design (ZTAD) Report Card
Introduction:
Our view Zero-Trust concept is to treat every item running on the network as:

         "Guilty until proven innocent"

Long Integer = 19 digits:

         9,223,372,036,854,775,807
         A long integer has a minimum value of -9,223,372,036,854,775,808
         A maximum value of 9,223,372,036,854,775,807 (stored as 64 bits).


Unsigned Long = 20 digits:
         The maximum value of an unsigned long is 18,446,744,073,709,551,615
         This is because an unsigned long is a 64-bit integer with a minimum value of 0


What is a report card?
The purpose of the report card is one component of the larger communication plan between parents and the school. The purpose is to regularly communicate how a student is progressing and where the student is performing in relation to expected targets, he/she should meet at the end of each reporting period.

Our Zero-Trust Architect-Design (ZTAD) Report Card is architected-designed into two parts:

ID = Long integer (signed or unsigned):
Long Integer number which represents a record of information. Our Report Card ID is a record of information such ID, indexes, hash indexes, quick lookup number, ... etc.

Matrix of Records:
The matrix of records is a 2-dimension array with data which would be used to process, parse, evaluate, analyze, grade a network item.

The following are what we as team needs to brainstorm how can we translate the following characters or properties into a useful traceable information to be used by Machine Learning, management, security staff, detection, access privileges, administrators, ... etc.

         1. ID
         2. Logical - Physical
         3. Local-Remote
         4. Who
         5. What
         6. Known
         7. Unknown
         8. Ownership
         9. Risk index
         10. Verification Index or number
         11. Category: users, clients, vendors, workers, staff, ... etc.
         12. Policies
         13. Processes
         14. Procedures
         15. Expiration date
         16. Access privileges
         17. Window of time
         18. Content
         19. Output
         20. Destination
         21. Exception
         22. Misc


Every item running on the network must have its ZTAD Report Card ID (Long integer - signed or unsigned) with it in order to be trustworthy to the system. Such an ID has an expiration date.