In a Zero Trust Model, how do the Control Plane and Data Plane components interact to ensure secure access to resources?
The Control Plane and Data Plane operate independently, with the Control Plane focusing on identity management and the Data Plane handling threat scope reduction.
The Data Plane evaluates access requests against security policies, and the Control Plane enforces the access decisions made by the Data Plane.
The Control Plane and Data Plane work together to establish trust boundaries, but do not directly interact in the policy-driven access control process.
The Control Plane evaluates access requests against security policies, and the Data Plane enforces the access decisions made by the Control Plane.