Skip to main content
CARTA - Continuous Adaptive Risk and Trust Assessment

Continuous Adaptive Risk and Trust Assessment

CYBERSECURITY DICTIONARY

CARTA - Continuous Adaptive Risk and Trust Assessment

According to Gartner, a CARTA mindset allows enterprises to make decisions based on risk and trust. Decisions must continuously adapt, security responses must continuously adapt, and thus Risk and Trust must continuously adapt.

Digital trust is a key element of security and allows a network to access everything and permit the access of a specific user. Security is a process that must be reviewed and adjusted based on new network attributes, users and policies. Machine Learning (ML) and Artificial Intelligence (AI) can help find threats that bypass any rules-based systems, by looking at traffic patterns, user, network, and asset behaviors and becoming more focused over time. Making decisions and security responses based on risk and trust and continuously adapting to the context and learnings gained from each interaction forces organizations to use a continuously adaptive approach to security because in a rapidly changing digital world, black or white decisions (allow or block) are no longer adequate. Enterprises must decide how and when to enable transactions when not all data is available, or there is a known level of risk. Simplistic block/allow security assessments for access and protection leave organizations exposed to targeted and zero-day attacks, credential theft, and insider threats. Digital trust must be adaptively managed as a set of focused measures of confidence with multidimensional risk and response attributes.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

RELATED ASSETS

March 06, 2019

Artificial Intelligence and Implications for Cybersecurity

The Optiv Security thought leadership paper, Artificial Intelligence and Implications for Cybersecurity, introduces different ways to think about Arti...

See Details

August 01, 2016

Security Strategy Assessment

Learn how we deliver the tools to build successful security programs that are business-aligned and threat aware.

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.