Access Controls Concepts Flashcards

CC Domain 3 Access Controls Concepts

1
Q

zero trust

A

means access to a computing, network, or data resource will not be given to any person or subject unless that access is explicitly
authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Least Privilege

A

concept that a user should only have access to the resources that they need in order to do their job but no more than that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Segregation of Duties

A

internal control that organizations use to prevent fraud or the
likelihood of errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two-Person Rule

A

requires certain functions to be performed by two authorized users or employees working in tandem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

subject

A

entity that is capable of accessing an object, usually by first requesting such access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

object

A

entity, or resource, that is accessed by a subject. (files, folders, apps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access

A

right that is granted to the subject to perform a function
with the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identification

A

act of the subject providing identifying information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication

A

method by which systems verify that a user really is who they claim
to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Centralized

A

where one department or entity is responsible for governing, managing, and configuring tools for access administration. For example, in a centralized model the IT department would manage access control for all resources (e.g., physical and all information systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decentralized

A

access administration is managed by different departments or people for different systems throughout the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hybrid

A

utilizes a combination of centralized and decentralized access control. For example, the IT department may manage access control for critical resources such as Active Directory (centralized administration), while systems belonging to individual departments, such as the sales team customer relationship management (CRM), may be managed by individual departments (decentralized administration).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provisioning

A

creation and maintenance of user accounts as well as maintaining the correct access rights for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Review

A

Accounts are regularly reviewed and monitored to ensure that
there is still a need for access over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Revocation

A

After an employee has separated from the organization or when the employee no longer has a need for an account or access to a
system, their access(es) is/are revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privileged Access Management

A

type of access management that focuses on managing privileged accounts, usually using dedicated PAM systems and solutions.

17
Q

Discretionary Access Control (DAC)

A

provides the owner of the resource, typically the creator, full control
to configure which subjects (e.g., users, groups) can access the object (e.g., file, folder) permissions given on the admin or object owners discretion

18
Q

Mandatory access control (MAC)

A

leverages a central authority, typically a security administrator, that
regulates access based on security labels, such as the clearance level that a subject (user) has been approved for, as well as the
classification of the object (file, database, etc.). uses tags to label both subject and objects(secret, confidential and unclassified

19
Q

Role-based access control (RBAC)

A

enforces access based on roles that define permissions and the level
of access provided to any subjects assigned to that role

20
Q

Rule based Access Control(RAC)

A

a framework that restricts access to devices, databases, and locations based on a set of predetermined permissions and rules. TIME OF DAY RESTRICTION

21
Q

Directories

A

stores information about users, resources, and access permissions and allows administrators to centrally configure rules to control who gets access to what in the organization’s systems and network.

22
Q

Single sign-on

A

technology that allows users to seamlessly access a range of resources after authenticating just one time.

23
Q

Federated identity management (FIM)

A

variant of single sign-on that allows organizations to establish arrangements to utilize the same identification and authentication information to authenticate users across multiple different organizations.

24
Q

Physical access controls

A

type of physical security control that regulates and
monitors access to physical resources (such as a datacenter facility)