4: 4 Account Management Flashcards

(26 cards)

1
Q

Accounts Management

A

Implement least privilege, separation of duty,, job rotation, and account lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Principle of least privilege

A

Minimum necessary permissions to perform duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Separation of Duties

A

Sensitive functions should require action by two separate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Job Rotation

A

Regularly move people between jobs to prevent fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mandatory Vacation

A

Enforce periods of time when employee has no access to system, to ensure some frauds can come to light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Account Management Lifecycle

A

Provisioning new user access + entitlements, modifying entitlements when needed, reviewing access when needed, removing access, and deprovisioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Account

A

Standard permissions and standard monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privileged accounts

A

Have administrative rights, require strong controls including logging every action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Guest accounts

A

Has limited permissions and temporary lifetimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shared accounts

A

Reduces accountability, should not be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Service Accounts

A

Provides access for internal server process, password shouldn’t be known by anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GPO

A

Group Policy Object - applies configuration settings to users and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password policy

A

Using requirements to ensure passwords are resistant to attacks - length requirements, different character types, password history/reuse requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lockout Policy

A

Locks out accounts after a number of incorrect login accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password recovery methods

A

Allows users to reset passwords on self-service basis, to alleviate burden on help-desks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Inaccurate Permissions

A

Block work capabilities or violates least privilege

17
Q

How do you protect against inaccurate permissions?

A

User Account Audit - pull list of permissions and review with managers, then make necessary adjustments

18
Q

How do you protect against unauthorized use?

A

Use continuous account monitoring systems that watch for suspicious activities (impossible travel time logins, unusual network location logins, deviations in behavior/amount of data sent)

19
Q

Geotagging

A

Tags logs with user location

20
Q

Geofencing

A

Alerts administrators to devices leaving defined boundaries

21
Q

Password Vaulting

A

Stores administrative passwords, so nobody knows the actual passwords of the privileged account

22
Q

Command Proxying

A

Eliminates the need for direct server access by sending commands that are validated for authority

23
Q

Emergency Access Workflow

A

When a user needing to bypass the privileged account manager, requiring approval, logging access and changing password afterword.

24
Q

Provisioning

A

After onboarding an individual, creating authentication credentials and providing appropriate authorizations.

25
Deprovisioning
Remove credentials and authorizations at the appropriate time.
26
Routine Workflow
Disables accounts on scheduled basis for planned departures