4.3 Implement identity and access management controls Flashcards

1
Q

Access control models

A

Select an appropriate model from DAC, RBAC, ABAC, and MAC based on the security requirement and available resources.

A model like MAC, RBAC, or ABAC needs support in the underlying OS and applications software to implement, so identify how provisioning this software will affect the decision.

Identify user account types to implement within the model, such as standard users and types of privileged users.

Identify what service accounts will be needed and how they will be secured against misuse.

Identify group or role account types and how users will be allocated to them.

Ideally, eliminate any dependency on shared and generic account types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MAC

A

(mandatory access control) An access control model where resources are protected by inflexible, system defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DAC

A

(discretionary access control) Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABAC

A

(attribute-based access control) An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Role-based access control

A

A set of organizational roles are defined, and users allocated to those roles. Under this system, the right to modify roles is reserved to administrative accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rule-based access control

A

Refer to any sort of access control model where access control policies are determined by system-enforced rules rather than system users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proximity cards

A

A contactless smart card that can transfer data using a tiny antenna embedded in the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smart cards

A

A credit card-sized device with an integrated chip and data interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

False acceptance rate

A

False positives or Type II error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

False rejection rate

A

False negatives or Type I error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Crossover error rate

A

The point at which false rejection rate and false acceptance rate meet. The lower the CER, the more efficient and reliable the technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HOTP/TOTP

A

(HMAC-based One-time Password) An algorithm that generates a one-time password using a hash-based authentication code to verify the authenticity of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PIV/CAC/smart card

A

(Personal Identity Verification card) A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card’s owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IEEE 802.1x

A

Port-based network access control framework works with smart cards and other token based systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly