Access Control Models Flashcards

3.0 Implementation (23 cards)

1
Q

A nondiscretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.

A

Rule-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When access control uses policies to control access to resources, allowing the organization to systematically enforce rules about who can access which resources under which conditions.

A

Policy-driven access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of determining what rights and privileges a particular entity has.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security model that assumes that all devices, users, and services are not inherently trusted, regardless of whether inside or outside a network’s perimeter.

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Concept of having more than one person required to complete a task.

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security status of a device, including its security configurations, software versions, and patch levels.

A

Device posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When two communicating entities authenticate each other before exchanging data. It requires not only the server to authenticate the user but the user to authenticate the server

A

Mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A method of validating a particular entity’s or individual’s unique credentials.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An access control model where each resource is protected by an access control list (ACL) managed by the resource’s owner(s).

The model used by default for most UNIX/Linux distributions and Microsoft Windows. The weakest model because it makes centralized administration of security policies the most difficult to enforce. It is also the easiest to compromise, as it is vulnerable to insider threats and abuse of compromised accounts.

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access control principle that implements multiple access control methods instead of relying on a single process. Numerous defenses make it harder to bypass security measures.

A

Defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The restriction of highly sensitive data usually referenced in government and military contexts.

A

Need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rights and permissions should be set to
the bare minimum

– You only get exactly what’s needed to complete your objective

A

Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Restrictions on incoming and outgoing network traffic based on the time of day. This allows organizations to define when resources can be accessed or specific actions can be performed

A

Time of day restrictions

17
Q

An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

The attributes assigned to a resource constitute a policy that uses Boolean logic to determine who can access the resource. An example of a file access policy might include the following attributes: role = manager, department = development, and project = NewApp. Only users who possess all three attributes can access the file.

A

Attribute-based access control (ABAC)

18
Q

What are the five functions of the NIST CSF (Cybersecurity Framework)?

A

Identify, Protect, Detect, Respond, Recover

19
Q

An access control model where resources are protected by inflexible, system-defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).

Users with high clearance are not permitted to write low-clearance documents. This is referred to as write up, read down. This prevents, for example, a user with Top Secret clearance from republishing some Top Secret data that they can access with Secret clearance.

A

Mandatory Access Control (MAC)

20
Q

The process of deploying an account, host, or application to a target production environment. This involves proving the identity or integrity of the resource, and issuing it with credentials and access permissions.

21
Q

The process of removing an account, host, or application from the production environment. This requires revoking any privileged access that had been assigned to the object.

A

Deprovisioning

22
Q

In zero trust architecture, functions that define policy and determine access decisions.

A

Control Plane

23
Q

An analysis that measures the difference between the current and desired states in order to help assess the scope of work included in a project.